Ransomware

FlawedAmmyy Rat Becomes One of the Most Potent Malware Threats

Each month, Check Point releases its 10 most potent malware threats. And for the first time ever, it announced that a remote access Trojan (also known as a RAT) cracked their Top 10 list. The name of this malware is FlawedAmmyy.

Meet FlawedAmmyy

What makes this attack so potent is the hackers’ ability to access everything remotely. How it works, according to ZDNet is its built on top of the source code of leaked Ammyy Admin remote software.

Once a user unintentionally downloads it via a file transfer or email attachment, it provides thieves backdoor access to the victim’s computer. From there, they control the microphone, camera, as well as have full access to everything you do.

This might involve stealing login credentials when visiting financial websites, creating target lists of people who you contact regularly, and more. “While we have detected several campaigns distributing the FlawedAmmyy RAT in recent months, the latest campaign was easily the largest in terms of widespread impact,” remarked Checkpoint’s threat intelligence manager Maya Horowitz to ZDNet.

Trends Show Cryptomining Ransomware Remains Biggest Threat

Check Point’s list revealed that of the Top 10 threats, cryptomining continues to be the biggest influencer. Two of the most dangerous risks involve Coinhive and Cryptoloot. Cryptoloot, in particular, grows as a threat due to its ability to use existing resources for cryptomining, and it requests a smaller percentage of revenue relative to other threats, according to Check Point.

Along with its Top 10 List, Check Point released its three biggest mobile threats for the last month. They are Triada, Lokibot, and Hiddad. Of note is Lokibot. This Trojan gathers data then allows the attacker to lock a victim’s device until they pay a ransom.

Security Tips

Knowing the latest threat trends helps you to understand where and how thieves attack devices. Armed with this information, it assists you in creating a proactive plan. As part of this plan:

Update all software on your devices since they might include patches that fix security vulnerabilities.

Refrain from downloading attachments or apps from unknown sources, third-party marketplaces, and most important from your email.

Download anti-virus and antimalware software and update each regularly.

Create an offline backup so if your files become stolen, you have access to them.

Speaking of losing files, we understand how bewildering that experience is. This is why we have a team of recovery experts standing by to assist you. When the unthinkable happens, trust the team at SALVAGEDATA to make your recovery. Contact us today to learn more.

 

Share
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

Share
Published by
Bogdan Glushko

Recent Posts

Quickest Mobile Data Recovery Case: 100% of Data Recovered in One Hour

In a recent data recovery service case, the SalvageData recovery team achieved a remarkable feat…

2 months ago

How to fix a corrupted database on PS4 

A corrupted database on PS4 occurs when the system's organized data collection becomes damaged or…

2 months ago

How to Troubleshoot Black or Blank Screens in Windows

Encountering a black or blank screen on your Windows computer can be frustrating and alarming.…

2 months ago

LockBit Ransomware: A Comprehensive Guide to the Most Prolific Cyber Threat

LockBit ransomware has emerged as one of the most dangerous and prolific cyber threats in…

2 months ago

How To Use iPad Recovery Mode

Recovery mode is a crucial feature for troubleshooting and restoring an iPad when it encounters…

3 months ago

How to Prevent Overwriting Files: Best Practices

Whether you’re a professional juggling important work documents or an individual cherishing irreplaceable memories, safeguarding…

3 months ago