What are the Latest Cyberthreats You Need to Defend Against? (New Malware, Viruses & More!)

Unfortunately, there is no shortage of new cyberthreats being released and infecting systems around the world. This means that businesses have to remain vigilant when it comes to protecting against viruses and other types of malware.

Each day, AV-TEST (the Independent IT-Security Institute) registers more than 350,000 new malicious and unwanted programs, and the total malware released every year continues to increase. 2019’s malware count (958.92 million) has already exceeded the previous year by about 100 million, and the year is not even finished yet.

If you don’t have managed IT security, trying to keep up with the constant influx of new threats can be a daunting task. Viruses, trojans, ransomware, and more can be delivered any number of ways:

  • Attachment in a phishing email
  • Disguised link to a malicious website
  • Exploit kit (attackers search for software vulnerabilities)
  • “Malvertising”, malicious ads that result in a drive-by-download when clicked
  • Hacking of unsecured or public Wi-Fi
  • Social phishing attacks
  • Nefarious webforms

The average cost of a data breach for Australian organisations is AUD$2.95 million or AUD$160 per lost file.

Proper IT security practices and awareness can help you mitigate the risk of a data breach for your company. As part of that awareness, we’ve researched the newest threats out there that you need to be aware of.

Be on the Lookout for these New Forms of Malware and Cyberthreats

From Bitdefender to Symantec, here are the top new IT security threats that security software companies are registering in their systems.


When it comes to infected systems, Bitdefender registered Cookie.Rub as the number one new threat that’s infecting devices. While we’re used to having cookies stored to record our browsing preferences the Cookie.Rub cookie is more like spyware, transmitting all types of internet activity back to the originator.

This virus is often picked up by visiting a website that uses some of the components of the Rub website or through a software application with internet-enabled functionality.


One of the newest schemes by cybercriminals is formjacking, which is the method of compromising a form to steal sensitive data that’s input there, such as credit card numbers. According to Symantec, there are an average of 4,800 websites that get compromised with form jacking code every month.

Stealing just 10 credit cards per website via formjacking can net a criminal $2.2 million per month.

PowerShell & Fileless Attacks

We’re used to having some type of script or code to seek out when trying to identify a piece of malware on a system, but what if the hacker doesn’t use a file at all? Fileless malware is the newest form of system intrusion and it’s often done via a PowerShell attack.

This type of attack uses tools that are already built into the Windows operating system (OS), such as PowerShell, and turning them against you for the purpose of malicious activity. They’re much harder to identify because they use trusted systems within the OS. Last year, PowerShell attacks increased by 1,000%.

CryptoMix Clop Ransomware

Ransomware is particularly insidious by making a system’s files unreadable. It’s also prevalent in large organisations. In October 2019, seven major hospitals and multiple health services from the Gippsland and southwest Victoria region were hit by a major ransomware infection.

The CrytpoMix Clop ransomware was first discovered in February 2019 and is particularly dangerous because it targets an entire network rather than just individual computers. It terminates various Windows processes including anti-virus and encrypts all the files found, giving them the extension .clop.


This newer computer virus is not particularly complex, but it can still slow down internet connections and wreak havoc on computers. It’s designed to exploit a number of different vulnerabilities, especially websites with weak passwords, and has the ability to update itself.

Trojan Glupteba

This form of malware is a serious one and includes several variants that can do slightly different things. Once the trojan is in your system, usually by opening a malicious file or via an exploit kit, it activates processes that pretend to be legitimate. It can divert traffic communicating directly to IP addresses and ports and collect user information.

Kuik Adware

Adware might not be as damaging to computers as other forms of malware, but it can still cause frustration, invade privacy, and drag down a user’s productivity because they have to deal with a bunch of ads while trying to do their work.

Kuik adware typically infects a system via a fake “Adobe Flash Player update” and once in, it can do things like collect personal data from the user’s computer and activate things like coin miners and malicious Chrome extensions.

Are You Protected from the Most Recent Malware Threats?

Is your IT security resilient enough to handle the newest threats? Don’t’ leave your data at risk, Elevate Technology can help you find out. Out experts can take a look at your technology defenses and let you know the weaknesses and their solutions.

Contact us today for a full security assessment at 1300.463.538 or through our contact form.