{"id":410098,"date":"2021-01-07T06:03:13","date_gmt":"2021-01-07T11:03:13","guid":{"rendered":"http:\/\/www.marketnewsdesk.com\/?p=410098"},"modified":"2021-01-07T06:03:13","modified_gmt":"2021-01-07T11:03:13","slug":"december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/","title":{"rendered":"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat"},"content":{"rendered":"<h2>\nCheck Point Research reports a new campaign using the Emotet trojan which has targeted over 100,000 users per day<br \/>\n<\/h2>\n<div class=\"mw_release\">\n<p>SAN CARLOS, Calif., Jan.  07, 2021  (GLOBE NEWSWIRE) &#8212; Check Point Research, the Threat Intelligence arm of <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=wcAaCkDZeeFeYPoy92Kr352snIrfkNlAt-QbbtuLWlrGC5jR6dkovzsXmmfvJj_t0gL1XtRj7wRW_w59nuIqhqjk3rYsucNjGfLIces7YEVecBMwaYP3Pr3ACqWaG_Ii\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Check Point<sup>\u00ae<\/sup> Software Technologies Ltd.<\/a> (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=g0VvluBeS4jKhhJdXmLhgvC8bYG5SXA1cqqbrWwOcNum5wmA3R0OQjv2Ef7IRuF59CZ9-kma278cKVnOXm3AJLd_hoXIQTRX0WJHp3WS92BtpTz8wSV3U9M5H-8n5KTWpufrFY8_6j4m7TJcj7JMphGPXqiN3raRlE1iYTwNHZ5yXPsh-JJ2nwwxtR6oIB93P66ZIozNB9sk6LkwtdonVW4xIWM_e_nt3GTlNTCWO-c=\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Global Threat Index for December 2020<\/a>. Researchers reported that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season.<\/p>\n<p>In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=LiLQvGFV1xsGyh3gT2BMJbAyKb305420EXr4m6hYI-VVY-gNnFHSeIA8JdOqyevk0X__Gqy9w27GksJbfjhEGW4BXJR69KbG2Hdar49Lz2fWGdvIRrKFVi4-F93kWeDNybVlimHKBmW0SIOD6mE_xWyJXN8anQow4P_4q9OzcM8SI6TsREjlFmnU_A7ntS82NUeoTy7WXHIjX42hHv6mXnfolqBz3a2wj1_Mi0sPclPDJeFeuFBt_05Hl5wfZqZ2gcPnFrprkLpzMQ9kTGU-gA==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">was linked to a wave of ransomware attacks<\/a>. But in November it was much less prevalent, dropping to 5<sup>th<\/sup> place in the Index. Researchers state that it has now been updated with new malicious payloads and improved detection evasion capabilities: the latest version creates a dialogue box, which helps it evade detection by users. Emotet\u2019s new malicious spam campaign uses different delivery techniques to spread Emotet, including embedded links, document attachments, or password-protected Zip files.<\/p>\n<p>First identified in 2014, Emotet has been regularly updated by its developers to maintain its effectiveness for malicious activity. The Department of Homeland Security has estimated that each incident involving Emotet costs organizations upwards of <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=hsiWP571TpCULkduZi0faSI6MAAnAuNRddFE9Otq7NppEPys-lG1V4D7ZMW2hPJEg0q7w_cowy3X9lOyxXtk1xk4t0PKf3o8V4ctsGcteIA=\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">$1 million<\/a>\u00a0to rectify.<\/p>\n<p>\u201cEmotet was originally developed as banking malware which sneaked on to users\u2019 computers to steal private and sensitive information. However, it has evolved over time and is now seen as one of the most costly and destructive malware variants,\u201d said Maya Horowitz, Director, Threat Intelligence &amp; Research, Products at Check Point. \u201cIt\u2019s imperative that organizations are aware of the threat Emotet poses and that they have robust security systems in place to prevent a significant breach of their data. They should also provide comprehensive training for employees, so they are able to identify the types of malicious emails which spread Emotet.\u201d<\/p>\n<p>The research team also warns that \u201cMVPower DVR Remote Code Execution\u201d is the most common exploited vulnerability, impacting 42% of organizations globally, followed by \u201cHTTP Headers Remote Code Execution (CVE-2020-13756)\u201d which impact 42% of organizations worldwide.<\/p>\n<p>\n        <strong><br \/>\n          <u>Top malware families<\/u><br \/>\n        <\/strong><br \/>\n        <br \/>\n        <em>*The arrows relate to the change in rank compared to the previous month.<\/em>\n      <\/p>\n<p>This Month, <strong>Emotet<\/strong> remains the most popular malware with a global impact of 7% of organizations, closely followed by <strong>Trickbot<\/strong> and <strong>Formbook<\/strong> \u2013 which impacted 4% of organizations worldwide, each.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li style=\"margin-top:12pt\">\n          <strong>\u2191 Emotet<\/strong> \u2013 Emotet is an advanced, self-propagate and modular Trojan. Emotet once used to employ as a banking Trojan, and recently is used as a distributer to other malware or malicious campaigns. It uses multiple methods for maintaining persistence and Evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links.<\/li>\n<li style=\"margin-top:12pt\">\n          <strong>\u2191 Trickbot<\/strong> &#8211; Trickbot is a dominant banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi purposed campaigns.<\/li>\n<li style=\"margin-top:12pt\">\n          <strong>\u2191 Formbook &#8211; <\/strong>Formbook is an Info Stealer that harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to its C&amp;C orders. <\/li>\n<\/ol>\n<p>\n        <strong><br \/>\n          <u>Top exploited vulnerabilities<\/u><br \/>\n        <\/strong>\n      <\/p>\n<p>This month <strong>\u201cMVPower DVR Remote Code Execution\u201d <\/strong>is the most common exploited vulnerability, impacting 42% of organizations globally, followed by <strong>\u201cHTTP Headers Remote Code Execution (CVE-2020-13756)\u201d<\/strong> which impact 42% of organizations worldwide. <strong>\u201cWeb Server Exposed Git Repository Information Disclosure\u201d<\/strong> is on the third place in the top exploited vulnerabilities list, with a global impact of 41%.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li style=\"margin-top:12pt\">\n          <strong>\u2191 MVPower DVR Remote Code Execution<\/strong> &#8211; remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request.<\/li>\n<li style=\"margin-top:12pt\">\n          <strong><br \/>\n            <em>\u2193<\/em><br \/>\n          <\/strong><br \/>\n          <strong> HTTP Headers Remote Code Execution (CVE-2020-13756) &#8211; <\/strong>HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine.<\/li>\n<li style=\"margin-top:12pt\">\n          <strong>\u2191<\/strong><br \/>\n          <strong>Web Server Exposed Git Repository Information Disclosure &#8211;<\/strong> information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information.<\/li>\n<\/ol>\n<p>\n        <strong><br \/>\n          <u>Top mobile malware<\/u><br \/>\n        <\/strong>\n      <\/p>\n<p>This month, <strong>Hiddad<\/strong> holds 1<sup>st<\/sup> place in the most prevalent mobile malware, followed by <strong>xHelper<\/strong> and <strong>Triada.<\/strong><\/p>\n<ol style=\"list-style-type:decimal\">\n<li style=\"margin-top:12pt\">\n          <strong>Hiddad &#8211; <\/strong>Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.<\/li>\n<li style=\"margin-top:12pt\">\n          <strong>xHelper &#8211; <\/strong>A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisement. The application is capable of hiding itself from the user and reinstall itself in case it was uninstalled.<\/li>\n<li style=\"margin-top:12pt\">\n          <strong>Triada &#8211; <\/strong>Modular Backdoor for Android which grants superuser privileges to downloaded malware.<\/li>\n<\/ol>\n<p>Check Point\u2019s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point\u2019s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 2.5 billion websites and 500 million files daily and identifies more than 250 million malware activities every day.<\/p>\n<p>The complete list of the top 10 malware families in December can be found on the <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=wcAaCkDZeeFeYPoy92Kr3zTZxOy1gHRSV40gqZsiHlt4CGzCsw-2tUU17oKLGA9P5wbcvfHFG2yRD25w12XEIVp4ni60WHW_NhcqAXWBcFjPOhwjcrxnv9k-exO0bNXU1TjsDaPs6B-h1ugbRPIksD1pezrdhCOg_VZiY1z_gS5EM1U0DFN3iLDaE0FpoP2pYfc3BW6ZpP2YWn69vnvCdg==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Check Point Blog<\/a>. <\/p>\n<p>\n        <strong>Follow Check Point Research via:<\/strong><br \/>\n        <br \/>Blog: <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=ZoUEfyyIx6XkTz993Nc_fqatMHOpEwwccOcvGiFUJXgnt_Z4RxKIjI59Zxr_zLVJk6_k5FlEMhAN-HTRQnO9ucbCyaqym2S2Vc9yRihDXg_FaPyAANqZK-x2cUB_JypP\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">https:\/\/research.checkpoint.com\/<\/a><br \/>Twitter: <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=ZoUEfyyIx6XkTz993Nc_fkcku-X43OMYimfAcU89oZQ-EgSCOQR8s2FPxmcuZSi4yQQ1ihNbdEbdj1kEStcqjL0tx3Nvj0DTaamVSR9LQZVm9jWtlgLRGqN8youq7x5K\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">https:\/\/twitter.com\/_cpresearch_<\/a><\/p>\n<p>\n        <strong>About Check Point Research <\/strong><br \/>\n        <br \/>Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.<\/p>\n<p>\n        <strong>About Check Point Software Technologies Ltd.<\/strong><br \/>\n        <br \/>Check Point Software Technologies Ltd. (<a href=\"https:\/\/www.globenewswire.com\/Tracker?data=MVODk8Dip5vpGl1IuBYxLHccAfSn0njqqKLsuIb17ydz27Mn04U66nARKfJH7O29VKQ0gqBOPXBAnFqfhX7aHLAQ52sOjqvHb6btMDcaB10=\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">www.checkpoint.com<\/a>) is a leading provider of cyber security solutions to governments and corporate enterprises globally.\u00a0 Check Point\u2019s solutions protect customers from 5<sup>th<\/sup>\u00a0generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, \u201cInfinity Total Protection\u00a0with Gen V advanced threat prevention\u201d,\u00a0this combined product architecture defends an enterprise\u2019s cloud, network and\u00a0mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.