【図表】
過去12か月の順位推移(マルウェアファミリー)
過去12か月の順位推移(モバイルマルウェア)
出典: https://blog.checkpoint.com/research/december-2023s-most-wanted-malware-the-resurgence-of-qbot-and-fakeupdates/ のデータを元に独自に作表
【ランキング】
■マルウェア
2024年 | 2023年 | 2022年 | 2021年 | 2020年 | 2019年 | 2018年 | 備考 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
順位 | マルウェア名 |
3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12 月 | 11 月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | |
1 | Fakeupdates | 1 | 1 | 1 | 1 | 2 | 3 | 8 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2 | Qbot | 2 | 2 | 2 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 1 | 1 | 3 | 9 | 7 | 9 | 5 | 5 | 3 | 8 | 6 | 10 | 6 | 6 | 10 | トロイの木馬 | ||||||||||||||||||||||||||||||||||||||||||||||
3 | Formbook | 3 | 3 | 3 | 2 | 1 | 1 | 1 | 2 | 2 | 2 | 2 | 3 | 3 | 2 | 4 | 4 | 6 | 7 | 1 | 1 | 2 | 2 | 2 | 2 | 2 | 3 | 3 | 3 | 9 | 2 | 1 | 4 | 3 | 3 | 6 | 8 | 4 | 6 | 3 | 4 | 5 | 3 | 5 | 9 | 4 | 7 | 7 | 8 | 5 | 8 | 4 | 9 | 4 | 9 | 9 | 9 | インフォスティーラ | |||||||||||||||
4 | Remcos | 4 | 6 | 6 | 4 | 3 | 3 | 2 | 6 | 3 | 7 | 10 | 9 | 7 | 8 | 7 | 10 | 10 | 7 | 5 | 6 | 10 | 10 | 8 | 7 | 6 | 5 | 3 | 6 | 6 | 9 | ボット(ボットネット) | |||||||||||||||||||||||||||||||||||||||||
5 | Agent Tesla | 5 | 8 | 10 | 6 | 5 | 6 | 7 | 6 | 3 | 1 | 4 | 5 | 3 | 9 | 1 | 1 | 3 | 2 | 7 | 4 | 3 | 3 | 2 | 4 | 4 | 4 | 2 | 7 | 4 | 3 | 8 | 5 | 4 | 2 | 4 | 4 | 2 | 3 | 1 | 2 | 3 | 6 | 6 | 4 | 4 | 9 | 8 | 3 | 5 | 6 | 10 | 7 | Rat | |||||||||||||||||||
6 | AsyncRat | 6 | 4 | 5 | 5 | 6 | 10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7 | CloudEye(Guloader) | 7 | 10 | 5 | 8 | 7 | 4 | 4 | 5 | 6 | 6 | 8 | 4 | ダウンローダー | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8 | Nanocore | 8 | 5 | 4 | 3 | 4 | 4 | 4 | 4 | 5 | 8 | 9 | 7 | 10 | 7 | 9 | 5 | 10 | 10 | 7 | 9 | 5 | 8 | ||||||||||||||||||||||||||||||||||||||||||||||||||
9 | njRAT | 9 | 9 | 8 | 7 | 2 | 6 | 5 | 6 | 10 | 7 | 8 | 10 | 9 | 6 | 6 | 10 | 10 | 10 | Rat | |||||||||||||||||||||||||||||||||||||||||||||||||||||
10 | Phorpiex | 10 | 9 | 7 | 7 | 10 | 8 | 9 | 9 | 8 | 10 | 10 | 10 | 7 | 10 | 10 | 7 | 9 | 8 | 7 | 9 | 9 | 10 | 9 | 10 | 8 | 8 | 10 | 5 | 2 | 1 | 2 | ボット(ボットネット) | ||||||||||||||||||||||||||||||||||||||||
- | Tofsee | 7 | 9 | 10 | 9 | 9 | 9 | 10 | 5 | 7 | 8 | 7 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Ramnit | 8 | 9 | 9 | 10 | 6 | 8 | 8 | 5 | 9 | 4 | 8 | 7 | 7 | 5 | 7 | 8 | 8 | 8 | 6 | 8 | 7 | 6 | 6 | 7 | 9 | 8 | 10 | 9 | 10 | 8 | 6 | 8 | 6 | 8 | 6 | 9 | 7 | 6 | 6 | 6 | 6 | 9 | 6 | 8 | 6 | 5 | 6 | 7 | 10 | 10 | 8 | 8 | 7 | 6 | 10 | 10 | バンキングマルウェア(トロイの木馬) | |||||||||||||||
- | Glupteba | 10 | 8 | 9 | 6 | 5 | 4 | 3 | 6 | 5 | 4 | 4 | 5 | 5 | 5 | 4 | 6 | 8 | 10 | 6 | 10 | 7 | 7 | 9 | 8 | 9 | 10 | 10 | バックドア | ||||||||||||||||||||||||||||||||||||||||||||
- | Mirai | 8 | 7 | 8 | 9 | 10 | 9 | 6 | 7 | 10 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Emotet | 5 | 3 | 7 | 4 | 3 | 5 | 4 | 2 | 3 | 6 | 2 | 2 | 6 | 4 | 5 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 2 | 7 | 1 | 1 | 5 | 1 | 1 | 1 | 1 | 7 | 6 | 9 | 5 | 2 | 1 | 1 | 1 | 1 | 5 | 7 | 4 | 5 | 4 | 4 | 2 | 3 | 5 | 5 | 7 | 10 | トロイの木馬 | |||||||||||||||||||
- | ChromeLoader | 10 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | XMRig | 5 | 6 | 6 | 5 | 4 | 5 | 3 | 5 | 5 | 2 | 3 | 3 | 5 | 5 | 4 | 3 | 5 | 5 | 7 | 6 | 2 | 3 | 4 | 3 | 2 | 2 | 4 | 7 | 2 | 5 | 5 | 7 | 7 | 5 | 5 | 6 | 3 | 3 | 2 | 1 | 1 | 2 | 2 | 2 | 2 | 2 | 1 | 1 | 1 | 2 | 2 | 3 | 4 | 2 | 2 | 9 | 7 | 8 | 7 | 7 | 7 | 7 | インフォスティーラ | |||||||||
- | Lokibot | 9 | 8 | 2 | 4 | 6 | 10 | 5 | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Vidar | 7 | 10 | 9 | 7 | 7 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Snake Keylogger | 4 | 2 | 6 | 8 | 8 | 3 | 8 | 8 | 2 | キーロガー(.Net) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | IcedID | 7 | 4 | 10 | 2 | バンキングマルウェア(トロイの木馬) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Raspberry Robin | 9 | ワーム | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Trickbot | 6 | 2 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 1 | 3 | 6 | 1 | 3 | 2 | 6 | 2 | 2 | 4 | 4 | 5 | 7 | 5 | 4 | 4 | 3 | 3 | 3 | 3 | 6 | 4 | 7 | 10 | 8 | 8 | |||||||||||||||||||||||||||||||||||||
