Uncommon infection methods—part 2

Kaspersky researchers discuss infection methods used by Mirai-based RapperBot, Rhadamantys stealer, and CUEMiner: smart brute forcing, malvertising, and distribution through BitTorrent and OneDrive. Continue reading Uncommon infection methods—part 2

Threat landscape for industrial automation systems for H2 2022

In H2 2022, the percentage of ICS computers on which malicious objects were blocked increased by 3.5 percentage points compared to the previous six-month period, reaching 34.3%. Continue reading Threat landscape for industrial automation systems for H2 2022

Kaspersky Security Bulletin 2022. Statistics

Key statistics for 2022: ransomware, trojan bankers, miners and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. Continue reading Kaspersky Security Bulletin 2022. Statistics

IT threat evolution in Q3 2022. Non-mobile statistics

PC malware statistics for Q3 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Continue reading IT threat evolution in Q3 2022. Non-mobile statistics

The state of cryptojacking in the first three quarters of 2022

In 2022 cryptocurrencies dropped, but cryptojacking (illicit cryptocurrency mining) activity grew. In this report we provide statistics on cryptojacking in 2022. Continue reading The state of cryptojacking in the first three quarters of 2022

Threat landscape for industrial automation systems for H1 2022

H1 2022 in numbers Geography In H1 2022, malicious objects were blocked at least once on 31.8% of ICS computers globally. Percentage of ICS computers on which malicious objects were blocked For the first time in five years of observations, the lowest percentage in the ‎first half of the year was observed in March.‎ During Continue reading Threat landscape for industrial automation systems for H1 2022

Good game, well played: an overview of gaming-related cyberthreats in 2022

In this report, we analyze malware, potentially unwanted applications and phishing cases related to most popular video games and cheats for these games. Continue reading Good game, well played: an overview of gaming-related cyberthreats in 2022

IT threat evolution in Q2 2022. Non-mobile statistics

Our non-mobile malware statistics for Q2 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Continue reading IT threat evolution in Q2 2022. Non-mobile statistics