Frauder, an aggressive threat.
From the report:
"An old malware family resurfaced with a new campaign this week. Frauder, who took the top spot in our list, is capable of disrupting the normal functioning of the targeted machine and at the same time steal sensitive data like bank credentials, passwords and other confidential information."
Frauder trojan Spike
As a global virus, Frauder trojan disguises itself as "free software," pop-up windows, or spam email attachments, as do many other forms of malware. It causes computers to run much slower and even shut down.
What makes this form of malware even more aggressive is its capability to not only modify a computer's critical system files and settings but it will "make itself run in the background and consolidate its presence." This allows remote hackers to access the system. They can monitor activities and collect sensitive information.
If you have found Frauder trojan on your system, remove it as quicky as possible.
Other Threats
Application Vulnerabilities/IPS
"DLink routers - This week the signature DLink.Devices.Unauthenticated.Remote.Command.Execution was triggered on more than 250,000 FortiGates. This signature indicates an attack attempt to exploit a remote Code Execution vulnerability in D-Link Multiple Router. The vulnerability is due to an error caused by vulnerable software handling a malicious HTTP request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via injected command within a HTTP request. It affects a series of DLink products and the manufacturer has not released a fix for it. If you own one of these routers, we warmly recommend you to switch to some more recent and secure alternatives."
Web Filtering
"papi2s dot mcdirru – FortiGuard Labs has discovered and blocked this BankBot C&C panel. BankBot is a banking malware targeted at the Android platform which has been spreading significantly, even on a controlled and secured platform like Google Play. It is capable of stealing Android users' banking credentials and payment card details. garyukai dot org backslash fei dot exe – FortiGuard Labs has identified this url as associated with Ursnif Banking Trojan, which has been identified in a fake invoice email. The malicious payload is detected by Fortinet as W32/GenKryptik.AKMM!tr. The domain has been added to our blacklist."