- | Dridex | 9 | 1 | 1 | 7 | 4 | 4 | 2 | 4 | 3 | 2 | 4 | 1 | 1 | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Floxif | 9 | 9 | 10 | 10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Ursnif | 8 | 9 | 5 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | xHelper | 9 | 9 | 8 | 10 | 10 | 8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | RigEK | 9 | 9 | 8 | 8 | 10 | 8 | 10 | 10 | 10 | 7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Hiddad | 7 | 7 | 3 | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Zloader | 9 | 8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Valak | 9 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | NetwiredRC | 10 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Lokibot | 10 | 8 | 5 | 8 | 5 | 7 | 10 | 10 | 6 | 10 | 9 | 8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | JSEcoin | 4 | 2 | 3 | 4 | 1 | 2 | 2 | 2 | 3 | 3 | 5 | 5 | 4 | 3 | 6 | 6 | 5 | 5 | 5 | 6 | 4 | |||||||||||||||||||||||||||||||||||||||||||||||||||
- | Hawkeye | 9 | 7 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Dorkbot | 5 | 5 | 8 | 3 | 3 | 4 | 7 | 5 | 4 | 6 | 7 | 7 | 5 | 3 | 2 | 2 | 3 | 3 | 8 | |||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Cryptoloot | 10 | 7 | 8 | 10 | 3 | 1 | 1 | 1 | 2 | 3 | 4 | 2 | 2 | 3 | 4 | 2 | 2 | 2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Nivdort | 9 | 8 | 7 | 6 | 6 | 10 | 10 | 8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Sality | 9 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Coinhive | 6 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Gandcrab | 8 | 9 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Authedmine | 9 | 10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Smokeloader | 9 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Andromeda | 3 | 5 | 4 | 3 | 4 | 4 | 5 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Roughted | 4 | 4 | 6 | 8 | 6 | 5 | 3 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Conficker | 8 | 9 | 9 | 9 | 8 | 10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | FlawedAmmyy RAT | 10 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Fireball | 6 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
- | Necurs | 9 |
■脆弱性
2024年 | 2023年 | 2022年 | 2021年 | 2020年 | 備考 |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
順位 | 脆弱性 |
3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | |
1 | Web Servers Malicious URL Directory Traversal | 1 | 1 | 2 | 2 | 2 | 3 | 1 | 8 | 1 | 1 | 1 | 1 | 5 | 1 | 2 | 1 | 4 | 5 | 3 | 3 | 3 | 1 | 4 | Directory Traversal | ||||||||||||||||||||||||||
2 | Command Injection Over HTTP | 2 | 2 | 1 | 4 | 1 | 2 | 2 | 2 | 8 | 8 | 8 | 4 | 8 | 5 | 4 | 3 | 4 | 5 | 3 | 5 | 4 | 5 | 6 | 9 | CVE-2021-43936,CVE-2022-24086 | |||||||||||||||||||||||||
3 | HTTP Headers Remote Code Execution | 3 | 4 | 3 | 9 | 5 | 1 | 3 | 3 | 3 | 3 | 2 | 4 | 2 | 4 | 3 | 3 | 4 | 4 | 5 | 4 | 4 | 5 | 3 | 2 | 2 | 2 | 1 | 3 | 4 | 6 | 5 | 6 | CVE-2020-13756 など | |||||||||||||||||
4 | Zyxel ZyWALL Command Injection | 4 | 3 | 3 | 3 | 1 | 3 | CVE-2023-28771 | |||||||||||||||||||||||||||||||||||||||||||
5 | Apache Struts2 ContentType Remote Code Execution | 5 | 5 | 6 | 8 | 6 | 6 | 6 | 5 | 10 | 8 | 6 | 3 | CVE-2017-5638 | |||||||||||||||||||||||||||||||||||||
6 | WordPress portable-phpMyAdmin Plugin Authentication Bypass | 6 | 8 | 7 | 6 | 5 | 4 | 9 | 9 | 9 | 10 | 10 | 9 | 5 | 9 | 8 | 8 | 10 | 10 | 7 | 8 | 9 | 8 | 10 | 6 | 10 | 7 | 7 | 8 | 9 | 8 | 7 | 6 | 7 | 5 | 7 | 6 | 10 | CVE-2012-5469 | ||||||||||||
7 | PHP Easter Egg Information Disclosure | 7 | 6 | 7 | 5 | 7 | 8 | 6 | 5 | 7 | 7 | 9 | 9 | 7 | 7 | 7 | 7 | 7 | 7 | 7 | 8 | 10 | 9 | 10 | 7 | ||||||||||||||||||||||||||
8 | MVPower CCTV DVR Remote Code Execution | 8 | 6 | 8 | 7 | 5 | 3 | 5 | 5 | CVE-2016-20016 | |||||||||||||||||||||||||||||||||||||||||
9 | Dasan GPON Router Authentication Bypass | 9 | 7 | 4 | 4 | 4 | 5 | 7 | 6 | 8 | 6 | 6 | 5 | 9 | 9 | 8 | 8 | 9 | 8 | 4 | 3 | 4 | 3 | 2 | 2 | 3 | 4 | 4 | 4 | 4 | 5 | 4 | 4 | 7 | 9 | CVE-2012-5469 | |||||||||||||||
10 | OpenSSL TLS DTLS Heartbeat Information Disclosure | 10 | 10 | 8 | 10 | 10 | 9 | 10 | 10 | 10 | 7 | 6 | 4 | 10 | 9 | 6 | 5 | 3 | 5 | 2 | 1 | 2 | 2 | 3 | 2 | 5 | 6 | 2 | 2 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | |||||||||||||||
- | Apache Log4j Remote Code Execution | 7 | 4 | 1 | 4 | 4 | 2 | 2 | 2 | 2 | 1 | 3 | 8 | 10 | 2 | 2 | 1 | 2 | 1 | 2 | 2 | 1 | Apache Log4j, CVE-2021-44228 | ||||||||||||||||||||||||||||
- | D-LINK Multiple Products Remote Code Execution | 9 | 10 | 6 | 6 | 8 | 9 | 9 | 9 | 6 | CVE-2015-2051 | ||||||||||||||||||||||||||||||||||||||||
- | Apache HTTP Server Directory Traversal | 5 | 10 | CVE-2021-41773 | |||||||||||||||||||||||||||||||||||||||||||||||
- | TP-Link TL-WR840N/TL-WR841N Authentication Bypass | 6 | |||||||||||||||||||||||||||||||||||||||||||||||||
