SlideShare a Scribd company logo
2022
Slides 01
TOP 10 MALWARE MAY
Malware is a constant threat and being aware of them is the
first step to keeping them at bay. Here we have listed the top
10 malware to watch out for this upcoming month.
Gh0st and Jupiter have made their entry as the top 10
malware and something every user should be aware of.
Gh0st is a RAT employed to access infected endpoints.
Another evasive malware, Jupiter is .NET malware used to
target innocent users when they visit any website and
download a file in the form of a PDF or zip. The malware
activity for this month is predicted to rise by a considerable
amount as compared to the previous month.
Slides 02
Shlayer is a downloader and dropper malware targeting mainly MacOS. It is mainly
propagated through malicious websites, compromised domains, and malvertising
posing as Adobe Flash updater.
Slides 03
Here Are The Top 10 Malware That You Should Watch Out For In May 2022
Given below the Top 10 Malware ranked in order of virulence.
Shlayer
All Shlayer domains use the same keyword <api.random_name.com>. Below are
numerous instances of domains Shlayer utilities.</api.random_name.com>
api[.]interfacecache[.]com
api[.]scalableunit[.]com
api[.]typicalconfig[.]com
api[.]standartanalog[.]com
api[.]fieldenumerator[.]com
api[.]practicalsprint[.]com
api[.]searchwebsvc[.]com
api[.]connectedtask[.]com
api[.]navigationbuffer[.]com
api[.]windowtask[.]com
ZeuS
Slides 06
ZeuS is a trojan that tracks the keys of a victim when they visit any banking website. By tracking the
keystrokes, they get hold of the credentials of users and cause financial losses. Since its inception,
various malwares are based on the ZeuS code and are used to perpetuate havoc.
Agent Tesla
Agent Tesla is a RAT that gets hold of personal information and screenshots from an infected system.
Slides 07
NanoCore
NanoCore is a RAT propagated through
malspam. It spreads as an Excel XLS
spreadsheet. Once it finds entry into the
system, it installs and executes various files.
Slides 07
CoinMiner
CoinMiner, as the name suggests is a crypto miner
application based on Windows Management
Instrumentation (WMI) and EternalBlue to infect any
network. It also employs WMI Standard Event
Consumer scripting to run numerous scripts.
Delf
Slides 06
Delf is a group of malware with many versions devised in the Delphi programming language. They may
be downloaders. Campaigns, targets, infection vectors, and capabilities, depending upon its version.
They are sent to gain backdoor access, steal data, hinder antivirus, and various other functions.
Gh0st
Gh0st is a RAT wielded to regulate infected endpoints. Gh0st is plunged by other malware to establish a
backdoor into an appliance that authorizes an attacker to entirely monitor the infected device.
37[.]120.233[.]92
89[.]44.9[.]108
92[.]204.160[.]101
92[.]204.160[.]114
146[.]70.101[.]97
146[.]70.53[.]153
146[.]70.40[.]236
193[.]29.104[.]89
Jupyter aka SolarMarker, is a highly infectious malware aimed to
target harmless users to access any website or download any file.
Jupyter majorly preys browser data in browsers such as Chrome,
Chromium, and Firefox and has complete backdoor access.
IPs:
Slides 08
Jupyter
Arechclient2
Slides 06
Arechclient2, also known as SectopRAT, is a .NET RAT aimed to conduct numerous functions. Their
main role is to steal information including browser and wallet data. It is also instilled with anti-VM and
anti-emulator functions.
Mirai
Mirai is a malware botnet targeting Internet of Things (IoT) devices. This is done to conduct a DDoS
attack and in the process gain complete control of the system.
Slides 16
Final Words
So here are the top 10 malware you should watch out for in the month
of May. Along with being informed about them, it is advisable to have a
good quality antivirus and antimalware installed in your system. One
such great antivirus is Sysvoot. Install it now and stay protected from
any lurking dangers.

More Related Content

Similar to Top 10 Malware May 2022 .pdf

Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
ITrust - Cybersecurity as a Service
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDIJCNCJournal
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
Andrey Apuhtin
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
Teodoro Cipresso
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
Sai Huda
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
RSIS International
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
AshishDPatel1
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
RSIS International
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
Muhammad FAHAD
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
Symantec
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Trend Micro
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
jeffautor15
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
Martin Holovský
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
Infinigate Group
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top Malware
IBM Security
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
IRJET Journal
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 

Similar to Top 10 Malware May 2022 .pdf (20)

Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top Malware
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 

More from Sysvoot Antivirus

Managed IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdfManaged IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdf
Sysvoot Antivirus
 
What is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdfWhat is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdf
Sysvoot Antivirus
 
Benefit of SaaS.pdf
Benefit of SaaS.pdfBenefit of SaaS.pdf
Benefit of SaaS.pdf
Sysvoot Antivirus
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Sysvoot Antivirus
 
Types of Cloud Computing Service
Types of Cloud Computing Service Types of Cloud Computing Service
Types of Cloud Computing Service
Sysvoot Antivirus
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdf
Sysvoot Antivirus
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdf
Sysvoot Antivirus
 
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdfSysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot Antivirus
 
How to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdfHow to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdf
Sysvoot Antivirus
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
Sysvoot Antivirus
 
Latest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdfLatest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdf
Sysvoot Antivirus
 
How to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdfHow to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdf
Sysvoot Antivirus
 
5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf
Sysvoot Antivirus
 
Windows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdfWindows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdf
Sysvoot Antivirus
 
What is Identity and Access Management.pdf
What is Identity and Access Management.pdfWhat is Identity and Access Management.pdf
What is Identity and Access Management.pdf
Sysvoot Antivirus
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
Sysvoot Antivirus
 
What is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdfWhat is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdf
Sysvoot Antivirus
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
Sysvoot Antivirus
 
Why are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for CybersecurityWhy are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for Cybersecurity
Sysvoot Antivirus
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdf
Sysvoot Antivirus
 

More from Sysvoot Antivirus (20)

Managed IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdfManaged IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdf
 
What is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdfWhat is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdf
 
Benefit of SaaS.pdf
Benefit of SaaS.pdfBenefit of SaaS.pdf
Benefit of SaaS.pdf
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdf
 
Types of Cloud Computing Service
Types of Cloud Computing Service Types of Cloud Computing Service
Types of Cloud Computing Service
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdf
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdf
 
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdfSysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
 
How to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdfHow to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdf
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
 
Latest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdfLatest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdf
 
How to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdfHow to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdf
 
5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf
 
Windows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdfWindows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdf
 
What is Identity and Access Management.pdf
What is Identity and Access Management.pdfWhat is Identity and Access Management.pdf
What is Identity and Access Management.pdf
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
What is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdfWhat is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdf
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
 
Why are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for CybersecurityWhy are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for Cybersecurity
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdf
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Top 10 Malware May 2022 .pdf

  • 1. 2022 Slides 01 TOP 10 MALWARE MAY
  • 2. Malware is a constant threat and being aware of them is the first step to keeping them at bay. Here we have listed the top 10 malware to watch out for this upcoming month. Gh0st and Jupiter have made their entry as the top 10 malware and something every user should be aware of. Gh0st is a RAT employed to access infected endpoints. Another evasive malware, Jupiter is .NET malware used to target innocent users when they visit any website and download a file in the form of a PDF or zip. The malware activity for this month is predicted to rise by a considerable amount as compared to the previous month. Slides 02
  • 3. Shlayer is a downloader and dropper malware targeting mainly MacOS. It is mainly propagated through malicious websites, compromised domains, and malvertising posing as Adobe Flash updater. Slides 03 Here Are The Top 10 Malware That You Should Watch Out For In May 2022 Given below the Top 10 Malware ranked in order of virulence. Shlayer
  • 4. All Shlayer domains use the same keyword <api.random_name.com>. Below are numerous instances of domains Shlayer utilities.</api.random_name.com> api[.]interfacecache[.]com api[.]scalableunit[.]com api[.]typicalconfig[.]com api[.]standartanalog[.]com api[.]fieldenumerator[.]com api[.]practicalsprint[.]com api[.]searchwebsvc[.]com api[.]connectedtask[.]com api[.]navigationbuffer[.]com api[.]windowtask[.]com
  • 5. ZeuS Slides 06 ZeuS is a trojan that tracks the keys of a victim when they visit any banking website. By tracking the keystrokes, they get hold of the credentials of users and cause financial losses. Since its inception, various malwares are based on the ZeuS code and are used to perpetuate havoc. Agent Tesla Agent Tesla is a RAT that gets hold of personal information and screenshots from an infected system.
  • 6. Slides 07 NanoCore NanoCore is a RAT propagated through malspam. It spreads as an Excel XLS spreadsheet. Once it finds entry into the system, it installs and executes various files.
  • 7. Slides 07 CoinMiner CoinMiner, as the name suggests is a crypto miner application based on Windows Management Instrumentation (WMI) and EternalBlue to infect any network. It also employs WMI Standard Event Consumer scripting to run numerous scripts.
  • 8. Delf Slides 06 Delf is a group of malware with many versions devised in the Delphi programming language. They may be downloaders. Campaigns, targets, infection vectors, and capabilities, depending upon its version. They are sent to gain backdoor access, steal data, hinder antivirus, and various other functions. Gh0st Gh0st is a RAT wielded to regulate infected endpoints. Gh0st is plunged by other malware to establish a backdoor into an appliance that authorizes an attacker to entirely monitor the infected device.
  • 9. 37[.]120.233[.]92 89[.]44.9[.]108 92[.]204.160[.]101 92[.]204.160[.]114 146[.]70.101[.]97 146[.]70.53[.]153 146[.]70.40[.]236 193[.]29.104[.]89 Jupyter aka SolarMarker, is a highly infectious malware aimed to target harmless users to access any website or download any file. Jupyter majorly preys browser data in browsers such as Chrome, Chromium, and Firefox and has complete backdoor access. IPs: Slides 08 Jupyter
  • 10. Arechclient2 Slides 06 Arechclient2, also known as SectopRAT, is a .NET RAT aimed to conduct numerous functions. Their main role is to steal information including browser and wallet data. It is also instilled with anti-VM and anti-emulator functions. Mirai Mirai is a malware botnet targeting Internet of Things (IoT) devices. This is done to conduct a DDoS attack and in the process gain complete control of the system.
  • 11. Slides 16 Final Words So here are the top 10 malware you should watch out for in the month of May. Along with being informed about them, it is advisable to have a good quality antivirus and antimalware installed in your system. One such great antivirus is Sysvoot. Install it now and stay protected from any lurking dangers.