Top 10 Cyber Threat Actors in 2020

The Road Ahead Cyber Security in 2020 and Beyond

As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus for our devices in order to keep all of our data safe. However, the truth is that most antivirus programs don’t keep us 100% protected from new malware, and we are likely to still vulnerable to the latest virus threats. The following is a list of the 10 most dangerous computer viruses and new malware threats in 2020 that we need to protect ourself from:

  1. COVID-19: Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to fraudulent charities or causes. Exercise caution in handling any email with a COVID-19-related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19.
  2. Clop Ransomware: “Clop” is one of the latest and most dangerous ransomware threats that is a variant of the well-known CryptoMix ransomware. Windows users are always the target. Before beginning the encryption process, the Clop ransomware blocks over 600 Windows processes and disables multiple Windows 10 applications, including Windows Defender and Microsoft Security Essentials.
  3. Fake Updates: Hackers have been increasingly sending emails that trick readers into installing the “latest” Windows updates, which are actually ransomware ‘.exe’ files in disguise. It encrypts all of the files and programs and demands a ransom payment to un-encrypt the files. Unfortunately, many email service providers and basic antivirus software aren’t able to detect and block these emails.
  4. Zeus Gameover: Zeus Gameover is part of the “Zeus” family of malware and viruses. This piece of malware is a Trojan that accesses your sensitive bank account details and steals all of your funds. Zeus Gameover can bypass centralized servers and create independent servers to send sensitive information. In addition, the stolen data is impossible to be traced.
  5. RaaS: Ransomware as a Service (RaaS) is a growing industry in the underground hacker community. With this industry, people can pay to hire a professional hacker or team of hackers to perform the attack for them. Thus, it is easy to infect people with ransomware despite the bad actors having no previous experience with designing or coding malware.
  6. News Malware Attacks: Cybercriminals often use current news stories and global events to target people with malware. The COVID-19 (Coronavirus) outbreak is one of the examples. Hackers send out emails that are disguised as legitimate information about the outbreak, but the link contains malware that copies the files on your device and steals your personal information.
  7. Fleeceware: Fleeceware continues to charge app users large amounts of money despite users deleting those apps. Recent research has found that over 600 million Android users have downloaded “Fleeceware” onto their device in the past few years. Although Fleeceware doesn’t pose a considerable security threat to a user’s device and data, it’s still very common.
  8. IoT Device Attacks: As the popularity of IoT devices grows in 2020, hackers are looking to exploit these devices for valuable information. Most IoT devices don’t have enough storage to install proper security measures but often contain easy-to-access data such as passwords and usernames. In addition, hackers can use internet-based cameras and mics to spy on and communicate with people.
  9. Cryptojacking: Cryptojacking malware is designed to use a person’s computing power to help “mine” cryptocurrencies, such as Bitcoin. Mining requires a huge amount of computing power to generate new crypto coins, which is why hackers are attempting to install cryptojacking malware on computers and mobile devices to help with the mining process.
  10. AI Attacks: As more tools become available to developers who want to program AI scripts and software, hackers will be able to use this same technology to carry out devastating cyberattacks. Although cybersecurity companies are using artificial intelligence and machine learning algorithms to help combat malware, these technologies can also be exploited to hack devices and networks on a massive scale.

LIFARS’ Cyber Incident Response Team provides an elite response for your organization after a Ransomware or Cyber Extortion Incident. LIFARS executes Bitcoin payments and establishes a cyber-secure perimeter guided with proper regulatory and legal oversight. Ransomware Response and Cyber Extortion containment is our expertise.



Contact LIFARS Immediately for

Your Cybersecurity Mitigation Plan