Check Point Software Technologies Ltd. published its latest Global Threat Index for August 2018, revealing a significant increase in attacks using the Ramnit banking trojan. Ramnit has doubled its global impact over the past few months, driven by a large scale campaign that has been converting victim’s machines into malicious proxy servers. Coinhive - Crypto Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's knowledge or approval. The implanted JavaScript uses a great deal of the computational resources of end users’ machines to mine coins, and may crash the system. Dorkbot - IRC-based Worm designed to allow remote code execution by its operator, as well as the download of additional malware to the infected system. It is a Trojan, with the primary motivation being to steal sensitive information and launch denial-of-service attacks. Andromeda - Modular bot used mainly as a backdoor to deliver additional malware on infected hosts, but can be modified to create different types of botnets. Lokibot, an Android banking Trojan and info-stealer, were the most popular malware used to attack organizations’ mobile estates followed by the Lotoor and Triada. Lokibot - Android banking Trojan and info-stealer, which can also turn into a ransomware that locks the phone in case its admin privileges are removed. Lotoor - Hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices. Triada - Modular Backdoor for Android which grants super user privileges to downloaded malware, as helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.