- | Atlassian Confluence Template Injection | 8 | CVE-2023-22527 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | Muieblackcat PHP Scanner | 9 | 10 | 10 | 9 | ||||||||||||||||||||||||||||||||||||||||||||||
- | Atlassian Confluence Server Arbitrary File Read | 10 | CVE-2021-26085 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | PHPUnit Command Injection | 9 | 6 | 8 | 7 | 10 | 9 | 10 | 8 | 6 | 9 | 6 | 10 | CVE-2017-9841 | |||||||||||||||||||||||||||||||||||||
- | ZTE F460/F660 Backdoor Unauthorized Access | 9 | 10 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | F5 BIG-IP Remote Code Execution | 6 | 6 | 10 | |||||||||||||||||||||||||||||||||||||||||||||||
- | MVPower DVR Remote Code Execution | 4 | 5 | 3 | 6 | 3 | 5 | 6 | 6 | 6 | 7 | 7 | 7 | 5 | 7 | 5 | 3 | 1 | 1 | 2 | 1 | 1 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 3 | 3 | 1 | 3 | 3 | |||||||||||||||
- | Web Server Exposed Git Repository Information Disclosure | 2 | 1 | 1 | 2 | 1 | 1 | 2 | 1 | 2 | 3 | 1 | 2 | 1 | 5 | 3 | 4 | 7 | 5 | 1 | 7 | 3 | 3 | 4 | 7 | 2 | 3 | 5 | 3 | 8 | 4 | 4 | 2 | 2 | Git Repository | ||||||||||||||||
- | NoneCMS ThinkPHP Remote Code Execution | 10 | 10 | 5 | 2 | 1 | CVE-2018-20062 | ||||||||||||||||||||||||||||||||||||||||||||
- | Microsoft Windows HTTP.sys Remote Code Execution | 8 | 6 | CVE-2015-1635 | |||||||||||||||||||||||||||||||||||||||||||||||
- | PHP phpcgi Query String Parameter Code Execution | 10 | 10 | 10 | 9 | 9 | 2 | 6 | |||||||||||||||||||||||||||||||||||||||||||
- | Apache Struts ParametersInterceptor ClassLoader Security Bypass | 6 | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | WordPress portablephpMyAdmin Plugin Authentication Bypass | 7 | 8 | 9 | 8 | 10 | 6 | 10 | 7 | 7 | 8 | 9 | 8 | 7 | 6 | 7 | 5 | 7 | 6 | 10 | CVE-2012-5469 | ||||||||||||||||||||||||||||||
- | Command Injection Over HTTP Payload | 6 | 5 | 4 | 5 | 5 | 8 | 9 | 3 | 3 | 9 | 8 | 1 | 4 | 8 | 6 | 4 | 7 | |||||||||||||||||||||||||||||||||
- | Linux System Files Information Disclosure | 9 | 7 | 2 | CVE-2018-3948, CVE-2018-3948, CVE-2022-23119 | ||||||||||||||||||||||||||||||||||||||||||||||
- | SQL Injection (several techniques) | 6 | 6 | 8 | 8 | 8 | 8 | 8 | 8 | 5 | 5 | 9 | 5 | 7 | 4 | 1 | 1 | 4 | 1 | 1 | 1 | 1 | |||||||||||||||||||||||||||||
- | Draytek Vigor Command Injection | 7 | 7 | 9 | 7 | 4 | 6 | 4 | CVE-2020-8515 | ||||||||||||||||||||||||||||||||||||||||||
- | PHP DIESCAN information disclosure | 8 | 9 | 10 | 9 | 7 | 6 | 8 | 3 | 3 | 9 | 6 | 4 | 8 | 7 | 6 | 5 | 7 | |||||||||||||||||||||||||||||||||
- | w00tw00t security scanner | 9 | 10 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | WordPress xmlrpc Weak Password Access Attempt | 7 | |||||||||||||||||||||||||||||||||||||||||||||||||
- | OpenSSL Padding Oracle Information Disclosure | 8 | 8 | 9 | 10 | 10 | 9 | CVE-2016-2107 | |||||||||||||||||||||||||||||||||||||||||||
- | HP Universal CMDB Default Credentials Arbitrary File Upload | 10 | CVE-2014-2617 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | Draytek Vigor Command Injection | 5 | CVE-2020-8515 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | DLink DSL2750B Remote Command Execution | 10 | 8 | 7 | 10 | 5 | 10 | 10 | 9 | 9 | 8 | ||||||||||||||||||||||||||||||||||||||||
- | Joomla Object Injection Remote Command Execution | 10 | 10 | 8 | 7 | 9 | 6 | 5 | 3 | 4 | |||||||||||||||||||||||||||||||||||||||||
- | Huawei HG532 Router Remote Code Execution | 6 | |||||||||||||||||||||||||||||||||||||||||||||||||
- | Web Server Enforcement Violation | 10 | |||||||||||||||||||||||||||||||||||||||||||||||||
- | Hikvision IP Cameras Information Disclosure | 9 | |||||||||||||||||||||||||||||||||||||||||||||||||
- | OpenDreamBox WebAdmin Plugin Remote Code Execution | 8 | |||||||||||||||||||||||||||||||||||||||||||||||||
- | Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow | 10 | 5 | 2 | 1 | CVE-2017-7269 |
■モバイルマルウェア
2024年 | 2023年 | 2022年 | 2021年 | 2020年 | 備考 |
|||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
順位 | マルウェア名 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | 3月 | 2月 | 1月 | 12月 | 11月 | 10月 | 9月 | 8月 | 7月 | 6月 | 5月 | 4月 | |
1 | Anubis | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 1 | 2 | 2 | 2 | バンキングマルウェア | ||||||||||||||||||||||||||
2 | AhMyth | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 3 | 3 | 2 | 1 | 1 | 3 | 3 | Rat | |||||||||||||||||||||||||||||||||
3 | Cerberus | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | Hydra | 3 | 3 | 3 | 3 | 2 | 2 | 2 | バンキングマルウェア | |||||||||||||||||||||||||||||||||||||||||
