{"id":684996,"date":"2022-09-14T06:03:13","date_gmt":"2022-09-14T10:03:13","guid":{"rendered":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/"},"modified":"2022-09-14T06:03:13","modified_gmt":"2022-09-14T10:03:13","slug":"augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/","title":{"rendered":"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index"},"content":{"rendered":"<h2>\nCheck Point Research reports that FormBook is the most prevalent malware, while the Android spyware Joker takes third place in the mobile index. Apache Log4j Remote Code Execution also returns to first place as the most exploited vulnerability<br \/>\n<\/h2>\n<div class=\"mw_release\">\n<p>SAN CARLOS, Calif., Sept.  14, 2022  (GLOBE NEWSWIRE) &#8212; Check Point Research (CPR), the Threat Intelligence arm of <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=Z_MPFIbwKN-lYnWSS3tdMDgTPfg2I-Ftfii-lWO7_8jRmY7b4E8BO7aW8Ztmo07BJN6C-FMqnYEFRUqD3Jpd4fr_oClUJV-9sszW80GNF8zy1qd-K06zQ4DBx9UuefuD\" rel=\"nofollow noopener\" target=\"_blank\"><u>Check Point<sup>\u00ae<\/sup> Software Technologies Ltd.<\/u><\/a> (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for August 2022. CPR reports that FormBook is now the most prevalent malware, taking over from Emotet, which has held that position since its reappearance in January.<\/p>\n<p>FormBook is an Infostealer targeting Windows OS which, once deployed, can harvest credentials, collect screenshots, monitor and log keystrokes as well as download and execute files according to its command and control (C&amp;C) orders. Since it was first spotted in 2016, it has continued to make a name for itself, marketed as a Malware as a Service (MaaS) in underground hacking forums, known for its strong evasion techniques and relatively low price.<\/p>\n<p>August also saw a rapid increase in GuLoader activity, which resulted in it being the fourth most widespread malware. GuLoader was initially used to download Parallax RAT but has since been applied to other remote access trojans and infostealers such as Netwire, FormBook and Agent Tesla. It is commonly distributed through extensive email phishing campaigns, that lure the victim into downloading and opening a malicious file, allowing the malware to get to work.<\/p>\n<p>Additionally, Check Point Research reports that Joker<strong>,<\/strong> an Android spyware, is back in business and has claimed third place in the top mobile malware list this month. Once Joker is installed, it can steal SMS messages, contact lists and device information as well as sign the victim up for paid premium services without their consent. Its rise can partially be explained by an uplift in campaigns as it was recently spotted to be active in some <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=RnD2pM50kopPqorcvTQfCtiM3AaCKOemw2OetY4SglXlVeouYFhtwf2b4BlvYaMnbN28tl8aGp2LjM6draKL5kiYb4LwYKvXafTSIDqmDqRu1EtPNfQHlGjZs4RtkLrk8pJcFLyU7lOArWC1K2QNFLA7Ubxl9KTvuACcEOMnyul_uWev-Cx2wVwCnQThNec8\" rel=\"nofollow noopener\" target=\"_blank\">Google Play Store applications<\/a>.<\/p>\n<p>\u201cThe shifts that we see in this month\u2019s index, from Emotet dropping from first to fifth place to Joker becoming the third most prevalent mobile malware, is reflective of how fast the threat landscape can change,\u201d said Maya Horowitz, VP Research at Check Point Software. \u201cThis should be a reminder to individuals and companies alike, of the importance of keeping up to date with the most recent threats as knowing how to protect yourself is essential. Threat actors are constantly evolving and the emergence of FormBook shows that we can never be complacent about security and must adopt a holistic, prevent-first approach across networks, endpoints and the cloud.\u201d<\/p>\n<p>CPR also revealed this month that the Education\/Research sector is still the most targeted industry by cybercriminals globally. With Government\/Military and Healthcare taking second and third place as the most attacked sectors. \u201cApache Log4j Remote Code Execution\u201d returns to first place as the most exploited vulnerability, impacting 44% of organizations worldwide, after overtaking \u201cWeb Server Exposed Git Repository Information Disclosure\u201d which had an impact of 42%.<\/p>\n<p>\n        <strong><br \/>\n          <u>Top malware families<\/u><br \/>\n        <\/strong>\n      <\/p>\n<p>\n        <em>*The arrows relate to the change in rank compared to the previous month.<\/em>\n      <\/p>\n<p>\n        <strong>FormBook<\/strong> is the most widespread malware this month impacting 5% of organizations worldwide, followed by <strong>AgentTesla<\/strong> with an impact of 4% and <strong>XMRig<\/strong> with 2%.