TT Malware Log

マルウェア / サイバー攻撃 / 解析技術 に関する「個人」の調査・研究・参照ログ

Check Point マルウェアランキング (まとめ)

vul.hatenadiary.com


【図表】


過去12か月の順位推移(マルウェアファミリー)

過去12か月の順位推移(モバイルマルウェア)
出典: https://blog.checkpoint.com/research/december-2023s-most-wanted-malware-the-resurgence-of-qbot-and-fakeupdates/ のデータを元に独自に作表


【ランキング】

■マルウェア

2024年2023年2022年2021年2020年2019年2018年
備考
順位
マルウェア名
3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12 月 11 月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月
1 Fakeupdates 1 1 1 1 2 3 8
2 Qbot 2 2 2 1 1 1 1 2 1 1 1 1 3 9 7 9 5 5 3 8 6 10 6 6 10 トロイの木馬
3 Formbook 3 3 3 2 1 1 1 2 2 2 2 3 3 2 4 4 6 7 1 1 2 2 2 2 2 3 3 3 9 2 1 4 3 3 6 8 4 6 3 4 5 3 5 9 4 7 7 8 5 8 4 9 4 9 9 9 インフォスティーラ
4 Remcos 4 6 6 4 3 3 2 6 3 7 10 9 7 8 7 10 10 7 5 6 10 10 8 7 6 5 3 6 6 9 ボット(ボットネット)
5 Agent Tesla 5 8 10 6 5 6 7 6 3 1 4 5 3 9 1 1 3 2 7 4 3 3 2 4 4 4 2 7 4 3 8 5 4 2 4 4 2 3 1 2 3 6 6 4 4 9 8 3 5 6 10 7 Rat
6 AsyncRat 6 4 5 5 6 10
7 CloudEye(Guloader) 7 10 5 8 7 4 4 5 6 6 8 4 ダウンローダー
8 Nanocore 8 5 4 3 4 4 4 4 5 8 9 7 10 7 9 5 10 10 7 9 5 8
9 njRAT 9 9 8 7 2 6 5 6 10 7 8 10 9 6 6 10 10 10 Rat
10 Phorpiex 10 9 7 7 10 8 9 9 8 10 10 10 7 10 10 7 9 8 7 9 9 10 9 10 8 8 10 5 2 1 2 ボット(ボットネット)
- Tofsee 7 9 10 9 9 9 10 5 7 8 7
- Ramnit 8 9 9 10 6 8 8 5 9 4 8 7 7 5 7 8 8 8 6 8 7 6 6 7 9 8 10 9 10 8 6 8 6 8 6 9 7 6 6 6 6 9 6 8 6 5 6 7 10 10 8 8 7 6 10 10 バンキングマルウェア(トロイの木馬)
- Glupteba 10 8 9 6 5 4 3 6 5 4 4 5 5 5 4 6 8 10 6 10 7 7 9 8 9 10 10 バックドア
- Mirai 8 7 8 9 10 9 6 7 10
- Emotet 5 3 7 4 3 5 4 2 3 6 2 2 6 4 5 1 1 1 1 1 1 1 2 7 1 1 5 1 1 1 1 7 6 9 5 2 1 1 1 1 5 7 4 5 4 4 2 3 5 5 7 10 トロイの木馬
- ChromeLoader 10
- XMRig 5 6 6 5 4 5 3 5 5 2 3 3 5 5 4 3 5 5 7 6 2 3 4 3 2 2 4 7 2 5 5 7 7 5 5 6 3 3 2 1 1 2 2 2 2 2 1 1 1 2 2 3 4 2 2 9 7 8 7 7 7 7 インフォスティーラ
- Lokibot 9 8 2 4 6 10 5 3
- Vidar 7 10 9 7 7
- Snake Keylogger 4 2 6 8 8 3 8 8 2 キーロガー(.Net)
- IcedID 7 4 10 2 バンキングマルウェア(トロイの木馬)
- Raspberry Robin 9 ワーム
- Trickbot 6 2 1 1 1 1 2 1 1 1 3 6 1 3 2 6 2 2 4 4 5 7 5 4 4 3 3 3 3 6 4 7 10 8 8
- Dridex 9 1 1 7 4 4 2 4 3 2 4 1 1 3
- Floxif 9 9 10 10
- Ursnif 8 9 5
- xHelper 9 9 8 10 10 8
- RigEK 9 9 8 8 10 8 10 10 10 7
- Hiddad 7 7 3 3
- Zloader 9 8
- Valak 9
- NetwiredRC 10
- Lokibot 10 8 5 8 5 7 10 10 6 10 9 8
- JSEcoin 4 2 3 4 1 2 2 2 3 3 5 5 4 3 6 6 5 5 5 6 4
- Hawkeye 9 7
- Dorkbot 5 5 8 3 3 4 7 5 4 6 7 7 5 3 2 2 3 3 8
- Cryptoloot 10 7 8 10 3 1 1 1 2 3 4 2 2 3 4 2 2 2
- Nivdort 9 8 7 6 6 10 10 8
- Sality 9
- Coinhive 6 1 1 1 1 1 1 1 1 1 1
- Gandcrab 8 9
- Authedmine 9 10
- Smokeloader 9
- Andromeda 3 5 4 3 4 4 5
- Roughted 4 4 6 8 6 5 3
- Conficker 8 9 9 9 8 10
- FlawedAmmyy RAT 10
- Fireball 6
- Necurs 9


