OpenText Security Solutions Announces Nastiest Malware of 2022
By MYBRANDBOOK
OpenText™ (NASDAQ: OTEX), (TSX: OTEX), today announced the Nastiest Malware of 2022, a ranking of the year’s biggest cyber threats. For the fifth year running, OpenText Security Solutions’ threat intelligence experts combed through the data, analyzed different behaviors, and determined which malicious payloads are the nastiest. Emotet regained its place at the top, reminding the world that while affiliates may be taken down, the masterminds are resilient. LockBit evolved its tactics into something never seen before: triple extortion. Analysis also revealed an almost 1100% increase in phishing during the first four months of 2022 compared to the same period in 2021, indicating a possible end to the “hacker holiday,” a hacker rest period following the busy holiday season.
“The key takeaway from this year’s findings is that malware remains center stage in the threats posed towards individuals, businesses, and governments,” said Muhi Majzoub, EVP and Chief Product Officer, OpenText. “Cybercriminals continue to evolve their tactics, leaving the infosec community in a constant state of catch-up. With the mainstream adoption of ransomware payloads and cryptocurrency facilitating payments, the battle will continue. No person, no business—regardless of size—is immune to these threats.”
While this year’s list may designate payloads into different categories of malware, it’s important to note many of these bad actor groups contract work from others. This allows each group to specialize in their respective payload and perfect it.
2022 Nastiest Malware
* Emotet remains the most successful botnet in existence, following a brief shutdown last year. Its job is to send malspam campaigns to billions of emails a day. It creates a foothold on a victim's computer, with follow-up malware that will then move laterally and compromise the rest of the environment before bringing in the final payload of ransomware.
* LockBit is this year's most prolific and successful ransomware group. While the group has been around for about three years as a ransomware-as-a-service (RaaS) group, they continue to advance their tactics. In addition to taking data, holding it for ransom and threatening to leak it, triple extortion adds a third layer: a distributed denial-of-service (DDoS) attack on an entire system to completely lock it down.
* Conti, a RaaS malware, has been on the Nastiest Malware radar for quite some time. In February, Conti released a statement of support on their leak site for the Russian government. Shortly after a twitter account, Conti leaks, leaked Conti’s internal chats dating back almost two years resulted in the dismantling of their leak site and command and control servers. Conti has since rebranded into multiple operations, most notably HelloKitty, BlackCat, and BlackByte.
* Qbot (AKA Qakbot), possibly the oldest info-stealing trojan, still receives updates today. It moves throughout the network and infects the entire environment while “casing the joint” to allow access to as much data as possible to exfiltrate for extortion and to prepare for the final stage of ransomware payloads.
* Valyria is another strain of a used-to-be banking trojan turned into malspam botnet with email attachments, turned into malicious scripts that starts an infection chain typically resulting in ransomware. The tricky part about Valyria is the complexity of the components and its ability to evade detection.
* Cobalt Strike and Brute Ratel are adversarial attack simulation tools. Cobalt Strike is a pen testing tool designed by white hats; Brute Ratel was created for red teams. The purpose of these tools is to help teams simulate attacks to understand the tactics hackers use, determine security gaps, and make the appropriate changes. Not surprising, Cobalt Strike, and now Brute Ratel, are frequently used by the bad guys.
Nazara and ONDC set to transform in-game monetization with ‘
Nazara Technologies has teamed up with the Open Network for Digital Comme...
Jio Platforms and NICSI to offer cloud services to government
In a collaborative initiative, the National Informatics Centre Services In...
BSNL awards ₹5,000 Cr Project to RVNL-Led Consortium
A syndicate led by Rail Vikas Nigam Limited (abbreviated as RVNL), along wi...
Pinterest tracks users without consent, alleges complaint
A recent complaint alleges that Pinterest, the popular image-sharing platf...
TVS ELECTRONICS LTD.
FIRE BOLTT
FRESHWORKS TECHNOLOGIES PVT. LTD.
TEJAS NETWORKS INDIA PVT. LTD.
ICONS OF INDIA : SUNIL VACHANI
Sunil Vachani is the Chairman of Dixon Technologies (India) Ltd. Under...
Icons Of India : B.V.R. Subrahmanyam
A 1987 batch (Chhattisgarh cadre) Indian Administrative Service Office...
Icons Of India : NATARAJAN CHANDRASEKARAN
Natarajan Chandrasekaran (Chandra) is the Chairman of Tata Sons, the h...
UIDAI - Unique Identification Authority of India
UIDAI and the Aadhaar system represent a significant milestone in Indi...
GeM - Government e Marketplace
GeM is to facilitate the procurement of goods and services by various ...
NPCI - National Payments Corporation of India
NPCI is an umbrella organization for operating retail payments and set...
Indian Tech Talent Excelling The Tech World - REVATHI ADVAITHI, CEO- Flex
Revathi Advaithi, the CEO of Flex, is a dynamic leader driving growth ...
Indian Tech Talent Excelling The Tech World - Anirudh Devgan , President, Cadence Design
Anirudh Devgan, the Global President and CEO of Cadence Design Systems...
Indian Tech Talent Excelling The Tech World - Sundar Pichai, CEO- Alphabet Inc.
Sundar Pichai, the CEO of Google and its parent company Alphabet Inc.,...