{"id":13583,"date":"2020-05-12T15:44:01","date_gmt":"2020-05-12T15:44:01","guid":{"rendered":"https:\/\/www.dfi.ch\/cyber-threat-report-april-2020\/"},"modified":"2022-09-01T13:53:14","modified_gmt":"2022-09-01T13:53:14","slug":"cyber-threat-report-april-2020","status":"publish","type":"post","link":"https:\/\/www.cheops-technology.ch\/en\/cyber-threat-report-april-2020\/","title":{"rendered":"Cyber Threat Report &#8211; April 2020"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13583\" class=\"elementor elementor-13583 elementor-7034\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b45f7b3 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b45f7b3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b2f0687 ot-flex-column-vertical\" data-id=\"5b2f0687\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a56aa92 elementor-widget elementor-widget-text-editor\" data-id=\"6a56aa92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><em>Data based on the number of blocks of various threats by the DFi Security Center<br \/>for the month of April.<\/em><\/p><h2>Malware of the month: Pony<\/h2><div>\u00a0<\/div><p><strong>Infection vectors:<\/strong> attachments, hacked websites <strong><br \/><\/strong> <strong>Consequences:<\/strong> theft of passwords, deactivation of antivirus software<\/p><p>Pony is a malware with two main functionalities: stealing information such as passwords from infected machines (infostealer), and installing other types of malware (loader) to trigger new attacks. Present since 2011, it is still very active and mainly targets Europe and America.<\/p><p>Over the years, the Pony malware has evolved by maintaining its ability to disable antivirus and Windows protection features and thus be executed invisibly. This formidable effectiveness has been demonstrated by its use in a large number of attacks in recent years.<\/p><p>The popularity of this malware is also due to the fact that its source code has been published on forums frequented by cybercriminals. Customised versions can be designed to take advantage of the malware&#8217;s proven functionality in new attacks.<\/p><p>Source : <a href=\"https:\/\/any.run\/malware-trends\/pony\" target=\"_blank\" rel=\"noopener noreferrer\">any.run<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data based on the number of blocks of various threats by the DFi Security Centerfor the month of April. Malware of the month: Pony \u00a0 Infection vectors: attachments, hacked websites Consequences: theft of passwords, deactivation of antivirus software Pony is a malware with two main functionalities: stealing information such as passwords from infected machines (infostealer), [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11035,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,95,87],"tags":[],"class_list":["post-13583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-cybers-news","category-news-en"],"_links":{"self":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/comments?post=13583"}],"version-history":[{"count":4,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13583\/revisions"}],"predecessor-version":[{"id":13673,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13583\/revisions\/13673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/media\/11035"}],"wp:attachment":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/media?parent=13583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/categories?post=13583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/tags?post=13583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}