Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
In Q1 2018, Comodo Cybersecurity Threat Research Labs’ experts analyzed 300 million malware incidents worldwide and witnessed the sharp rise of cryptomining attacks, a surprising decline in ransomware, increasingly sophisticated password stealers and malware patterns that coincided with escalating geopolitical tensions. Let’s take a closer look.
Cryptomining Attacks Change: Follow the Money
Comodo Cybersecurity’s Global Malware Report Q1 2018 report is among the industry’s first presenting new 2018 information for the quarter just ended.
Current threat analysis shows a very different picture from 2017. During the first three months of 2018, cryptominers surged to the top of detected malware incidents, displacing ransomware — which declined significantly in volume — as the number one threat.
As bitcoin jumped in value up to $20,000 in 2017, it became a prime target for cryptomining attacks. The real surge, however, came this year as cryptominer attacks grew to 28.9 million, amounting to a 10% share of all malware incidents during the first quarter. The number of unique cryptominer variants grew from 93,750 in January to 127,000 in March.
Another surprising finding: altcoin Monero now has the dubious honor of being the leading target for cryptominers’ malware, replacing Bitcoin. The reasons why hackers prefer cryptomining and love Monero, and how these attacks work, are detailed in the full report and the infographic.
Ransomware Declines Dramatically, as Attackers Shift Strategy
The 2018 data shows criminal attention to mining seems to have come at the expense of ransomware activity, for which new variants fell from 124,320 in January to 71,540 in March, a 42% decrease.
While ransomware represented 4 out 10 of all malware detections in August 2017, it declined to less than 1 in 10 in February 2018. Attacks are less successful because attackers have not innovated malware code and companies have adopted anti-ransomware measures, such as virtualizing infrastructures. Comodo Cybersecurity believes that ransomware will reemerge as a major threat, possibly as a weapon of data destruction, as demonstrated by NotPetya. The report dives deeply into how ransomware attacks work and explains why companies should be concerned about a resurgence.
Password Stealers are Becoming More Complex and Dangerous
Comodo Cybersecurity experts have witnessed the rise of sophisticated password stealers, with the Pony Stealer Trojan the leading choice for malware payload. Cybercriminals are motivated by financial factors, as world wealth increases and online banking accounts are linked to cryptowallets.
Password stealers like Pony Stealer penetrate a victim’s computer, covertly extract secret information and cover their traces to avoid detection. This topic is covered extensively in the report
Geopolitical Tensions Rise Globally, Changing Malware Patterns
In Q1 2018, the U.S., Russia and China made the news on the geopolitical scene. For an analysis of key events and how they correlated with threat patterns, please download the Q1 2018 Threat Report or the infographic.
Comodo Cybersecurity will host a webcast to discuss the findings with Dr. Kenneth Geers, chief research scientist at Comodo Cybersecurity on Wednesday, May 9, 2018 at 1 p.m. EDT (register here).
About the Comodo Cybersecurity Global Malware Report
The Comodo Cybersecurity Threat Research Labs’ Global Malware Report: Q1 2018 summarizes global malware patterns, providing business and technology decision makers with critical insights they can use to improve enterprise security. This publication is a quarterly threat report published by Comodo Cybersecurity Threat Research Labs, a group of more than 120 security professionals, ethical hackers, computer scientists and engineers who work for Comodo Cybersecurity full time analyzing malware patterns across the globe. Comodo Cybersecurity is a division of Comodo Security Solutions Inc., a global innovator of cybersecurity products for the enterprise.
Tags: Cyber Security,malware report
Reading Time: 3 minutes [Pull quote: In my experience, our customers really appreciate our team’s attention to detail and ability to listen. Here at Comodo, we value professionalism–but we’re also available and friendly.– Stephen Corsale, SVP of Customer Success and Professional Services at Comodo] One thing that’s unique about the cybersecurity industry is that a vendor is successful when…
Reading Time: 3 minutes With cybersecurity playing such an essential role in modern-day business culture, many companies are sourcing highly specialized personnel to help keep their organizations secure. While departmental structures vary from company to company, many would agree a dedicated Chief Information Security Officer (CISO) provides the best bang for buck when establishing sustainable security practices now and…
Reading Time: 3 minutes It can be hard to imagine a world in which an attempted hack attack occurs roughly every 39 seconds. But research shows that’s the world we live in. Some organizations stay in a permanent defensive crouch, running scans and madly installing security patches as needed. While those are good ways to prevent a cyber attack,…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats