ADVERTISEMENT
TechEconomy
Friday, May 9, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » ​Check Point’s Threat Index for February 2024 Highlights Cybersecurity Landscape in Africa

​Check Point’s Threat Index for February 2024 Highlights Cybersecurity Landscape in Africa

Africa finds itself at the forefront of global cyber threats as new research reveals a surge in cyberattacks, notably targeting WordPress websites through FakeUpdates/SocGolish and the rise of Play ransomware, propelling it into the top three globally.

Joan Aimuengheuwa by Joan Aimuengheuwa
March 15, 2024
in Security
0
Check Point Global Threat Index for February 2024
Check Point Global Threat Index for February 2024

Check Point Global Threat Index for February 2024

RelatedPosts

Sophos warning about Chinese Cars -

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025

Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cybersecurity platform provider, has announced insights from its ​ Global Threat Index for February 2024, shedding light on the cybersecurity landscape across Africa, with a particular focus on South Africa.

The report reveals a concerning surge in cyber threats targeting websites and key industries, underlining the critical need for heightened cybersecurity measures.  The top three African industries targeted in February were utilities, manufacturing and consultancies respectively.

FakeUpdates, also known as SocGholish, has been operational since at least 2017, and uses JavaScript malware to target websites, especially those with content management systems.

Often ranked the most prevalent malware in the Check Point Threat Index, the FakeUpdates malware aims to trick users into downloading malicious software and despite efforts to stop it, it remains a significant threat to website security and user data.

This sophisticated malware variant has previously been associated with the Russian cybercrime group known as Evil Corp.

Due to its downloader functionality, according to the Check Point Index, it is believed that the group monetizes the malware by selling access to the systems that it infects, leading to other malware infections if the group provides access to multiple customers.

“Websites are the digital storefronts of our world, crucial for communication, commerce, and connection,” stated Maya Horowitz, VP of Research at Check Point Software. “Defending them from cyberthreats isn’t just about safeguarding code; it is about protecting our online presence and the essential functions of our interconnected society. If cybercriminals choose to use them as a vehicle to covertly spread malware, that could impact future revenue generation and the reputation of an organization. It is vital to put preventative measures in and adopt a culture of zero tolerance to ensure absolute protection from threats”.

Key Findings from South Africa

Top Malware Families:

  1. FakeUpdates (SocGholish): A JavaScript downloader responsible for 7.30% of cyber threats in South Africa. This malware leads to further system compromise by deploying additional malware such as GootLoader, Dridex, NetSupport, DoppelPaymer, and AZORult.
  2. Qbot (Qakbot): This multipurpose malware, detected in 3.51% of cases, first appeared in 2008. Qbot steals user credentials, records keystrokes, spies on banking activities, and deploys additional malware.
  3. AsyncRat: Targeting the Windows platform, AsyncRat sends system information to a remote server and executes commands, accounting for 2.16% of threats.
  4. Formbook: Detected in 1.89% of cases, Formbook is an Infostealer targeting Windows OS. It harvests credentials, collects screenshots, logs keystrokes, and executes commands from its C&C.
  5. Nanocore: Responsible for 1.35% of threats, Nanocore is a Remote Access Trojan targeting Windows users, offering functionalities such as screen capture and remote desktop control.

Emerging Threats

  • Tepfer:A highly invasive trojan, Tepfer steals credentials and essential data, distributed through spam and phishing emails, representing 1.08% of threats.
  • Glupteba:Known since 2011, Glupteba has evolved into a botnet with browser stealing capabilities, affecting 1.08% of cases.
  • Injuke:Spread through phishing emails, Injuke encrypts information on victims’ PCs, demanding ransom for decryption (1.08%).

Noteworthy Trends

The report highlights the persistence of ransomware groups like Lockbit3 and the emergence of Play ransomware in the top three most sought-after ransomware groups.

United BANK

Vulnerabilities in web servers, including directory traversal and command injection, remain highly exploitable, affecting 51% of organisations globally.

Insights from Other African Countries

  • In Kenya, FakeUpdates and Qbot emerged as prevalent threats, accounting for 20.81% and 22.15%, respectively.
  • Ethiopia faced a significant threat from Floxif and Phorpiex, with infection rates reaching 32.26% and 29.03%, respectively.
  • Nigeria experienced a surge in Qbot and FakeUpdates attacks, impacting 17.74% and 17.74% of cases, respectively.
  • Botswana saw a rise in Zloader and Ursnif infections, with rates of 15.79% and 15.79%, respectively.
  • Zimbabwe faced a high prevalence of Qbot and FakeUpdates, affecting 50.00% and 25.00% of cases, respectively.
  • Mozambique grappled with FakeUpdates and Tofsee, responsible for 11.11% and 3.70% of threats, respectively.

Top exploited vulnerabilities globally

Last month, “Web Servers Malicious URL Directory Traversal” was the most exploited vulnerability, impacting 51% of organizations globally, followed by “Command Injection Over HTTP” and “Zyxel ZyWALL Command Injection” with a global impact of 50% respectively.

  1. ↑ Web Servers Malicious URL Directory Traversal (CVE-2010-4598, CVE-2011-2474, CVE-2014-0130, CVE-2014-0780, CVE-2015-0666, CVE-2015-4068, CVE-2015-7254, CVE-2016-4523, CVE-2016-8530, CVE-2017-11512, CVE-2018-3948, CVE-2018-3949, CVE-2019-18952, CVE-2020-5410, CVE-2020-8260)– There is a directory traversal vulnerability on different web servers. The vulnerability is due to an input validation error in a web server that does not properly sanitize the URI for the directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.
  2. ↓ Command Injection Over HTTP (CVE-2021-43936, CVE-2022-24086)– A command Injection over HTTP vulnerability has been reported. A remote attacker can exploit this issue by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine.
  3. ↑ Zyxel ZyWALL Command Injection (CVE-2023-28771)– A command injection vulnerability exists in Zyxel ZyWALL. Successful exploitation of this vulnerability would allow remote attackers to execute arbitrary OS commands in the effected system.

Top Mobile Malwares Globally

Last month Anubis remained in first place as the most prevalent Mobile malware, followed by AhMyth and Hiddad.

  1. Anubis – Anubis is a banking Trojan malware designed for Android mobile phones. Since it was initially detected, it has gained additional functions including Remote Access Trojan (RAT) functionality, keylogger, audio recording capabilities and various ransomware features. It has been detected on hundreds of different applications available in the Google Store.

 

  1. AhMyth – AhMyth is a Remote Access Trojan (RAT) discovered in 2017. It is distributed through Android apps that can be found on app stores and various websites. When a user installs one of these infected apps, the malware can collect sensitive information from the device and perform actions such as keylogging, taking screenshots, sending SMS messages, and activating the camera, which is usually used to steal sensitive information.

 

  1. Hiddad – Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.

Top-Attacked Industries Globally

Last month, Education/Research remained in first place in the attacked industries globally, followed by Government/Military and Healthcare.

  1. Education/Research
  2. Government/Military
  3. Healthcare

Maya Horowitz, VP of Research at Check Point Software, emphasized the urgent need for organizations to bolster their cybersecurity posture, given the evolving threat landscape.

She urged proactive measures to safeguard against emerging threats and protect critical digital assets.

Loading

United BANK

Author

  • Joan Aimuengheuwa
    Joan Aimuengheuwa

    Joan thrives at helping individuals and businesses scale via storytelling...

    View all posts
0Shares

Tags: Check PointGlobal Threat Index
Previous Post

Why Low FDI, Mass Exodus of Companies Persist in Nigeria

Next Post

MainOne Issues Update as Engineers Battle to Restore Undersea Cable for Internet Connectivity

Joan Aimuengheuwa

Joan Aimuengheuwa

Joan thrives at helping individuals and businesses scale via storytelling...

Related Posts

Sophos warning about Chinese Cars -
Security

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

by Joan Aimuengheuwa
May 7, 2025
0

The recent success of the Shanghai Motor Show is a strong indicator of the growth of the Chinese automotive sector,...

Read more
FG Launches Data Privacy Academy

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025
Future of multi-cloud by Samson Aligba -

Securing the Future of AI Integration: Why an Enterprise-Grade Model Context Protocol Framework is Crucial

May 5, 2025
AI-Powered Cybercrime

Check Point: Exposing the Rise of AI-Powered Cybercrime, Defenses

May 5, 2025
World Passwords Day

Is it Time to Goodbye to Passwords?

May 2, 2025
UK-Nigeria fraud prevention agreement

UK-Nigeria Partnership Strengthened to Detect, Disrupt and Deter Fraud

May 2, 2025
Next Post
IRAQ-IXP Powered by DE-CIX, Internet connectivity

MainOne Issues Update as Engineers Battle to Restore Undersea Cable for Internet Connectivity

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.