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li style=\"margin-bottom:12pt\">\n          <strong>\u2191 FormBook <\/strong>\u2013 FormBook is an Infostealer targeting Windows OS and was first detected in 2016. It is marketed as a Malware as a Service (MaaS) in underground hacking forums for its strong evasion techniques and relatively low price. FormBook harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes and can download and execute files according to orders from its C&amp;C.<\/li>\n<li style=\"margin-bottom:12pt\">\n          <strong>\u2191<\/strong><br \/>\n          <strong>AgentTesla<\/strong> &#8211; AgentTesla is an advanced RAT functioning as a keylogger and information stealer, which is capable of monitoring and collecting the victim\u2019s keyboard input, system keyboard, taking screenshots and exfiltrating credentials to a variety of software installed on a victim\u2019s machine (including Google Chrome, Mozilla Firefox and the Microsoft Outlook email client).<\/li>\n<li style=\"margin-bottom:12pt\">\n          <strong><br \/>\n            <em>\u2193<\/em><br \/>\n          <\/strong><br \/>\n          <strong> XMRig <\/strong>\u2013 XMRig is open-source CPU software used to mine Monero cryptocurrency. Threat actors often abuse this open-source software by integrating it into their malware to conduct illegal mining on victim\u2019s devices.<\/li>\n<\/ol>\n<p>\n        <strong><br \/>\n          <u>Top Attacked Industries Globally<\/u><br \/>\n        <\/strong>\u00a0<\/p>\n<p>This month the <strong>Education\/Research <\/strong>sector remained in first place as the most attacked industry globally, followed by <strong>Government\/Military <\/strong>and<strong> Healthcare<\/strong>.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li>Education\/Research<\/li>\n<li>Government\/Military<\/li>\n<li>Healthcare<\/li>\n<\/ol>\n<p>\n        <strong><br \/>\n          <u>Top Exploited Vulnerabilities<\/u><br \/>\n        <\/strong>\u00a0<\/p>\n<p>This month, <strong>\u201cApache Log4j Remote Code Execution\u201d<\/strong> is the most common exploited vulnerability, impacting\u00a044% of organizations globally, followed by <strong>\u201cWeb Server Exposed Git Repository Information Disclosure\u201d<\/strong> which dropped from first place to second with an impact of 42%. <strong>\u201cWeb Servers Malicious URL Directory Traversal\u201d <\/strong>remains in the third place, with a global impact of 39%.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li style=\"margin-bottom:12pt\">\n          <strong>\u2191<\/strong><br \/>\n          <strong>Apache Log4j Remote Code Execution (CVE-2021-44228)<\/strong> &#8211; A remote code execution vulnerability exists in Apache Log4j. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.<\/li>\n<li style=\"margin-bottom:12pt\">\n          <strong><br \/>\n            <em>\u2193<\/em><br \/>\n          <\/strong><br \/>\n          <strong>Web Server Exposed Git Repository Information Disclosure &#8211; <\/strong>An information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow unintentional disclosure of account information.<\/li>\n<li style=\"margin-bottom:12pt\">\n          <strong>\u2194 Web Servers Malicious URL Directory Traversal (CVE-2010-4598,CVE-2011-2474,CVE-2014-0130,CVE-2014-0780,CVE-2015-0666,CVE-2015-4068,CVE-2015-7254,CVE-2016-4523,CVE-2016-8530,CVE-2017-11512,CVE-2018-3948,CVE-2018-3949,CVE-2019-18952,CVE-2020-5410,CVE-2020-8260) &#8211;<\/strong> There exists a directory traversal vulnerability on different web servers. The vulnerability is due to an input validation error in a web server that does not properly sanitize the URI for the directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.<\/li>\n<\/ol>\n<p>\n        <strong><br \/>\n          <u>Top Mobile Malwares<\/u><br \/>\n        <\/strong>\u00a0<\/p>\n<p>This month <strong>AlienBot <\/strong>is the most prevalent Mobile malware, followed by <strong>Anubis <\/strong>and<strong> Joker<\/strong>.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li style=\"margin-bottom:12pt\">\n          <strong>AlienBot \u2013 <\/strong>AlienBot is a banking Trojan for Android, sold underground as a Malware-as-a-Service (MaaS). It supports keylogging, dynamic overlays for credentials theft, as well as SMS harvesting for 2FA bypass. Additional remote control capabilities are provided by using a TeamViewer module.