- | SpinOK | 3 | 3 | 3 | 2 | 1 | ||||||||||||||||||||||||||||||||||||||||||||
- | Hiddad | 3 | 3 | 3 | 2 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 3 | 3 | 2 | 3 | 2 | 3 | 3 | 3 | 2 | 3 | ||||||||||||||||||||||||||||
- | AlienBot | 3 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | 2 | Android の MaaS | |||||||||||||||||||||||||||||||||||||||
- | Joker | 3 | 3 | 3 | ||||||||||||||||||||||||||||||||||||||||||||||
- | MasilBot | 3 | 3 | Android インフォスティーラー | ||||||||||||||||||||||||||||||||||||||||||||||
- | FluBot | 2 | 2 | 3 | Android ボットネット | |||||||||||||||||||||||||||||||||||||||||||||
- | xHelper | 3 | 3 | 2 | 2 | 2 | 2 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | ||||||||||||||||||||||||||||||||
- | FurBall | 3 | 3 | |||||||||||||||||||||||||||||||||||||||||||||||
- | Triada | 3 | 3 | 3 | 2 | 3 | 1 | |||||||||||||||||||||||||||||||||||||||||||
- | Lotoor | 3 | 3 | 3 | 2 | 3 | 3 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | ||||||||||||||||||||||||||||||||||||
- | Necro | 2 | 2 | 1 | 2 | |||||||||||||||||||||||||||||||||||||||||||||
- | PreAmo | 3 | 1 | |||||||||||||||||||||||||||||||||||||||||||||||
- | AndroidBauts | 3 | 2 | 3 | 2 | 2 | 2 | |||||||||||||||||||||||||||||||||||||||||||
- | Guerrilla | 3 | 2 | 2 | 2 | 1 | ||||||||||||||||||||||||||||||||||||||||||||
- | Piom | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | Xafekopy | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||
- | Ztorg | 3 |
【ブログ】
■2024年
◆March 2024’s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos (Check Point, 2024/04/09)
https://blog.checkpoint.com/security/march-2024s-most-wanted-malware-hackers-discover-new-infection-chain-method-to-deliver-remcos/
⇒ https://malware-log.hatenablog.com/entry/2024/04/09/000000
◆February 2024’s Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign (Check Point, 2024/03/11)
https://blog.checkpoint.com/research/february-2024s-most-wanted-malware-wordpress-websites-targeted-by-fresh-fakeupdates-campaign/
⇒ https://malware-log.hatenablog.com/entry/2024/03/11/000000_3
◆January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats (Check Point, 2024/02/09)
https://blog.checkpoint.com/research/january-2024s-most-wanted-malware-major-vextrio-broker-operation-uncovered-and-lockbit3-tops-the-ransomware-threats/
⇒ https://malware-log.hatenablog.com/entry/2024/02/09/000000_4
■2023年
◆December 2023’s Most Wanted Malware: The Resurgence of Qbot and FakeUpdates (Check Point, 2024/01/09)
[2023年12月の最重要マルウェア: QbotとFakeUpdatesの復活]
https://blog.checkpoint.com/research/december-2023s-most-wanted-malware-the-resurgence-of-qbot-and-fakeupdates/
⇒ https://malware-log.hatenablog.com/entry/2024/01/09/000000
◆November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus (Check Point, 2023/12/12)
[2023年11月の最重要マルウェア: 新たなAsyncRATキャンペーンが発見される一方、FakeUpdatesが一時停止していたトップ10に再ランクイン]
https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/
⇒ https://malware-log.hatenablog.com/entry/2023/12/12/000000_1
◆October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign (Check Point, 2024/11/08)
https://blog.checkpoint.com/security/october-2023s-most-wanted-malware-njrat-jumps-to-second-place-while-agenttesla-spreads-through-new-file-sharing-mal-spam-campaign/
⇒ https://malware-log.hatenablog.com/entry/2023/11/08/000000_2
◆September 2023’s Most Wanted Malware: Remcos Wreaks Havoc in Colombia and Formbook Takes Top Spot after Qbot Shutdown(Check Point, 2023/10/06)
[2023年9月の最重要マルウェア: Remcosがコロンビアで大惨事を引き起こし、Qbotのシャットダウン後にFormbookが首位を獲得]
https://blog.checkpoint.com/security/september-2023s-most-wanted-malware-remcos-wreaks-havoc-in-colombia-and-formbook-takes-top-spot-after-qbot-shutdown/
⇒ https://malware-log.hatenablog.com/entry/2023/10/06/000000_1
◆August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI (Check Point, 2023/09/11)
https://blog.checkpoint.com/security/august-2023s-most-wanted-malware-new-chromeloader-campaign-spreads-malicious-browser-extensions-while-qbot-is-shut-down-by-fbi/
⇒ https://malware-log.hatenablog.com/entry/2023/09/11/000000_3
◆July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot (Check Point, 2023/08/09)
[2023年7月の最重要マルウェア: リモートアクセス型トロイの木馬(RAT)「Remcos」が3位に上昇、モバイルマルウェア「Anubis」がトップに返り咲く]
https://blog.checkpoint.com/security/july-2023s-most-wanted-malware-remote-access-trojan-rat-remcos-climbs-to-third-place-while-mobile-malware-anubis-returns-to-top-spot/
⇒ https://malware-log.hatenablog.com/entry/2023/08/09/000000_7
◆June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut (Check Point, 2023/07/06)
[2023年6月の最重要マルウェア: 2023年上半期に最も流行したマルウェアはQbot、モバイル型トロイの木馬SpinOkが初登場]
https://blog.checkpoint.com/security/june-2023s-most-wanted-malware-qbot-most-prevalent-malware-in-first-half-of-2023-and-mobile-trojan-spinok-makes-its-debut/
⇒ https://malware-log.hatenablog.com/entry/2023/07/06/000000_13
◆May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads (Check Point, 2023/06/09)
[2023年5月の最重要指名手配マルウェア: Guloaderの新バージョン、暗号化されたクラウドベースのペイロードを配信]
https://blog.checkpoint.com/security/may-2023s-most-wanted-malware-new-version-of-guloader-delivers-encrypted-cloud-based-payloads/
⇒ https://malware-log.hatenablog.com/entry/2023/06/09/000000_1
◆April 2023’s Most Wanted Malware: Qbot Launches Substantial Malspam Campaign and Mirai Makes its Return (Check Point, 2023/05/11)
[2023年4月の最重要マルウェア: Qbotが大規模なマルスパムキャンペーンを開始、そしてMiraiが再登場]
https://blog.checkpoint.com/security/april-2023s-most-wanted-malware-qbot-launches-substantial-malspam-campaign-and-mirai-makes-its-return/
⇒ https://malware-log.hatenablog.com/entry/2023/05/11/000000_4
◆March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files (Check Point, 2023/04/10)
[2023年3月の最重要指名手配マルウェア: 新しいEmotetキャンペーン、マイクロソフトのブロックを回避して悪意のあるOneNoteファイルを配布]
https://blog.checkpoint.com/security/march-2023s-most-wanted-malware-new-emotet-campaign-bypasses-microsoft-blocks-to-distribute-malicious-onenote-files/
⇒ https://malware-log.hatenablog.com/entry/2023/04/10/000000_2
◆February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government (Check Point, 2023/03/09)
[2023年2月の最重要指名手配マルウェア: ウクライナ政府に対するサイバースパイ活動に関連するRemcosトロイの木馬]
https://blog.checkpoint.com/2023/03/09/february-2023s-most-wanted-malware-remcos-trojan-linked-to-cyberespionage-operations-against-ukrainian-government/
⇒ https://malware-log.hatenablog.com/entry/2023/03/09/000000_4
◆January 2023’s Most Wanted Malware: Infostealer Vidar Makes a Return while Earth Bogle njRAT Malware Campaign Strikes (Check Point, 2023/02/13)
[2023年1月 最も注目すべきマルウェア:Infostealer Vidarが再登場、Earth Bogle njRATマルウェア・キャンペーンが襲来]
https://blog.checkpoint.com/2023/02/13/january-2023s-most-wanted-malware-infostealer-vidar-makes-a-return-while-earth-bogle-njrat-malware-campaign-strikes/
⇒ https://malware-log.hatenablog.com/entry/2023/02/13/000000_2
■2022年
◆December 2022’s Most Wanted Malware: Glupteba Entering Top Ten and Qbot in First Place (Check Point, 2023/01/13)
[2022年12月の「Most Wanted Malware」。Gluptebaがトップ10入り、Qbotが1位を獲得]
https://blog.checkpoint.com/2023/01/13/december-2022s-most-wanted-malware-glupteba-entering-top-ten-and-qbot-in-first-place/
⇒ https://malware-log.hatenablog.com/entry/2023/01/13/000000_2
◆September 2022’s Most Wanted Malware: Formbook on Top While Vidar ‘Zooms’ Seven Places (Checkpoint, 2022/10/12)
[2022年9月の「Most Wanted Malware」。Formbookがトップに、Vidarは7位に急上昇]
https://blog.checkpoint.com/2022/10/12/september-2022s-most-wanted-malware-formbook-on-top-while-vidar-zooms-seven-places/
⇒ https://malware-log.hatenablog.com/entry/2022/10/12/000000_5
◆August’s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index (Checkpoint, 2022/09/14)
https://blog.checkpoint.com/2022/09/14/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index/
⇒ https://malware-log.hatenablog.com/entry/2022/09/14/000000_4
◆July 2022’s Most Wanted Malware: Emotet Takes Summer Vacation but Definitely Not ‘Out-of-Office’ (Checkpoint, 2022/08/10)
https://blog.checkpoint.com/2022/08/10/july-2022s-most-wanted-malware-emotet-takes-summer-vacation-but-definitely-not-out-of-office/
⇒ https://malware-log.hatenablog.com/entry/2022/08/10/000000_5
◆June 2022’s Most Wanted Malware: New Banking, MaliBot, Poses Danger for Users of Mobile Banking (CheckPoint, 2022/07/12)
https://blog.checkpoint.com/2022/07/12/june-2022s-most-wanted-malware-new-banking-malibot-poses-danger-for-users-of-mobile-banking/
⇒ https://malware-log.hatenablog.com/entry/2022/07/12/000000_4
◆May 2022’s Most Wanted Malware: Snake Keylogger returns to the index in eighth place following email campaigns delivering the malware via PDF files (CheckPoint, 2022/06/09)
[2022年5月の「Most Wanted Malware」。Snake Keylogger」が、PDFファイル経由でマルウェアを配信するメールキャンペーンを受け、8位でインデックスに返り咲く]
https://blog.checkpoint.com/2022/06/09/may-2022s-most-wanted-malware-snake-keylogger-returns-to-the-index-in-eighth-place-following-email-campaigns-delivering-the-malware-via-pdf-files/
⇒ https://malware-log.hatenablog.com/entry/2022/06/09/000000_2
◆March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance
https://blog.checkpoint.com/2022/04/12/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/
⇒ https://malware-log.hatenablog.com/entry/2022/04/12/000000_10
◆February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index (Check Point, 2022/03/09)
https://blog.checkpoint.com/2022/03/09/february-2022s-most-wanted-malware-emotet-remains-number-one-while-trickbot-slips-even-further-down-the-index/
⇒ https://malware-log.hatenablog.com/entry/2022/03/09/000000_13
◆January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot (Check Point, 2022/01/12)
https://blog.checkpoint.com/2022/01/12/december-2021s-most-wanted-malware-trickbot-emotet-and-the-log4j-plague/
⇒ https://malware-log.hatenablog.com/entry/2022/02/08/000000_3
◆December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague (Check Point, 2022/01/12)
https://blog.checkpoint.com/2022/01/12/december-2021s-most-wanted-malware-trickbot-emotet-and-the-log4j-plague/
⇒ https://malware-log.hatenablog.com/entry/2022/01/12/000000_5
■2021年
◆November 2021’s Most Wanted Malware: Emotet Returns to the Top 10 (Check Point, 2021/12/09)
https://blog.checkpoint.com/2021/12/09/november-2021s-most-wanted-malware-emotet-returns-to-the-top-10/
⇒ https://malware-log.hatenablog.com/entry/2021/12/09/000000_8
◆October 2021’s Most Wanted Malware: Trickbot Takes Top Spot for Fifth Time (Check Point, 2021/11/11)
https://blog.checkpoint.com/2021/11/11/october-2021s-most-wanted-malware-trickbot-takes-top-spot-for-fifth-time/
⇒ https://malware-log.hatenablog.com/entry/2021/11/11/000000_6
◆September 2021’s Most Wanted Malware: Trickbot Once Again Tops the List (Check Point, 2021/10/08)
https://blog.checkpoint.com/2021/10/08/september-2021s-most-wanted-malware-trickbot-once-again-tops-the-list/
⇒ https://malware-log.hatenablog.com/entry/2021/10/08/000000_13
◆August 2021’s Most Wanted Malware: Formbook Climbs into First Place (Checkpoint, 2021/09/10)
https://blog.checkpoint.com/2021/09/10/august-2021s-most-wanted-malware-formbook-climbs-into-first-place/
⇒ https://malware-log.hatenablog.com/entry/2021/09/10/000000_8
◆July 2021’s Most Wanted Malware: Snake Keylogger Enters Top 10 for First Time (Check Point, 2021/08/12)
https://blog.checkpoint.com/2021/08/12/july-2021s-most-wanted-malware-snake-keylogger-enters-top-10-for-first-time/
⇒ https://malware-log.hatenablog.com/entry/2021/08/12/000000_12
◆June 2021’s Most Wanted Malware: Trickbot Remains on Top (Check Point, 2021/07/13)
https://blog.checkpoint.com/2021/07/13/june-2021s-most-wanted-malware-trickbot-remains-on-top/
⇒ https://malware-log.hatenablog.com/entry/2021/07/13/000000_6
◆Check Point Software´s May 2021 Most Wanted Malware: Dridex Drops from List While Trickbot Rises to Top (Check Point, 2021/06/10)
https://blog.checkpoint.com/2021/06/10/check-point-softwares-may-2021-most-wanted-malware-dridex-drops-from-list-while-trickbot-rises-to-top/
⇒ https://malware-log.hatenablog.com/entry/2021/06/10/000000_14
◆April 2021’s Most Wanted Malware: Dridex Remains in Top Position Amidst Global Surge in Ransomware Attacks (Check Point, 2021/05/13)
https://blog.checkpoint.com/2021/05/13/april-2021s-most-wanted-malware-dridex-remains-in-top-position-amidst-global-surge-in-ransomware-attacks/
⇒ https://malware-log.hatenablog.com/entry/2021/05/13/000000_16
◆March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign (Check Point, 2021/04/13)
https://blog.checkpoint.com/2021/04/13/march-2021s-most-wanted-malware-icedid-banking-trojan-enters-top-10-following-covid-related-campaign/
⇒ https://malware-log.hatenablog.com/entry/2021/04/13/000000_8
◆February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown (Check Point, 2021/03/11)
https://blog.checkpoint.com/2021/03/11/february-2021s-most-wanted-malware-trickbot-takes-over-following-emotet-shutdown/
⇒ https://malware-log.hatenablog.com/entry/2021/03/11/000000_12
◆January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown (Check Point, 2021/02/11)
https://blog.checkpoint.com/2021/02/11/january-2021s-most-wanted-malware-emotet-continues-reign-as-top-malware-threat-despite-takedown/
⇒ https://malware-log.hatenablog.com/entry/2021/02/11/000000_6
◆December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat (Check Point, 2021/01/07)
https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/
⇒ https://malware-log.hatenablog.com/entry/2021/01/07/000000_3
■2020年
◆November 2020’s Most Wanted Malware: Notorious Phorpiex Botnet Returns As Most Impactful Infection (Check Point, 2020/12/09)
