Close Menu
  • Home
  • Latest
  • Apps & Software
  • Gadgets
  • Internet
  • Mobile
  • More
    • Reviews
    • Social Media
    • Tech
  • Tech News
    • Featured Tech
    • Crypto
    • Fintech
    • Events
    • Startups
    • Tech Careers
  • BHAKTI CEREMONY
What's Hot

Google launches new initiative to back startups building AI

May 13, 2025

Vivo V20 Pro registrations have begun in India ahead of the phone’s launch

November 26, 2020

Mi Watch Lite With Built-In GPS, 120+ Watch Faces Launched

December 10, 2020
Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
Facebook X (Twitter) Instagram YouTube LinkedIn
TechreviewTechreview
  • Home
  • Latest

    The Disrupt 2025 Builders Stage agenda now live and taking shape

    June 20, 2025

    strategies to capture attendees attention

    June 20, 2025

    Shaping the Future – Rezoomex Tech Blog

    June 20, 2025

    Nvidia’s AI empire: A look at its top startup investments

    June 19, 2025

    Who Attends Skift Meetings Forum?

    June 19, 2025
  • Apps & Software
  • Gadgets
  • Internet
  • Mobile
  • More
    • Reviews
    • Social Media
    • Tech
  • Tech News
    • Featured Tech
    • Crypto
    • Fintech
    • Events
    • Startups
    • Tech Careers
  • BHAKTI CEREMONY
TechreviewTechreview
Home»Featured Tech»FakeUpdates tops global malware chart in April — Report
Featured Tech

FakeUpdates tops global malware chart in April — Report

Tech ReviewBy Tech ReviewMay 13, 2025No Comments3 Mins Read
FakeUpdates tops global malware chart in April — Report

FakeUpdates was the most prevalent malware globally in April 2025, according to the latest Global Threat Index published by Check Point Software Technologies Ltd.

The report revealed that FakeUpdates, a downloader malware first identified in 2018, affected six percent of organisations worldwide during the month. It was followed closely by Remcos and AgentTesla.

FakeUpdates is typically distributed through drive-by downloads on compromised or malicious websites, tricking users into installing a fake browser update. Linked to the Russian cybercriminal group Evil Corp, the malware is known for delivering various secondary payloads after the initial infection.

Read also; Nigeria climbs cyber threat index as attacks mount

“April’s data reveals a growing use of stealthy, multi-stage malware campaigns and a continued focus on sectors with lower defenses,” the report noted. “With FakeUpdates remaining the most prevalent threat and new ransomware actors like SatanLock emerging, organisations must prioritise proactive, layered security to stay ahead of evolving attacks.”

Lotem Finkelstein, director of Threat Intelligence at Check Point Software, added, “This latest campaign exemplifies the growing complexity of cyber threats. Attackers are layering encoded scripts, legitimate processes, and obscure execution chains to remain undetected.

“What we once considered low-tier malware is now weaponised in advanced operations. Organisations must adopt a prevention-first approach that integrates real-time threat intelligence, AI, and behavioural analytics.”

The report also revealed that eight African countries ranked among the top 20 most targeted globally by malware operators.

Ethiopia retained the number one spot out of 107 countries surveyed. Zimbabwe ranked third with a Normalised Risk Index of 85 percent, followed by Mozambique in ninth place with a 67 percent risk index.

Read also: NITDA warns Nigerians about malware stealing banking details

Angola and Nigeria were listed 11th and 12th, respectively, with Normalised Risk Indexes of 66 and 66.2 percent. Ghana, Kenya, and Uganda rounded out the list in 17th, 18th, and 19th places, respectively, with indexes of 62.9, 60.5, and 60.2 percent.

The report added that researchers uncovered a sophisticated multi-stage malware campaign delivering AgentTesla, Remcos, and Xloader (a FormBook evolution) in April.

It added, “The attack begins with phishing emails disguised as order confirmations and lures victims into opening a malicious 7-Zip archive.

“This archive contains a JScript Encoded (.JSE) file that launches a Base64-encoded PowerShell script, which executes a second-stage .NET or AutoIt-based executable. The final malware is injected into legitimate Windows processes such as RegAsm.exe or RegSvcs.exe, significantly increasing stealth and detection evasion.”

Previous ArticleSamsung’s Absurdly Thin Galaxy S25 Edge Can Cut Cake—for $1,100
Next Article What the Investments and Securities Act means for Nigeria’s crypto

Related Posts

Featured Tech

Network outages every three hours frustrate remote working

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

How to Find a Lost or Stolen MacBook

March 29, 20240 Views

Vi (Vodafone Idea) Brings Rs. 1,348 RedX Family Postpaid Plan With ‘Unlimited’ High-Speed Data

December 3, 20200 Views

Apple TV app is coming to Xbox One, Xbox Series X, and Xbox Series S next week

November 3, 20200 Views
Latest Reviews
Gadgets

Realme Watch S is set to make its global debut on November 2

Tech ReviewOctober 26, 2020
Apps & Software

Facebook, YouTube and Twitter Grapple With Viral Pandemic Conspiracy Video

Tech ReviewMay 8, 2020
Apps & Software

Unlocking Income Potential: How AI Tools Empower Non-Technical Individuals

Tech ReviewSeptember 5, 2024
Most Popular

New mobile data intelligence software of embrace grabs new funding round amid unveiling

November 18, 20210 Views

Hydroxychloroquine Medicine: For Corona Virus

April 8, 20200 Views

Redmi 9 Power India launch has been set for December 17

December 10, 20200 Views
Hot Topics

राजीव रंजन प्रसाद का उच्च जाति आयोग में उपाध्यक्ष पद पर मनोनयन

June 2, 2025

Amazon India Cyber Monday Sale Brings Up to 50 Percent Off on International Brands

November 30, 2020

PC Secret Formula Review – Transform Slow PC Into Speed Monster

February 1, 2020

Subscribe to Updates

Subscribe to our newsletter for daily tech reviews, updates, tips, and insights!

Facebook X (Twitter) Instagram YouTube LinkedIn
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
© 2025 Tech Review. Designed by Tech Review.

Type above and press Enter to search. Press Esc to cancel.