<\/li>\n<li style=\"margin-bottom:12pt\">\n          <strong>Anubis \u2013 <\/strong>Anubis\u00a0is a banking Trojan malware designed for Android mobile phones. Since it was initially detected, it has gained additional functions including Remote Access Trojan (RAT) functionality, keylogger and audio recording capabilities as well as various ransomware features. It has been detected on hundreds of different applications available in the Google Store.<\/li>\n<li style=\"margin-bottom:12pt\">\n          <strong>Joker <\/strong>&#8211; An Android Spyware in Google Play, designed to steal SMS messages, contact lists and device information. Furthermore, the malware can also sign the victim up for paid premium services without their consent or knowledge.<\/li>\n<\/ol>\n<p>Check Point\u2019s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point\u2019s <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=PUuWikOm66wn5O-m7ZYmcn_yg2iCAo778is0cCLvw7agdcYc3VNGLqYSx7otZNenahu2RUBkqGorQojUx9Llvmo6U2mKeBVI6MMZrov4SnmDLeqM5ntn_chXJOVeDjeR\" rel=\"nofollow noopener\" target=\"_blank\"><u>ThreatCloud<\/u><\/a> intelligence. ThreatCloud provides real-time threat intelligence derived from hundreds of millions of sensors worldwide, over networks, endpoints and mobiles. The intelligence is enriched with AI-based engines and exclusive research data from Check Point Research, The Intelligence &amp; Research Arm of Check Point Software Technologies.<\/p>\n<p>The complete list of the top ten malware families in July can be found on the Check Point <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=ZFqEeDQmyeQ7RgByUyMcmu_agEmG1UFQZDDvir65KTlqQusqFWKlrbH0uDlzyOSUamilJXEmowrbsaLmPF9SQWr84c0aT4nbAFIwtpbB4CyCZx9oxWRVbK1J408m8J8YnsntTveRxSnUwLYUhwarUFKQAn-a9UaHlIcIkBJVxsGopn7MKYxt3QWYaz6MFTvOPVZxiJ4yN_nuTQ07QVl3zxBS6L8aH1NZ5dBBa0T78Q0=\" rel=\"nofollow noopener\" target=\"_blank\"><u>blog<\/u><\/a>.<\/p>\n<p>\n        <strong>Follow Check Point Research via:<\/strong>\u00a0<br \/>Blog: <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=HvzQcNMTrnbcFjCkitTjWT4F-RWfVEnEgsuH9MpNVb3AOFFaF61GfQCc4Ba4Emy2Jh6NsWvKqOP6ufyimjh4rKJ6V5cIotmcwgBbukOqi3EQs9IewgwG8foaZ-KVmo6g\" rel=\"nofollow noopener\" target=\"_blank\"><u>https:\/\/research.checkpoint.com\/<\/u><\/a><br \/>Twitter: <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=HvzQcNMTrnbcFjCkitTjWX_elgabYD_9WvDp54zwohRAtlhCpboxjjQXxz0H1GDfSur3yhVGDL7Vgx8rPZ4X00P4_7QVYvnexZfLQvmApKPi7CnY6EPTEcp3TkqFyNJk\" rel=\"nofollow noopener\" target=\"_blank\"><u>https:\/\/twitter.com\/_cpresearch_<\/u><\/a><\/p>\n<p>\n        <strong>About Check Point Research<\/strong><br \/>\n        <br \/>Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=PUuWikOm66wn5O-m7ZYmcv1D4vlTerURY6a1RrbmdCPRkebN1vCDmrbeD_3_ZmLM3FpRs54NwMTAzZ-ztiBqvQcpeY3eQZ1CjlBsYt-n7L_9F_8RoyrXhLc35PqFWw-y\" rel=\"nofollow noopener\" target=\"_blank\"><u>ThreatCloud<\/u><\/a> to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.<\/p>\n<p>\n        <strong>About Check Point Software Technologies Ltd.<\/strong>\u00a0<br \/>Check Point Software Technologies Ltd. (<a href=\"https:\/\/www.globenewswire.com\/Tracker?data=9Ngzb4BRNkwpAHS0TYehKeiQY_XSXvDKly32U_ZkRYoVRsY3QaHn0SEvS3yIyzPKSh3kkzFWuddtC4ohxNFSBW8oBDZjDUunyylBSY8hN88=\" rel=\"nofollow noopener\" target=\"_blank\"><u>www.checkpoint.com<\/u><\/a>) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity\u00b4s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry\u2019s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.<\/p>\n<table style=\"border-collapse: collapse;width:100%;border-collapse:collapse\">\n<tr>\n<td style=\"max-width:45%;width:45%;min-width:45%;vertical-align: top\">\n            <strong>MEDIA CONTACT:<\/strong>\n          <\/td>\n<td style=\"max-width:55%;width:55%;min-width:55%;vertical-align: top\">\n            <strong>INVESTOR CONTACT:\u00a0<\/strong>\n          <\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top\">\n            <strong>Emilie Beneitez Lefebvre<\/strong>\n          <\/td>\n<td style=\"vertical-align: top\">\n            <strong>Kip E. Meintzer<\/strong>\n          <\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top\">Check Point Software Technologies<\/td>\n<td style=\"vertical-align: top\">Check Point Software Technologies<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top\">\n            <a href=\"mailto:press@us.checkpoint.com\" rel=\"nofollow noopener\" target=\"_blank\"><br \/>\n              <u>press@us.checkpoint.com<\/u><br \/>\n            <\/a>\n          <\/td>\n<td style=\"vertical-align: top\">\n            <a href=\"mailto:ir@us.checkpoint.com\" rel=\"nofollow noopener\" target=\"_blank\"><br \/>\n              <u>ir@us.checkpoint.com<\/u><br \/>\n            <\/a>\n          <\/td>\n<\/tr>\n<\/table>\n<p>      <img decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=\" \/><br \/>\n      <br \/>\n      <img decoding=\"async\" src=\"https:\/\/ml.globenewswire.com\/media\/YjM3OGY2ZGQtYjczMS00MmU0LWExMDQtMTkwYjNhYjZhZjRlLTEwMTU3MDE=\/tiny\/Check-Point-Software-Technolog.png\" \/>\n    <\/div>\n<div class=\"mw_contactinfo\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Check Point Research reports that FormBook is the most prevalent malware, while the Android spyware Joker takes third place in the mobile index. Apache Log4j Remote Code Execution also returns to first place as the most exploited vulnerability SAN CARLOS, Calif., Sept. 14, 2022 (GLOBE NEWSWIRE) &#8212; Check Point Research (CPR), the Threat Intelligence arm of Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for August 2022. CPR reports that FormBook is now the most prevalent malware, taking over from Emotet, which has held that position since its reappearance in January. FormBook is an Infostealer targeting Windows OS which, once deployed, can harvest credentials, collect screenshots, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-684996","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Check Point Research reports that FormBook is the most prevalent malware, while the Android spyware Joker takes third place in the mobile index. Apache Log4j Remote Code Execution also returns to first place as the most exploited vulnerability SAN CARLOS, Calif., Sept. 14, 2022 (GLOBE NEWSWIRE) &#8212; Check Point Research (CPR), the Threat Intelligence arm of Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for August 2022. CPR reports that FormBook is now the most prevalent malware, taking over from Emotet, which has held that position since its reappearance in January. FormBook is an Infostealer targeting Windows OS which, once deployed, can harvest credentials, collect screenshots, &hellip; Continue reading &quot;August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-14T10:03:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index\",\"datePublished\":\"2022-09-14T10:03:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/\"},\"wordCount\":1408,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/\",\"name\":\"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=\",\"datePublished\":\"2022-09-14T10:03:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=\",\"contentUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/","og_locale":"en_US","og_type":"article","og_title":"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index - Market Newsdesk","og_description":"Check Point Research reports that FormBook is the most prevalent malware, while the Android spyware Joker takes third place in the mobile index. Apache Log4j Remote Code Execution also returns to first place as the most exploited vulnerability SAN CARLOS, Calif., Sept. 14, 2022 (GLOBE NEWSWIRE) &#8212; Check Point Research (CPR), the Threat Intelligence arm of Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for August 2022. CPR reports that FormBook is now the most prevalent malware, taking over from Emotet, which has held that position since its reappearance in January. FormBook is an Infostealer targeting Windows OS which, once deployed, can harvest credentials, collect screenshots, &hellip; Continue reading \"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/","og_site_name":"Market Newsdesk","article_published_time":"2022-09-14T10:03:13+00:00","og_image":[{"url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index","datePublished":"2022-09-14T10:03:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/"},"wordCount":1408,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/","name":"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=","datePublished":"2022-09-14T10:03:13+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#primaryimage","url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg=","contentUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODY0NjIxMiM1MTUxODc2IzIwMDQxMjg="},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"August\u2019s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/684996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=684996"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/684996\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=684996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=684996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=684996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}