While cryptomining malware currently reigns supreme as the most prolific form of malicious software distributed by cyber criminals, a remote access trojan has entered the top ten most prolific malware threats for the first time — and it’s a particularly dangerous family. More security news IoT security and Linux: Why IncludeOS thinks it has the edge Google needs to break up its all-or-nothing approach to permissions Cloudflare launches Android and iOS apps for its 126.96.36.199 service Deserialization issues also affect Ruby, not just Java, PHP, and .NET Threat intelligence researchers at Check Point Software have tracked and published the top ten most prominent malware threats detected by its global network of sensors since late-2015, with ransomware, worms and cryptocurrency miners regularly featured in the ‘most wanted’ malware over the last two years. But for the first time ever, October saw the FlawedAmmyy RAT scrape into the top ten most detected malware threats in tenth place — making it the first remote access trojan to make the list. Built on top of the source code of leaked Ammyy Admin remote desktop software, FlawedAmmyy first appeared near the beginning of the year and provides attackers with extensive access to the PCs of infected victims. As it’s based on legitimate remote access software, FlawedAmmyy allows its criminal users to gain a backdoor on the targeted system and the opportunity to steal files, credentials, and more. It can also be used to take screenshots and even listen in on audio and video recorded around… [Read full story]
ZDNet is a business technology news website published by CBS Interactive, along with TechRepublic. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication owned by CNET Networks.