malware blog post title graphic

Top 10 Malware Threats of 2018

In 2017, cybercrimes (including malware) cost businesses 11.7 million dollars per organization. The number of cybercrimes has continued to climb in 2018, threatening businesses and consumers around the world.

As methods of malware threats continue to evolve, companies have felt pressure to increase spend to prevent and resolve attacks. In June of 2018 there was a 60% increase in total malware and from May to June 2018 alone, “Malspam” experienced a 147% increase.

Protecting your business against these attacks is critical: make sure you are always up-to-date on your security measures and check the health of your domain regularly.  If you suspect malware is on your system or network, use Uptime.com to scan for both malware and viruses.

The top 10 malware threats of 2018 include the following:

1. Fileless Malware

This is one of the biggest threats to look for in 2018. Fileless malware, unlike ransomware, is undetectable. The most common type is cryptomining. It targets corporate servers and spreads itself across workstations without any warning signs.

2. Ransomware

The most popular example of Ransomware is the WannaCry ransomware worm. This attack affects Windows users by encrypting their data and demanding a ransom for the victim to regain access. Ransomware has to power to spread to multiple systems without proper protection and can be very costly for your company.

3. MalSpam

This comes in the form of an email and can trick employers and employees into opening the attachment. It usually looks legitimate, but there are signs the email is actually spam. MalSpam messages often contain misspellings and grammar errors, which should be a red flag.

4. Malvertisement

Although many companies block non-work related internet usage, some employees find ways around it. These fake advertisements trick individuals into clicking on them and then infect your system with malware such as coinminer. Protection and training are two of the best ways to prevent maladvertisements.

5. Password Phishing Malware

Phishing is a way for cybercriminals to trick individuals into sharing personal information. They do this by creating emails that look like they come from established companies requesting personal information, passwords and bank information. These emails usually provide a link to a page that looks like the real deal but is a way to gather personal information.

6. Attacking the Cloud

Many businesses are moving to the cloud. As of right now, the cloud isn’t automatically equipped with the proper defenses against these attacks, although it can identify malware. Invest in added protection to safeguard your business from potential attacks.

7. Keystroke Malware

Keystroke malware records the keys used on your keyboard and relays it back to the cybercriminal. They can then access your data without your knowledge. An example of these attacks is called Zeus/Zbot.

8. “Clickless” Attacks

Clickless attacks are on the rise. These cyber world criminals are no longer waiting for targets to fall into their “click here” traps. WannaCry ransomware is one example of a clickless attack. These attackers can gain access to your system without your knowledge.

9. Distributed Denial of Service

Mirai is causes distributed denial of service (DDoS). These attacks come in many forms: traffic, bandwidth, and application. DDoS attacks flood a victim’s computers, making it impossible to prevent the attack and allowing the perpetrator access to your system.

10. Socially Engineered Malware

These attacks trick the user into installing new software from trusted sites. They can then gain access to the system through the installed software.

How to Check Your Website for Malware

It is important to learn how to check for signs of malware on your domain. This isn’t always easy, but thankfully you can check your website for malware with Uptime.com.  The malware/virus check compares your site against two safe browsing lists to ensure your site is safe for visitors.

Minute-by-minute Uptime checks.
Start your 21-day free trial with no credit card required at Uptime.com.

Get Started

Don't forget to share this post!

Avatar

Debbie Hoffman is a freelance writer for Uptime.com providing knowledge base articles, tutorials, and blog posts. Debbie lives on a 13-acre property in upstate New York where she enjoys spending time outdoors with her family, gardening, and crafting.

Catch up on the rest of your uptime monitoring news