![]() Also, there are a lot of encryption "test" projects on GitHub that can easily be reused as part of a new ransomware. ![]() Hackers are increasingly focusing on targeted attacks and ransomware-as-a-service schemes. All in all, it is precisely the technically advanced actors who are moving away from the model of mass distribution. In Germany, Austria and Switzerland, however, ransomware is involved in almost every fourth detection (22,5 percent). Only 2,5 percent of detections worldwide go back to the encryption Trojan GandCrab. □ AgentTesla tops the list of info-stealers (Image: ESET). However, the ESET Threat Report T2 2022 shows that this hacktivism wave receded from May to August and ransomware operators turned their attention to the United States, China and Israel,” explains Roman Kováč, Chief Research Officer at ESET. “In T1 2022, Russia was also the country hardest hit by ransomware, with some of the attacks being politically or ideologically motivated by the war. Despite the declining numbers, Russian IP addresses continued to be responsible for the majority of RDP attacks. These and other interesting facts can be found in the current ESET Threat Report on WeLiveSecurity.Īccording to ESET analysts, the sharp drop in RDP attacks is due to the war between Russia and Ukraine, the return to offices and overall improved security measures in the corporate environment. Phishing emails with supposed shipping confirmations from well-known delivery services such as DHL are currently particularly active. RDP (Remote Desktop Protocol) attacks also continued to ease throughout the year, down approximately 89 percent compared to the first tertial (January through April). Those believed dead live longer: Emotet is increasingly spreading its mischief in Japan and Italy. Display Emotet is also coming back more and more
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |