Lucene search

K
securelistAMRSECURELIST:B9C1B8CB1EA1BB400A495F4D15ADB354
HistorySep 03, 2024 - 8:00 a.m.

IT threat evolution in Q2 2024. Non-mobile statistics

2024-09-0308:00:47
AMR
securelist.com
11
ransomware
conti
lockbit
revil
fbi
nca
black basta
tellyouthepass
php
cve-2024-26169
cve-2024-4577
play group
cactus
ransom hub.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

The statistics presented here are based on detection verdicts by Kaspersky products and services received from users who consented to providing statistical data.

Quarterly figures

In Q2 2024:

  • Kaspersky solutions blocked over 664 million attacks from various internet sources.
  • The web antivirus reacted to 113.5 million unique URLs.
  • The file antivirus blocked over 27 million malicious and unwanted objects.
  • Almost 86,000 users encountered ransomware attacks.
  • Nearly 12% of all ransomware victims whose data was published on DLSs (data leak sites) were affected by the Play ransomware group.
  • Nearly 340,000 users faced miner attacks.

Ransomware

Quarterly trends and highlights

Law enforcement successes

In April 2024, a criminal who developed a packer that was allegedly used by the Conti and Lockbit groups to evade antivirus detection was arrested in Kyiv. According to Dutch police, the arrested individual was directly involved in at least one attack using the Conti ransomware in 2021. The criminal has already been charged.

In May, a member of the REvil group, arrested back in October 2021, was sentenced to 13 years in prison and ordered to pay $16 million. The cybercriminal was involved in over 2,500 REvil attacks, resulting in more than $700 million in total damages.

In June, the FBI announced that it had obtained over 7,000 decryption keys for files encrypted by Lockbit ransomware attacks. The Bureau encourages victims to contact the Internet Crime Complaint Center (IC3) at ic3.gov.

According to the UK's National Crime Agency (NCA) and the US Department of Justice, the Lockbit group amassed up to $1 billion in its attacks from June 2022 to February 2024.

Attacks exploiting vulnerabilities

The CVE-2024-26169 privilege escalation vulnerability, patched by Microsoft in March 2024, was likely exploited in attacks by the Black Basta group. Some evidence suggests that at the time of the exploitation, this vulnerability was still unpatched, making it a zero-day vulnerability.

In June 2024, a massive TellYouThePass ransomware attack was launched, exploiting the CVE-2024-4577 vulnerability in PHP. This attack targeted Windows servers with certain PHP configurations, including those with the default XAMPP stack. The attackers scanned public IP address ranges and automatically infected vulnerable servers, demanding 0.1 BTC as ransom. Although this is a relatively small amount, the scale of the attacks could have yielded substantial profits. In recent years, this method has not been used as frequently due to its cost for attackers, who prefer instead targeted attacks with the hands-on involvement of operators. However, in this case, the attackers employed the time-tested approach.

Most active groups

Here are the most active ransomware groups based on the number of victims added to their DLSs (data leak sites). In Q2 2024, the Play group was the most active, publishing data on 12% of all new ransomware victims. Cactus came in second (7.74%), followed by Ransom Hub (7.50%).

The percentage of victims of a particular group (according to its DLS) among victims of all groups published on all DLSs examined during the reporting period (download)

Number of new modifications

In Q2 2024, we discovered five new ransomware families and 4,456 new ransomware variants.

Number of new ransomware modifications, Q2 2023 – Q2 2024 (download)

Number of users attacked by ransomware Trojans

In Q2 2024, Kaspersky solutions protected 85,819 unique users from ransomware Trojans.

Number of unique users attacked by ransomware Trojans, Q2 2024 (download)

Geography of attacked users

Top 10 countries and territories targeted by ransomware Trojans

| Country/territory* |**% of users attacked by ransomware****
—|—|—
1 | Pakistan | 0.84%
2 | South Korea | 0.72%
3 | Bangladesh | 0.54%
4 | China | 0.53%
5 | Iran | 0.52%
6 | Libya | 0.51%
7 | Tajikistan | 0.50%
8 | Mozambique | 0.49%
9 | Angola | 0.41%
10 | Rwanda | 0.40%

*Countries and territories with fewer than 50,000 Kaspersky users were excluded from the calculations.
**Percentage of unique users whose computers were attacked by ransomware Trojans out of all unique Kaspersky product users in that country or territory.