■脆弱性

2024年2023年2022年2021年2020年
備考
順位
脆弱性
3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月
1 Web Servers Malicious URL Directory Traversal 1 1 2 2 2 3 1 8 1 1 1 1 5 1 2 1 4 5 3 3 3 1 4 Directory Traversal
2 Command Injection Over HTTP 2 2 1 4 1 2 2 2 8 8 8 4 8 5 4 3 4 5 3 5 4 5 6 9 CVE-2021-43936,CVE-2022-24086
3 HTTP Headers Remote Code Execution 3 4 3 9 5 1 3 3 3 3 2 4 2 4 3 3 4 4 5 4 4 5 3 2 2 2 1 3 4 6 5 6 CVE-2020-13756 など
4 Zyxel ZyWALL Command Injection 4 3 3 3 1 3 CVE-2023-28771
5 Apache Struts2 ContentType Remote Code Execution 5 5 6 8 6 6 6 5 10 8 6 3 CVE-2017-5638
6 WordPress portable-phpMyAdmin Plugin Authentication Bypass 6 8 7 6 5 4 9 9 9 10 10 9 5 9 8 8 10 10 7 8 9 8 10 6 10 7 7 8 9 8 7 6 7 5 7 6 10 CVE-2012-5469
7 PHP Easter Egg Information Disclosure 7 6 7 5 7 8 6 5 7 7 9 9 7 7 7 7 7 7 7 8 10 9 10 7
8 MVPower CCTV DVR Remote Code Execution 8 6 8 7 5 3 5 5 CVE-2016-20016
9 Dasan GPON Router Authentication Bypass 9 7 4 4 4 5 7 6 8 6 6 5 9 9 8 8 9 8 4 3 4 3 2 2 3 4 4 4 4 5 4 4 7 9 CVE-2012-5469
10 OpenSSL TLS DTLS Heartbeat Information Disclosure 10 10 8 10 10 9 10 10 10 7 6 4 10 9 6 5 3 5 2 1 2 2 3 2 5 6 2 2 5 2 2 2 3 1 3
- Apache Log4j Remote Code Execution 7 4 1 4 4 2 2 2 2 1 3 8 10 2 2 1 2 1 2 2 1 Apache Log4j, CVE-2021-44228
- D-LINK Multiple Products Remote Code Execution 9 10 6 6 8 9 9 9 6 CVE-2015-2051
- Apache HTTP Server Directory Traversal 5 10 CVE-2021-41773
- TP-Link TL-WR840N/TL-WR841N Authentication Bypass 6
- Atlassian Confluence Template Injection 8 CVE-2023-22527
- Muieblackcat PHP Scanner 9 10 10 9
- Atlassian Confluence Server Arbitrary File Read 10 CVE-2021-26085
- PHPUnit Command Injection 9 6 8 7 10 9 10 8 6 9 6 10 CVE-2017-9841
- ZTE F460/F660 Backdoor Unauthorized Access 9 10
- F5 BIG-IP Remote Code Execution 6 6 10
- MVPower DVR Remote Code Execution 4 5 3 6 3 5 6 6 6 7 7 7 5 7 5 3 1 1 2 1 1 2 1 2 1 1 1 1 1 2 3 3 1 3 3
- Web Server Exposed Git Repository Information Disclosure 2 1 1 2 1 1 2 1 2 3 1 2 1 5 3 4 7 5 1 7 3 3 4 7 2 3 5 3 8 4 4 2 2 Git Repository
- NoneCMS ThinkPHP Remote Code Execution 10 10 5 2 1 CVE-2018-20062
- Microsoft Windows HTTP.sys Remote Code Execution 8 6 CVE-2015-1635
- PHP phpcgi Query String Parameter Code Execution 10 10 10 9 9 2 6
- Apache Struts ParametersInterceptor ClassLoader Security Bypass 6 3
- WordPress portablephpMyAdmin Plugin Authentication Bypass 7 8 9 8 10 6 10 7 7 8 9 8 7 6 7 5 7 6 10 CVE-2012-5469
- Command Injection Over HTTP Payload 6 5 4 5 5 8 9 3 3 9 8 1 4 8 6 4 7
- Linux System Files Information Disclosure 9 7 2 CVE-2018-3948, CVE-2018-3948, CVE-2022-23119
- SQL Injection (several techniques) 6 6 8 8 8 8 8 8 5 5 9 5 7 4 1 1 4 1 1 1 1
- Draytek Vigor Command Injection 7 7 9 7 4 6 4 CVE-2020-8515
- PHP DIESCAN information disclosure 8 9 10 9 7 6 8 3 3 9 6 4 8 7 6 5 7
- w00tw00t security scanner 9 10
- WordPress xmlrpc Weak Password Access Attempt 7
- OpenSSL Padding Oracle Information Disclosure 8 8 9 10 10 9 CVE-2016-2107
- HP Universal CMDB Default Credentials Arbitrary File Upload 10 CVE-2014-2617
- Draytek Vigor Command Injection 5 CVE-2020-8515
- DLink DSL2750B Remote Command Execution 10 8 7 10 5 10 10 9 9 8
- Joomla Object Injection Remote Command Execution 10 10 8 7 9 6 5 3 4
- Huawei HG532 Router Remote Code Execution 6
- Web Server Enforcement Violation 10
- Hikvision IP Cameras Information Disclosure 9
- OpenDreamBox WebAdmin Plugin Remote Code Execution 8
- Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow 10 5 2 1 CVE-2017-7269


■モバイルマルウェア

2024年2023年2022年2021年2020年
備考
順位 マルウェア名 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月 3月 2月 1月 12月 11月 10月 9月 8月 7月 6月 5月 4月
1 Anubis 1 1 1 1 1 1 1 1 1 2 1 2 2 1 1 1 1 1 1 2 2 2 バンキングマルウェア
2 AhMyth 2 2 2 2 2 2 2 2 3 3 2 1 1 3 3 Rat
3 Cerberus 3
- Hydra 3 3 3 3 2 2 2 バンキングマルウェア
- SpinOK 3 3 3 2 1
- Hiddad 3 3 3 2 2 2 1 1 1 1 1 3 3 2 3 2 3 3 3 2 3
- AlienBot 3 3 1 1 1 1 1 1 2 Android の MaaS
- Joker 3 3 3
- MasilBot 3 3 Android インフォスティーラー
- FluBot 2 2 3 Android ボットネット
- xHelper 3 3 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1
- FurBall 3 3
- Triada 3 3 3 2 3 1
- Lotoor 3 3 3 2 3 3 2 1 1 1 1 1 2
- Necro 2 2 1 2
- PreAmo 3 1
- AndroidBauts 3 2 3 2 2 2
- Guerrilla 3 2 2 2 1
- Piom 3
- Xafekopy 3
- Ztorg 3


【ブログ】

■2024年

◆March 2024’s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos (Check Point, 2024/04/09)
https://blog.checkpoint.com/security/march-2024s-most-wanted-malware-hackers-discover-new-infection-chain-method-to-deliver-remcos/
https://malware-log.hatenablog.com/entry/2024/04/09/000000

◆February 2024’s Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign (Check Point, 2024/03/11)
https://blog.checkpoint.com/research/february-2024s-most-wanted-malware-wordpress-websites-targeted-by-fresh-fakeupdates-campaign/
https://malware-log.hatenablog.com/entry/2024/03/11/000000_3

◆January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats (Check Point, 2024/02/09)
https://blog.checkpoint.com/research/january-2024s-most-wanted-malware-major-vextrio-broker-operation-uncovered-and-lockbit3-tops-the-ransomware-threats/
https://malware-log.hatenablog.com/entry/2024/02/09/000000_4


■2023年

◆December 2023’s Most Wanted Malware: The Resurgence of Qbot and FakeUpdates (Check Point, 2024/01/09)
[2023年12月の最重要マルウェア: QbotとFakeUpdatesの復活]
https://blog.checkpoint.com/research/december-2023s-most-wanted-malware-the-resurgence-of-qbot-and-fakeupdates/
https://malware-log.hatenablog.com/entry/2024/01/09/000000

◆November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus (Check Point, 2023/12/12)
[2023年11月の最重要マルウェア: 新たなAsyncRATキャンペーンが発見される一方、FakeUpdatesが一時停止していたトップ10に再ランクイン]
https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/
https://malware-log.hatenablog.com/entry/2023/12/12/000000_1

◆October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign (Check Point, 2024/11/08)
https://blog.checkpoint.com/security/october-2023s-most-wanted-malware-njrat-jumps-to-second-place-while-agenttesla-spreads-through-new-file-sharing-mal-spam-campaign/
https://malware-log.hatenablog.com/entry/2023/11/08/000000_2