<\/p>\n<table style=\"border-collapse: collapse;width:100%;border-collapse:collapse\">\n<tr>\n<td style=\"max-width:40%;width:40%;min-width:40%\">\n            <strong>MEDIA CONTACT:<\/strong>\u00a0 \u00a0<\/td>\n<td style=\"max-width:60%;width:60%;min-width:60%\">\n            <strong>INVESTOR CONTACT:<\/strong>\n          <\/td>\n<\/tr>\n<tr>\n<td>\n            <strong>Emilie Beneitez Lefebvre \u00a0 \u00a0\u00a0<\/strong>\n          <\/td>\n<td>\n            <strong>Kip E. Meintzer<\/strong>\n          <\/td>\n<\/tr>\n<tr>\n<td>Check Point Software Technologies\u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/td>\n<td>Check Point Software Technologies\u00a0 \u00a0\u00a0<\/td>\n<\/tr>\n<tr>\n<td>\n            <a href=\"mailto:press@checkpoint.com\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">press@checkpoint.com<\/a>\u00a0 \u00a0 \u00a0<\/td>\n<td>\n            <a href=\"mailto:ir@us.checkpoint.com\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">ir@us.checkpoint.com<\/a>\u00a0<\/td>\n<\/tr>\n<\/table>\n<p>      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=\" width=\"1\" height=\"1\" \/><br \/>\n      <br \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/ml.globenewswire.com\/release\/track\/5c7268e4-b95e-44c3-a4a9-ff45e7545c74\" width=\"1\" height=\"1\" \/>\n    <\/div>\n<div class=\"mw_contactinfo\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Check Point Research reports a new campaign using the Emotet trojan which has targeted over 100,000 users per day SAN CARLOS, Calif., Jan. 07, 2021 (GLOBE NEWSWIRE) &#8212; Check Point Research, the Threat Intelligence arm of Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for December 2020. Researchers reported that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and was linked to a wave of &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-410098","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Check Point Research reports a new campaign using the Emotet trojan which has targeted over 100,000 users per day SAN CARLOS, Calif., Jan. 07, 2021 (GLOBE NEWSWIRE) &#8212; Check Point Research, the Threat Intelligence arm of Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for December 2020. Researchers reported that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and was linked to a wave of &hellip; Continue reading &quot;December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-07T11:03:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat\",\"datePublished\":\"2021-01-07T11:03:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/\"},\"wordCount\":1104,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/\",\"name\":\"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=\",\"datePublished\":\"2021-01-07T11:03:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=\",\"contentUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/","og_locale":"en_US","og_type":"article","og_title":"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat - Market Newsdesk","og_description":"Check Point Research reports a new campaign using the Emotet trojan which has targeted over 100,000 users per day SAN CARLOS, Calif., Jan. 07, 2021 (GLOBE NEWSWIRE) &#8212; Check Point Research, the Threat Intelligence arm of Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for December 2020. Researchers reported that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and was linked to a wave of &hellip; Continue reading \"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/","og_site_name":"Market Newsdesk","article_published_time":"2021-01-07T11:03:13+00:00","og_image":[{"url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat","datePublished":"2021-01-07T11:03:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/"},"wordCount":1104,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/","name":"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=","datePublished":"2021-01-07T11:03:13+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#primaryimage","url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg=","contentUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMTcxMSMzOTA3NTY1IzIwMDQxMjg="},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"December 2020\u2019s Most Wanted Malware: Emotet Returns as Top Malware Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/410098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=410098"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/410098\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=410098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=410098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=410098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}