https://blog.checkpoint.com/2020/12/09/november-2020s-most-wanted-malware-notorious-phorpiex-botnet-returns-as-most-impactful-infection/
⇒ https://malware-log.hatenablog.com/entry/2020/12/09/000000_2
◆October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks (Check Point, 2020/11/06)
https://blog.checkpoint.com/2020/11/06/october-2020s-most-wanted-malware-trickbot-and-emotet-trojans-are-driving-spike-in-ransomware-attacks/
⇒ https://malware-log.hatenablog.com/entry/2020/11/06/000000_12
◆September 2020’s Most Wanted Malware: New Info-stealing Valak Variant Enters Top 10 Malware List For First Time (Check Point, 2020/10/07)
https://blog.checkpoint.com/2020/10/07/september-2020s-most-wanted-malware-new-info-stealing-valak-variant-enters-top-10-malware-list-for-first-time/
⇒ https://malware-log.hatenablog.com/entry/2020/10/07/000000_1
◆August 2020’s Most Wanted Malware: Evolved Qbot Trojan Ranks On Top Malware List For First Time (Check Point, 2020/09/09)
https://blog.checkpoint.com/2020/09/09/august-2020s-most-wanted-malware-evolved-qbot-trojan-ranks-on-top-malware-list-for-first-time/
⇒ https://malware-log.hatenablog.com/entry/2020/09/09/000000_6
◆July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence (Check Point, 2020/08/07)
https://blog.checkpoint.com/2020/08/07/julys-most-wanted-malware-emotet-strikes-again-after-five-month-absence/
⇒ https://malware-log.hatenablog.com/entry/2020/08/07/000000_8
◆June‘s Most Wanted Malware: Notorious Phorpiex Botnet Rises Again, Doubling Its Global Impact On Organizations (Check Point, 2020/07/10)
https://blog.checkpoint.com/2020/07/10/junes-most-wanted-malware-notorious-phorpiex-botnet-rises-again-doubling-its-global-impact-on-organizations/
⇒ https://malware-log.hatenablog.com/entry/2020/07/10/000000_5
◆January 2020’s Most Wanted Malware: Coronavirus-themed spam spreads malicious Emotet malware (Check Point, 2020/02/13)
https://blog.checkpoint.com/2020/02/13/january-2020s-most-wanted-malware-coronavirus-themed-spam-spreads-malicious-emotet-malware/
⇒ https://malware-log.hatenablog.com/entry/2020/02/13/000000
◆December 2019’s Most Wanted Malware: Greta Thunberg-themed Spam Used to Spread Emotet Malware (Check Point, 2020/01/13)
https://blog.checkpoint.com/2020/01/13/december-2019s-most-wanted-malware-greta-thunberg-themed-spam-used-to-spread-emotet-malware/
⇒ https://malware-log.hatenablog.com/entry/2020/01/13/000000
■2019年
◆November 2019’s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet’s Impact Declines (Check Point, 2019/12/11)
https://blog.checkpoint.com/2019/12/11/november-2019s-most-wanted-malware-researchers-warn-of-fast-growing-mobile-threat-while-emotets-impact-declines/
⇒ https://malware-log.hatenablog.com/entry/2019/12/11/000000_4
◆October 2019’s Most Wanted Malware: the Decline of Cryptominers Continues, as Emotet Botnet Expands Rapidly (Check Point, 2019/11/12)
https://blog.checkpoint.com/2019/11/12/october-2019s-most-wanted-malware-the-decline-of-cryptominers-continues-as-emotet-botnet-expands-rapidly/
⇒ https://malware-log.hatenablog.com/entry/2019/11/12/000000_8
◆September 2019’s Most Wanted Malware: Emotet Botnet Starts Spreading Spam Campaigns Again After Three-Month Silence (Check Point, 2019/10/10)
https://blog.checkpoint.com/2019/10/10/september-2019s-most-wanted-malware-emotet-botnet-starts-spreading-spam-campaigns-again-after-three-month-silence/
⇒ https://malware-log.hatenablog.com/entry/2019/11/12/000000_8
◆August 2019’s Most Wanted Malware: Echobot Launches Widespread Attack Against IoT Devices (Check point, 2019/09/12)
https://blog.checkpoint.com/2019/09/12/august-2019s-most-wanted-malware-echobot-launches-widespread-attack-against-iot-devices/
⇒ https://malware-log.hatenablog.com/entry/2019/09/12/000000_3
◆July 2019’s Most Wanted Malware: Vulnerability in OpenDreamBox 2.0.0 WebAdmin Plugin Enables Attackers to Execute Commands Remotely (CheckPoint, 2019/08/08)
https://blog.checkpoint.com/2019/08/08/july-2019s-most-wanted-malware-vulnerability-in-opendreambox-2-0-0-webadmin-plugin-enables-attackers-to-execute-commands-remotely/
⇒ https://malware-log.hatenablog.com/entry/2019/08/08/000000_8
◆May 2019’s Most Wanted Malware: Patch Now to Avoid the BlueKeep Blues (Check Point, 2019/06/13)
https://blog.checkpoint.com/2019/06/13/may-2019-most-wanted-malware-bluekeep-microsoft-rdp-cryptocurrency-malware/
⇒ https://malware-log.hatenablog.com/entry/2019/06/13/000000_8
◆April 2019’s Most Wanted Malware: Cybercriminals up to Old ‘TrickBots’ Again (Check Point, 2019/05/14)