◆September 2023’s Most Wanted Malware: Remcos Wreaks Havoc in Colombia and Formbook Takes Top Spot after Qbot Shutdown(Check Point, 2023/10/06)
[2023年9月の最重要マルウェア: Remcosがコロンビアで大惨事を引き起こし、Qbotのシャットダウン後にFormbookが首位を獲得]
https://blog.checkpoint.com/security/september-2023s-most-wanted-malware-remcos-wreaks-havoc-in-colombia-and-formbook-takes-top-spot-after-qbot-shutdown/
https://malware-log.hatenablog.com/entry/2023/10/06/000000_1

◆August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI (Check Point, 2023/09/11)
https://blog.checkpoint.com/security/august-2023s-most-wanted-malware-new-chromeloader-campaign-spreads-malicious-browser-extensions-while-qbot-is-shut-down-by-fbi/
https://malware-log.hatenablog.com/entry/2023/09/11/000000_3

◆July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot (Check Point, 2023/08/09)
[2023年7月の最重要マルウェア: リモートアクセス型トロイの木馬(RAT)「Remcos」が3位に上昇、モバイルマルウェア「Anubis」がトップに返り咲く]
https://blog.checkpoint.com/security/july-2023s-most-wanted-malware-remote-access-trojan-rat-remcos-climbs-to-third-place-while-mobile-malware-anubis-returns-to-top-spot/
https://malware-log.hatenablog.com/entry/2023/08/09/000000_7

◆June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut (Check Point, 2023/07/06)
[2023年6月の最重要マルウェア: 2023年上半期に最も流行したマルウェアはQbot、モバイル型トロイの木馬SpinOkが初登場]
https://blog.checkpoint.com/security/june-2023s-most-wanted-malware-qbot-most-prevalent-malware-in-first-half-of-2023-and-mobile-trojan-spinok-makes-its-debut/
https://malware-log.hatenablog.com/entry/2023/07/06/000000_13

◆May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads (Check Point, 2023/06/09)
[2023年5月の最重要指名手配マルウェア: Guloaderの新バージョン、暗号化されたクラウドベースのペイロードを配信]
https://blog.checkpoint.com/security/may-2023s-most-wanted-malware-new-version-of-guloader-delivers-encrypted-cloud-based-payloads/
https://malware-log.hatenablog.com/entry/2023/06/09/000000_1

◆April 2023’s Most Wanted Malware: Qbot Launches Substantial Malspam Campaign and Mirai Makes its Return (Check Point, 2023/05/11)
[2023年4月の最重要マルウェア: Qbotが大規模なマルスパムキャンペーンを開始、そしてMiraiが再登場]
https://blog.checkpoint.com/security/april-2023s-most-wanted-malware-qbot-launches-substantial-malspam-campaign-and-mirai-makes-its-return/
https://malware-log.hatenablog.com/entry/2023/05/11/000000_4

◆March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files (Check Point, 2023/04/10)
[2023年3月の最重要指名手配マルウェア: 新しいEmotetキャンペーン、マイクロソフトのブロックを回避して悪意のあるOneNoteファイルを配布]
https://blog.checkpoint.com/security/march-2023s-most-wanted-malware-new-emotet-campaign-bypasses-microsoft-blocks-to-distribute-malicious-onenote-files/
https://malware-log.hatenablog.com/entry/2023/04/10/000000_2

◆February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government (Check Point, 2023/03/09)
[2023年2月の最重要指名手配マルウェア: ウクライナ政府に対するサイバースパイ活動に関連するRemcosトロイの木馬]
https://blog.checkpoint.com/2023/03/09/february-2023s-most-wanted-malware-remcos-trojan-linked-to-cyberespionage-operations-against-ukrainian-government/
https://malware-log.hatenablog.com/entry/2023/03/09/000000_4

◆January 2023’s Most Wanted Malware: Infostealer Vidar Makes a Return while Earth Bogle njRAT Malware Campaign Strikes (Check Point, 2023/02/13)
[2023年1月 最も注目すべきマルウェア:Infostealer Vidarが再登場、Earth Bogle njRATマルウェア・キャンペーンが襲来]
https://blog.checkpoint.com/2023/02/13/january-2023s-most-wanted-malware-infostealer-vidar-makes-a-return-while-earth-bogle-njrat-malware-campaign-strikes/
https://malware-log.hatenablog.com/entry/2023/02/13/000000_2


■2022年

◆December 2022’s Most Wanted Malware: Glupteba Entering Top Ten and Qbot in First Place (Check Point, 2023/01/13)
[2022年12月の「Most Wanted Malware」。Gluptebaがトップ10入り、Qbotが1位を獲得]
https://blog.checkpoint.com/2023/01/13/december-2022s-most-wanted-malware-glupteba-entering-top-ten-and-qbot-in-first-place/
https://malware-log.hatenablog.com/entry/2023/01/13/000000_2

◆September 2022’s Most Wanted Malware: Formbook on Top While Vidar ‘Zooms’ Seven Places (Checkpoint, 2022/10/12)
[2022年9月の「Most Wanted Malware」。Formbookがトップに、Vidarは7位に急上昇]
https://blog.checkpoint.com/2022/10/12/september-2022s-most-wanted-malware-formbook-on-top-while-vidar-zooms-seven-places/
https://malware-log.hatenablog.com/entry/2022/10/12/000000_5

◆August’s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index (Checkpoint, 2022/09/14)
https://blog.checkpoint.com/2022/09/14/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index/
https://malware-log.hatenablog.com/entry/2022/09/14/000000_4

◆July 2022’s Most Wanted Malware: Emotet Takes Summer Vacation but Definitely Not ‘Out-of-Office’ (Checkpoint, 2022/08/10)
https://blog.checkpoint.com/2022/08/10/july-2022s-most-wanted-malware-emotet-takes-summer-vacation-but-definitely-not-out-of-office/
https://malware-log.hatenablog.com/entry/2022/08/10/000000_5

◆June 2022’s Most Wanted Malware: New Banking, MaliBot, Poses Danger for Users of Mobile Banking (CheckPoint, 2022/07/12)
https://blog.checkpoint.com/2022/07/12/june-2022s-most-wanted-malware-new-banking-malibot-poses-danger-for-users-of-mobile-banking/
https://malware-log.hatenablog.com/entry/2022/07/12/000000_4

◆May 2022’s Most Wanted Malware: Snake Keylogger returns to the index in eighth place following email campaigns delivering the malware via PDF files (CheckPoint, 2022/06/09)
[2022年5月の「Most Wanted Malware」。Snake Keylogger」が、PDFファイル経由でマルウェアを配信するメールキャンペーンを受け、8位でインデックスに返り咲く]
https://blog.checkpoint.com/2022/06/09/may-2022s-most-wanted-malware-snake-keylogger-returns-to-the-index-in-eighth-place-following-email-campaigns-delivering-the-malware-via-pdf-files/
https://malware-log.hatenablog.com/entry/2022/06/09/000000_2

◆March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance
https://blog.checkpoint.com/2022/04/12/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/
https://malware-log.hatenablog.com/entry/2022/04/12/000000_10

◆February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index (Check Point, 2022/03/09)
https://blog.checkpoint.com/2022/03/09/february-2022s-most-wanted-malware-emotet-remains-number-one-while-trickbot-slips-even-further-down-the-index/
https://malware-log.hatenablog.com/entry/2022/03/09/000000_13

◆January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot (Check Point, 2022/01/12)
https://blog.checkpoint.com/2022/01/12/december-2021s-most-wanted-malware-trickbot-emotet-and-the-log4j-plague/
https://malware-log.hatenablog.com/entry/2022/02/08/000000_3

◆December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague (Check Point, 2022/01/12)
https://blog.checkpoint.com/2022/01/12/december-2021s-most-wanted-malware-trickbot-emotet-and-the-log4j-plague/
https://malware-log.hatenablog.com/entry/2022/01/12/000000_5


■2021年

◆November 2021’s Most Wanted Malware: Emotet Returns to the Top 10 (Check Point, 2021/12/09)
https://blog.checkpoint.com/2021/12/09/november-2021s-most-wanted-malware-emotet-returns-to-the-top-10/
https://malware-log.hatenablog.com/entry/2021/12/09/000000_8

◆October 2021’s Most Wanted Malware: Trickbot Takes Top Spot for Fifth Time (Check Point, 2021/11/11)
https://blog.checkpoint.com/2021/11/11/october-2021s-most-wanted-malware-trickbot-takes-top-spot-for-fifth-time/
https://malware-log.hatenablog.com/entry/2021/11/11/000000_6

◆September 2021’s Most Wanted Malware: Trickbot Once Again Tops the List (Check Point, 2021/10/08)
https://blog.checkpoint.com/2021/10/08/september-2021s-most-wanted-malware-trickbot-once-again-tops-the-list/
https://malware-log.hatenablog.com/entry/2021/10/08/000000_13

◆August 2021’s Most Wanted Malware: Formbook Climbs into First Place (Checkpoint, 2021/09/10)
https://blog.checkpoint.com/2021/09/10/august-2021s-most-wanted-malware-formbook-climbs-into-first-place/
https://malware-log.hatenablog.com/entry/2021/09/10/000000_8

◆July 2021’s Most Wanted Malware: Snake Keylogger Enters Top 10 for First Time (Check Point, 2021/08/12)
https://blog.checkpoint.com/2021/08/12/july-2021s-most-wanted-malware-snake-keylogger-enters-top-10-for-first-time/
https://malware-log.hatenablog.com/entry/2021/08/12/000000_12

◆June 2021’s Most Wanted Malware: Trickbot Remains on Top (Check Point, 2021/07/13)
https://blog.checkpoint.com/2021/07/13/june-2021s-most-wanted-malware-trickbot-remains-on-top/
https://malware-log.hatenablog.com/entry/2021/07/13/000000_6

◆Check Point Software´s May 2021 Most Wanted Malware: Dridex Drops from List While Trickbot Rises to Top (Check Point, 2021/06/10)
https://blog.checkpoint.com/2021/06/10/check-point-softwares-may-2021-most-wanted-malware-dridex-drops-from-list-while-trickbot-rises-to-top/
https://malware-log.hatenablog.com/entry/2021/06/10/000000_14

◆April 2021’s Most Wanted Malware: Dridex Remains in Top Position Amidst Global Surge in Ransomware Attacks (Check Point, 2021/05/13)
https://blog.checkpoint.com/2021/05/13/april-2021s-most-wanted-malware-dridex-remains-in-top-position-amidst-global-surge-in-ransomware-attacks/
https://malware-log.hatenablog.com/entry/2021/05/13/000000_16

◆March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign (Check Point, 2021/04/13)
https://blog.checkpoint.com/2021/04/13/march-2021s-most-wanted-malware-icedid-banking-trojan-enters-top-10-following-covid-related-campaign/
https://malware-log.hatenablog.com/entry/2021/04/13/000000_8

◆February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown (Check Point, 2021/03/11)
https://blog.checkpoint.com/2021/03/11/february-2021s-most-wanted-malware-trickbot-takes-over-following-emotet-shutdown/
https://malware-log.hatenablog.com/entry/2021/03/11/000000_12

◆January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown (Check Point, 2021/02/11)
https://blog.checkpoint.com/2021/02/11/january-2021s-most-wanted-malware-emotet-continues-reign-as-top-malware-threat-despite-takedown/
https://malware-log.hatenablog.com/entry/2021/02/11/000000_6

◆December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat (Check Point, 2021/01/07)
https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/
https://malware-log.hatenablog.com/entry/2021/01/07/000000_3


■2020年

◆November 2020’s Most Wanted Malware: Notorious Phorpiex Botnet Returns As Most Impactful Infection (Check Point, 2020/12/09)
https://blog.checkpoint.com/2020/12/09/november-2020s-most-wanted-malware-notorious-phorpiex-botnet-returns-as-most-impactful-infection/
https://malware-log.hatenablog.com/entry/2020/12/09/000000_2

◆October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks (Check Point, 2020/11/06)
https://blog.checkpoint.com/2020/11/06/october-2020s-most-wanted-malware-trickbot-and-emotet-trojans-are-driving-spike-in-ransomware-attacks/
https://malware-log.hatenablog.com/entry/2020/11/06/000000_12

◆September 2020’s Most Wanted Malware: New Info-stealing Valak Variant Enters Top 10 Malware List For First Time (Check Point, 2020/10/07)
https://blog.checkpoint.com/2020/10/07/september-2020s-most-wanted-malware-new-info-stealing-valak-variant-enters-top-10-malware-list-for-first-time/
https://malware-log.hatenablog.com/entry/2020/10/07/000000_1

◆August 2020’s Most Wanted Malware: Evolved Qbot Trojan Ranks On Top Malware List For First Time (Check Point, 2020/09/09)
https://blog.checkpoint.com/2020/09/09/august-2020s-most-wanted-malware-evolved-qbot-trojan-ranks-on-top-malware-list-for-first-time/
https://malware-log.hatenablog.com/entry/2020/09/09/000000_6

◆July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence (Check Point, 2020/08/07)
https://blog.checkpoint.com/2020/08/07/julys-most-wanted-malware-emotet-strikes-again-after-five-month-absence/
https://malware-log.hatenablog.com/entry/2020/08/07/000000_8

◆June‘s Most Wanted Malware: Notorious Phorpiex Botnet Rises Again, Doubling Its Global Impact On Organizations (Check Point, 2020/07/10)
https://blog.checkpoint.com/2020/07/10/junes-most-wanted-malware-notorious-phorpiex-botnet-rises-again-doubling-its-global-impact-on-organizations/
https://malware-log.hatenablog.com/entry/2020/07/10/000000_5

◆January 2020’s Most Wanted Malware: Coronavirus-themed spam spreads malicious Emotet malware (Check Point, 2020/02/13)
https://blog.checkpoint.com/2020/02/13/january-2020s-most-wanted-malware-coronavirus-themed-spam-spreads-malicious-emotet-malware/
https://malware-log.hatenablog.com/entry/2020/02/13/000000

◆December 2019’s Most Wanted Malware: Greta Thunberg-themed Spam Used to Spread Emotet Malware (Check Point, 2020/01/13)
https://blog.checkpoint.com/2020/01/13/december-2019s-most-wanted-malware-greta-thunberg-themed-spam-used-to-spread-emotet-malware/
https://malware-log.hatenablog.com/entry/2020/01/13/000000


■2019年

◆November 2019’s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet’s Impact Declines (Check Point, 2019/12/11)
https://blog.checkpoint.com/2019/12/11/november-2019s-most-wanted-malware-researchers-warn-of-fast-growing-mobile-threat-while-emotets-impact-declines/
https://malware-log.hatenablog.com/entry/2019/12/11/000000_4

◆October 2019’s Most Wanted Malware: the Decline of Cryptominers Continues, as Emotet Botnet Expands Rapidly (Check Point, 2019/11/12)
https://blog.checkpoint.com/2019/11/12/october-2019s-most-wanted-malware-the-decline-of-cryptominers-continues-as-emotet-botnet-expands-rapidly/
https://malware-log.hatenablog.com/entry/2019/11/12/000000_8

◆September 2019’s Most Wanted Malware: Emotet Botnet Starts Spreading Spam Campaigns Again After Three-Month Silence (Check Point, 2019/10/10)
https://blog.checkpoint.com/2019/10/10/september-2019s-most-wanted-malware-emotet-botnet-starts-spreading-spam-campaigns-again-after-three-month-silence/
https://malware-log.hatenablog.com/entry/2019/11/12/000000_8

◆August 2019’s Most Wanted Malware: Echobot Launches Widespread Attack Against IoT Devices (Check point, 2019/09/12)
https://blog.checkpoint.com/2019/09/12/august-2019s-most-wanted-malware-echobot-launches-widespread-attack-against-iot-devices/
https://malware-log.hatenablog.com/entry/2019/09/12/000000_3

◆July 2019’s Most Wanted Malware: Vulnerability in OpenDreamBox 2.0.0 WebAdmin Plugin Enables Attackers to Execute Commands Remotely (CheckPoint, 2019/08/08)
https://blog.checkpoint.com/2019/08/08/july-2019s-most-wanted-malware-vulnerability-in-opendreambox-2-0-0-webadmin-plugin-enables-attackers-to-execute-commands-remotely/
https://malware-log.hatenablog.com/entry/2019/08/08/000000_8

◆May 2019’s Most Wanted Malware: Patch Now to Avoid the BlueKeep Blues (Check Point, 2019/06/13)
https://blog.checkpoint.com/2019/06/13/may-2019-most-wanted-malware-bluekeep-microsoft-rdp-cryptocurrency-malware/
https://malware-log.hatenablog.com/entry/2019/06/13/000000_8

◆April 2019’s Most Wanted Malware: Cybercriminals up to Old ‘TrickBots’ Again (Check Point, 2019/05/14)
https://blog.checkpoint.com/2019/05/14/april-2019s-most-wanted-malware-cybercriminals-up-to-old-trickbots-crypto-cryptomining-security-ryuk/
https://malware-log.hatenablog.com/entry/2019/05/14/000000_5


■2018年

◆November 2018’s Most Wanted Malware: The Rise of the Thanksgiving Day Botnet (Check Point, 2018/12/11)
https://blog.checkpoint.com/2018/12/11/november-2018s-most-wanted-malware-the-rise-of-the-thanksgiving-day-botnet/
http://malware-log.hatenablog.com/entry/2018/12/11/000000_4

◆October 2018’s Most Wanted Malware: For The First Time, Remote Access Trojan Reaches Top 10 Threats (Check Point, 2018/11/13)
https://blog.checkpoint.com/2018/11/13/october-2018s-most-wanted-malware-for-the-first-time-remote-access-trojan-reaches-top-threats-cryptomining/
http://malware-log.hatenablog.com/entry/2018/11/13/000000_11

◆September 2018’s Most Wanted Malware: Cryptomining Attacks Against Apple Devices On The Rise (Check Point, 2018/10/15)
https://blog.checkpoint.com/2018/10/15/september-2018s-most-wanted-malware-cryptomining-attacks-against-apple-devices-on-the-rise/
http://malware-log.hatenablog.com/entry/2018/10/15/000000_9

◆August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat (Check Point, 2018/09/11)
https://blog.checkpoint.com/2018/09/11/augusts-most-wanted-malware-banking-trojan-attacks-turn-up-the-heat/
http://malware-log.hatenablog.com/entry/2018/09/11/000000_11

◆June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors (Check Point, 2018/07/05)
https://blog.checkpoint.com/2018/07/05/junes-most-wanted-malware-banking-trojans-crypto-mining/
http://malware-log.hatenablog.com/entry/2018/07/05/000000_7

◆May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally (Check Point, 2018/06/07)
https://blog.checkpoint.com/2018/06/07/mays-wanted-malware/
http://malware-log.hatenablog.com/entry/2018/06/07/000000_8


【ニュース】

■2023年

◆1月マルウェアランキング、Qbotが引き続きトップ (マイナビニュース, 2023/02/18 19:41)
https://news.mynavi.jp/techplus/article/20230218-2592854/
https://malware-log.hatenablog.com/entry/2023/02/18/000000_2


■2022年

◆8月マルウェアランキング、Emotetに代わる新脅威FormBookに注意 (マイナビニュース, 2022/09/16 09:37)
https://news.mynavi.jp/techplus/article/20220916-2455556/
https://malware-log.hatenablog.com/entry/2022/09/16/000000_1

◆1月マルウェアランキング、Emotetが首位に返り咲き (マイナビニュース, 2022/02/13 20:39)
https://news.mynavi.jp/techplus/article/20220213-2270186/
https://malware-log.hatenablog.com/entry/2022/02/13/000000


■2020年

◆Phorpiexボットネット用いた攻撃が再び急増 - 6月マルウェアランキング (マイナビニュース, 2020/07/14 10:28)
https://news.biglobe.ne.jp/it/0714/mnn_200714_2411409590.html
https://malware-log.hatenablog.com/entry/2020/07/14/000000_2


■2019年

◆トロイの木馬「Emotet」が第1位 - 10月マルウェアランキング (マイナビニュース, 2019/11/14 07:17)
https://news.mynavi.jp/article/20191114-923038/

◆暗号通貨マイナーのXMRigが1位、7月マルウェアランキング (マイナビニュース, 2019/08/11 10:38)
https://news.mynavi.jp/article/20190811-874793/
https://malware-log.hatenablog.com/entry/2019/08/11/000000

◆大規模ボットネットが息を潜めてアップグレード、6月マルウェアランキング (マイナビニュース, 2019/07/11 10:55)
https://news.mynavi.jp/article/20190711-857435/
https://malware-log.hatenablog.com/entry/2019/07/11/000000_1

◆確定申告狙うトロイの木馬に注目 - 4月マルウェアランキング (マイナビニュース, 2019/05/15)
https://news.mynavi.jp/article/20190515-823710/
https://malware-log.hatenablog.com/entry/2019/05/15/000000_9

◆仮想通貨マイニング「Coinhive」6位に陥落 - 3月マルウェアランキング (マイナビニュース, 2019/04/12 10:10)
https://news.mynavi.jp/article/20190412-807242/
http://malware-log.hatenablog.com/entry/2019/04/12/000000_12

◆2月マルウェアランキング - 今月もCoinhiveが第1位 (マイナビニュース, 2019/03/14 13:16)
https://news.mynavi.jp/article/20190314-788138/

◆1月マルウェアランキング、Linuxサーバ狙う新マルウェア観測 (マイナビニュース, 2019/02/15 07:15)
https://news.mynavi.jp/article/20190215-771452/
http://malware-log.hatenablog.com/entry/2019/02/15/000000

◆仮想通貨マイニングが上位独占 - 12月マルウェアランキング (マイナビニュース, 2019/01/15 13:45)
https://news.mynavi.jp/article/20190115-756719/
http://malware-log.hatenablog.com/entry/2019/01/15/000000_5

■2019年

◆トロイの木馬が再活性化 - 8月マルウェアランキング (マイナビニュース, 2018/09/13 11:15)
https://news.mynavi.jp/article/20180913-692140/
http://malware-log.hatenablog.com/entry/2018/09/13/000000

◆IoTを対象とした攻撃増加、7月マルウェアランキング (マイナビニュース, 2018/08/17 10:20)
https://news.mynavi.jp/article/20180817-679298/
http://malware-log.hatenablog.com/entry/2018/08/17/000000

◆バンキング型トロイの木馬が増加 - 6月マルウェアランキング (マイナビニュース, 2018/07/06 12:47)
https://news.mynavi.jp/article/20180706-660076/
http://malware-log.hatenablog.com/entry/2018/07/06/000000_6


【関連まとめ記事】

全体まとめ

◆資料・報告書 (まとめ)
https://malware-log.hatenablog.com/entry/Report


Copyright (C) 谷川哲司 (Tetsuji Tanigawa) 1997 - 2023