Top 10 most common families of ransomware Trojans

| Name |Verdicts* |Share of attacked users**
—|—|—|—
1 | (generic verdict) | Trojan-Ransom.Win32.Gen | 22.12%
2 | WannaCry | Trojan-Ransom.Win32.Wanna | 9.51%
3 | (generic verdict) | Trojan-Ransom.Win32.Encoder | 6.94%
4 | (generic verdict) | Trojan-Ransom.Win32.Crypren | 5.42%
5 | Lockbit | Trojan-Ransom.Win32.Lockbit | 4.71%
6 | (generic verdict) | Trojan-Ransom.Win32.Agent | 2.88%
7 | PolyRansom/VirLock | Virus.Win32.PolyRansom / Trojan-Ransom.Win32.PolyRansom | 2.80%
8 | (generic verdict) | Trojan-Ransom.Win32.Phny | 2.61%
9 | (generic verdict) | Trojan-Ransom.Win32.Crypmod | 2.58%
10 | Stop/Djvu | Trojan-Ransom.Win32.Stop | 2.11%

*Statistics are based on detection verdicts by Kaspersky products. The information was provided by Kaspersky users who consented to providing statistical data.
**Unique Kaspersky users attacked by the ransomware Trojan family as a percentage of total users attacked by ransomware Trojans.

Miners

Number of new modifications

In Q2 2024, Kaspersky products detected 36,380 new miner variants.

Number of new miner modifications, Q2 2024 (download)

Number of users attacked by miners

In Q2 2024, we detected attacks using miners on 339,850 unique Kaspersky users worldwide.

Number of unique users attacked by miners, Q2 2024 (download)

Geography of attacked users

Top 10 countries and territories targeted by miners

| Country/territory* |**% of users attacked by miners****
—|—|—
1 | Tajikistan | 2.40%
2 | Venezuela | 1.90%
3 | Kazakhstan | 1.63%
4 | Ethiopia | 1.58%
5 | Kyrgyzstan | 1.49%
6 | Belarus | 1.48%
7 | Uzbekistan | 1.36%
8 | Ukraine | 1.05%
9 | Panama | 1.03%
10 | Mozambique | 1.01%

*Countries and territories with fewer than 50,000 Kaspersky users were excluded from the calculations.
**Percentage of unique users whose computers were attacked by miners out of all unique Kaspersky product users in that country or territory.

Attacks on macOS

In Q2 2024, numerous samples of the spyware Trojan-PSW.OSX.Amos (also known as Cuckoo) were found. This spyware is notable for requesting an administrator password through osascript, displaying a phishing window. Attackers regularly update and repackage this Trojan to avoid detection.

New versions of the LightRiver/LightSpy spyware were also discovered. This Trojan downloads modules from the server with spy and backdoor functionalities. For example, they record the screen or audio, steal browser history, and execute arbitrary console commands.

Top 20 threats to macOS

The percentage of users who encountered a certain malware out of all attacked users of Kaspersky solutions for macOS (download)

The leading active threat continues to be a Trojan capable of downloading adware or other malicious applications. Other common threats include adware and fake "system optimizers" that demand money to "fix" nonexistent issues.

Geography of threats for macOS

Top 10 countries and territories by share of attacked users

| Q1 2024* |Q2 2024*
—|—|—
Spain | 1.27% | 1.14%
Mexico | 0.88% | 1.09%
Hong Kong | 0.73% | 0.97%
France | 0.93% | 0.93%
United States | 0.81% | 0.89%
Italy | 1.11% | 0.87%
United Kingdom | 0.75% | 0.85%
India | 0.56% | 0.70%
Germany | 0.77% | 0.59%
Brazil | 0.66% | 0.57%

*Percentage of unique users encountering macOS threats out of all unique Kaspersky product users in that country or territory.

There has been a slight increase of 0.1–0.2 p.p. in the share of attacked users in Mexico, Hong Kong, the United Kingdom, and India. Conversely, we see a slight decline in Spain, Italy, and Germany.

IoT threat statistics

In the second quarter of 2024, the distribution of attack protocols on devices targeting Kaspersky honeypots was as follows:

Distribution of attacked services by the number of unique IP addresses of the devices carrying out the attacks, Q1–Q2 2024 (download)

The share of attacks using the Telnet protocol continued to grow, reaching 98%.

Distribution of cybercriminal sessions with Kaspersky honeypots, Q1–Q2 2024 (download)

Top 10 threats delivered to IoT devices

Share of a specific threat downloaded to an infected device as a result of a successful attack, out of the total number of downloaded threats (download)

Attacks on IoT honeypots

For SSH protocol attacks, the share of attacks from China and India increased, while activity from South Korea slightly declined.

SSH Q1 2024 Q2 2024
China 20.58% 23.37%
United States 12.15% 12.26%
South Korea 9.59% 6.84%
Singapore 6.87% 6.95%
Germany 4.97% 4.13%
India 4.52% 5.24%
Hong Kong 3.25% 3.10%
Russian Federation 2.84% 2.33%
Brazil 2.36% 2.73%
Japan 2.36% 1.92%

Telnet attacks from China returned to 2023 levels, while the share from India grew.

Telnet Q1 2024 Q2 2024
China 41.51% 30.24%
India 17.47% 22.68%
Japan 4.89% 3.64%
Brazil 3.78% 4.48%
Russian Federation 3.12% 3.85%
Thailand 2.95% 2.37%
Taiwan 2.73% 2.64%
South Korea 2.53% 2.46%
United States 2.20% 2.66%
Argentina 1.36% 1.76%

Attacks via web resources

The statistics in this section are based on the work of the web antivirus, which protects users at the moment malicious objects are downloaded from a malicious or infected webpage. Cybercriminals intentionally create malicious pages. Web resources with user-created content (such as forums), as well as compromised legitimate sites, can also be infected.

Countries and territories that serve as sources of web-based attacks: Top 10

The following statistics show the distribution of countries and territories that were the sources of internet attacks on users' computers blocked by Kaspersky products (webpages with redirects to exploits, sites with exploits and other malware, botnet control centers, and so on). Any unique host could be the source of one or more web-based attacks.

To determine the geographical source of web-based attacks, domain names are matched against their actual domain IP addresses, and then the geographical location of a specific IP address (GEOIP) is established.

In Q2 2024, Kaspersky solutions blocked 664,046,455 attacks launched from online resources across the globe. A total of 113,535,455 unique URLs that triggered the web antivirus were recorded.

Distribution of web attack sources by country and territory (Q2 2024) (download)

Countries and territories where users faced the greatest risk of online infection

To assess the risk of malware infection through the internet faced by user's computers in different countries and territories, we calculated the share of Kaspersky product users who encountered web antivirus detections during the reporting period for each country and territory. This data indicates the aggressiveness of the environment in which computers operate.

The following statistics are based on the detection verdicts of the web antivirus module, provided by Kaspersky product users who consented to share statistical data.

It's important to note that only attacks involving malicious objects of the Malware class are included in this ranking. Web antivirus detections for potentially dangerous and unwanted programs, such as RiskTool and adware, were not counted.

| Country/territory* |**% of attacked users****
—|—|—
1 | Moldova | 11.3635
2 | Greece | 10.8560
3 | Qatar | 10.4018
4 | Belarus | 9.8162
5 | Argentina | 9.5380
6 | Bulgaria | 9.4714
7 | South Africa | 9.4128
8 | Sri Lanka | 9.1585
9 | Kyrgyzstan | 8.8852
10 | Lithuania | 8.6847
11 | Tunisia | 8.6739
12 | Albania | 8.6586
13 | North Macedonia | 8.6463
14 | Bosnia & Herzegovina | 8.6291
15 | Botswana | 8.6254
16 | UAE | 8.5993
17 | Germany | 8.5887
18 | Slovenia | 8.5851
19 | Egypt | 8.5582
20 | Canada | 8.4985

Countries and territories with fewer than 10,000 Kaspersky users were excluded from the calculations.
Percentage of unique users subjected to web attacks by malicious objects of theMalware
* class out of all unique Kaspersky product users in that country or territory.

On average during the quarter, 7.38% of the internet users' computers worldwide were subjected to at least one Malware-category web attack.

Local threats

Statistics on local infections of user computers are an important indicator. They include objects that penetrated the target computer through infecting files or removable media, or initially made their way onto the computer in non-open form (for example, programs in complex installers, encrypted files, etc.).

Data in this section is based on analyzing statistics produced by antivirus scans of files on the hard drive at the moment they were created or accessed, and the results of scanning removable storage media. The following statistics are based on detection verdicts from the OAS (on-access scan, scanning when accessing a file) and ODS (on-demand scan, scanning launched by a user) antivirus modules, provided by Kaspersky product users who agreed to share statistical data. These statistics take into account malware found directly on users' computers or on removable media connected to computers, such as flash drives, camera memory cards, phones, and external hard drives.

In the second quarter of 2024, our file antivirus detected 27,394,168 malicious and potentially unwanted objects.

Countries and territories where users faced the highest risk of local infection

For each country and territory, we calculated the percentage of Kaspersky users on whose computers file antivirus was triggered during the reporting period. This data reflects the level of infection of personal computers across different countries and territories worldwide.

Note that only attacks involving malicious objects of the Malware class are included in this ranking. Detections of potentially dangerous or unwanted programs such as RiskTool and adware were not counted.

| Country/territory* |**% of attacked users****
—|—|—
1 | Turkmenistan | 44.2517
2 | Afghanistan | 39.4972
3 | Cuba | 38.3242
4 | Yemen | 38.2295
5 | Tajikistan | 37.5013
6 | Uzbekistan | 32.7085
7 | Syria | 31.5546
8 | Burundi | 30.5511
9 | Bangladesh | 28.3616
10 | South Sudan | 28.3293
11 | Tanzania | 28.0949
12 | Cameroon | 28.0254
13 | Niger | 27.9138
14 | Algeria | 27.8984
15 | Benin | 27.6164
16 | Myanmar | 26.6960
17 | Venezuela | 26.6944
18 | Iran | 26.5071
19 | Vietnam | 26.3409
20 | Congo | 26.3160

Countries and territories with fewer than 10,000 Kaspersky users were excluded from the calculations.
Percentage of unique users on whose computers localMalware
*-class threats were blocked, out of all unique Kaspersky product users in that country or territory.

On average, 14.2% of users' computers worldwide encountered at least one local Malware-class threat during the second quarter.

The figure for Russia was 15.68%.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High