https://blog.checkpoint.com/2019/05/14/april-2019s-most-wanted-malware-cybercriminals-up-to-old-trickbots-crypto-cryptomining-security-ryuk/
⇒ https://malware-log.hatenablog.com/entry/2019/05/14/000000_5
■2018年
◆November 2018’s Most Wanted Malware: The Rise of the Thanksgiving Day Botnet (Check Point, 2018/12/11)
https://blog.checkpoint.com/2018/12/11/november-2018s-most-wanted-malware-the-rise-of-the-thanksgiving-day-botnet/
⇒ http://malware-log.hatenablog.com/entry/2018/12/11/000000_4
◆October 2018’s Most Wanted Malware: For The First Time, Remote Access Trojan Reaches Top 10 Threats (Check Point, 2018/11/13)
https://blog.checkpoint.com/2018/11/13/october-2018s-most-wanted-malware-for-the-first-time-remote-access-trojan-reaches-top-threats-cryptomining/
⇒ http://malware-log.hatenablog.com/entry/2018/11/13/000000_11
◆September 2018’s Most Wanted Malware: Cryptomining Attacks Against Apple Devices On The Rise (Check Point, 2018/10/15)
https://blog.checkpoint.com/2018/10/15/september-2018s-most-wanted-malware-cryptomining-attacks-against-apple-devices-on-the-rise/
⇒ http://malware-log.hatenablog.com/entry/2018/10/15/000000_9
◆August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat (Check Point, 2018/09/11)
https://blog.checkpoint.com/2018/09/11/augusts-most-wanted-malware-banking-trojan-attacks-turn-up-the-heat/
⇒ http://malware-log.hatenablog.com/entry/2018/09/11/000000_11
◆June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors (Check Point, 2018/07/05)
https://blog.checkpoint.com/2018/07/05/junes-most-wanted-malware-banking-trojans-crypto-mining/
⇒ http://malware-log.hatenablog.com/entry/2018/07/05/000000_7
◆May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally (Check Point, 2018/06/07)
https://blog.checkpoint.com/2018/06/07/mays-wanted-malware/
⇒ http://malware-log.hatenablog.com/entry/2018/06/07/000000_8
【ニュース】
■2023年
◆1月マルウェアランキング、Qbotが引き続きトップ (マイナビニュース, 2023/02/18 19:41)
https://news.mynavi.jp/techplus/article/20230218-2592854/
⇒ https://malware-log.hatenablog.com/entry/2023/02/18/000000_2
■2022年
◆8月マルウェアランキング、Emotetに代わる新脅威FormBookに注意 (マイナビニュース, 2022/09/16 09:37)
https://news.mynavi.jp/techplus/article/20220916-2455556/
⇒ https://malware-log.hatenablog.com/entry/2022/09/16/000000_1
◆1月マルウェアランキング、Emotetが首位に返り咲き (マイナビニュース, 2022/02/13 20:39)
https://news.mynavi.jp/techplus/article/20220213-2270186/
⇒ https://malware-log.hatenablog.com/entry/2022/02/13/000000
■2020年
◆Phorpiexボットネット用いた攻撃が再び急増 - 6月マルウェアランキング (マイナビニュース, 2020/07/14 10:28)
https://news.biglobe.ne.jp/it/0714/mnn_200714_2411409590.html
⇒ https://malware-log.hatenablog.com/entry/2020/07/14/000000_2
■2019年
◆トロイの木馬「Emotet」が第1位 - 10月マルウェアランキング (マイナビニュース, 2019/11/14 07:17)
https://news.mynavi.jp/article/20191114-923038/
◆暗号通貨マイナーのXMRigが1位、7月マルウェアランキング (マイナビニュース, 2019/08/11 10:38)
https://news.mynavi.jp/article/20190811-874793/
⇒ https://malware-log.hatenablog.com/entry/2019/08/11/000000
◆大規模ボットネットが息を潜めてアップグレード、6月マルウェアランキング (マイナビニュース, 2019/07/11 10:55)
https://news.mynavi.jp/article/20190711-857435/
⇒ https://malware-log.hatenablog.com/entry/2019/07/11/000000_1
◆確定申告狙うトロイの木馬に注目 - 4月マルウェアランキング (マイナビニュース, 2019/05/15)
https://news.mynavi.jp/article/20190515-823710/
⇒ https://malware-log.hatenablog.com/entry/2019/05/15/000000_9
◆仮想通貨マイニング「Coinhive」6位に陥落 - 3月マルウェアランキング (マイナビニュース, 2019/04/12 10:10)
https://news.mynavi.jp/article/20190412-807242/
⇒ http://malware-log.hatenablog.com/entry/2019/04/12/000000_12
◆2月マルウェアランキング - 今月もCoinhiveが第1位 (マイナビニュース, 2019/03/14 13:16)
https://news.mynavi.jp/article/20190314-788138/
◆1月マルウェアランキング、Linuxサーバ狙う新マルウェア観測 (マイナビニュース, 2019/02/15 07:15)
https://news.mynavi.jp/article/20190215-771452/
⇒ http://malware-log.hatenablog.com/entry/2019/02/15/000000
◆仮想通貨マイニングが上位独占 - 12月マルウェアランキング (マイナビニュース, 2019/01/15 13:45)
https://news.mynavi.jp/article/20190115-756719/
⇒ http://malware-log.hatenablog.com/entry/2019/01/15/000000_5
■2019年
◆トロイの木馬が再活性化 - 8月マルウェアランキング (マイナビニュース, 2018/09/13 11:15)
https://news.mynavi.jp/article/20180913-692140/
⇒ http://malware-log.hatenablog.com/entry/2018/09/13/000000
◆IoTを対象とした攻撃増加、7月マルウェアランキング (マイナビニュース, 2018/08/17 10:20)
https://news.mynavi.jp/article/20180817-679298/
⇒ http://malware-log.hatenablog.com/entry/2018/08/17/000000
◆バンキング型トロイの木馬が増加 - 6月マルウェアランキング (マイナビニュース, 2018/07/06 12:47)
https://news.mynavi.jp/article/20180706-660076/
⇒ http://malware-log.hatenablog.com/entry/2018/07/06/000000_6
【関連まとめ記事】
◆資料・報告書 (まとめ)
https://malware-log.hatenablog.com/entry/Report