This list contains the top 10 malware and ransomware families detected by Netskope targeting users in the Retail sector in the last 12 months:
Botnet.Mirai is one of the most famous botnets targeting exposed networking devices running Linux. Discovered in 2016, this malware has been targeting a wide range of devices such as routers, cameras, and other IoT devices. Since its source code leak, the number of variants of this malware has increased considerably.
Infostealer.AgentTesla is a .NET-based remote access Trojan with many capabilities, such as stealing browsers’ passwords, capturing keystrokes, clipboard, etc.
Infostealer.Azorult (a.k.a. PuffStealer) is a malware that aims to steal sensitive information such as account passwords. The malware is reported to be delivered via Google Sides and using HTML Smuggling to achieve its final execution.
Infostealer.QakBot (a.k.a. Quakbot, QBot) is a modular malware active since 2007 capable of stealing sensitive financial data from infected systems, often delivered via malicious documents.
Phishing.PhishingX is a malicious PDF file used as part of a phishing campaign to redirect victims to a phishing page.
RAT.ComRAT is a second-stage implant used by the Turla threat group. The first version of ComRAT was identified in 2007. The malware can send information to the attacker and receive commands to be executed.
RAT.NjRAT (a.k.a. Bladabindi) is a remote access Trojan with many capabilities, including logging keystrokes, stealing credentials from browsers, accessing the victim’s camera, and managing files.
RAT.Remcos is a remote access Trojan that provides an extensive list of features to remotely control devices, and it’s popularly abused by many attackers.
Trojan.ModernLoader (a.k.a Avatar Bot) is a malware able to collect basic system information as well as deliver multiple malwares to the infection system such as cryptominers and RATs.
Trojan.Ursnif (a.k.a. Gozi) is a banking Trojan and backdoor, whose source code was leaked on GitHub in 2005, allowing attackers to create and distribute many variants.