Threat Report: cybercriminals' adaptability, sextortion and more

Η ESET published the Threat Report for 1ο Semester 2023, which presents trends in the threat landscape captured by the company's detection systems from December 2022 to May 2023.

eset threat report h1 2023

In the 1st half of 2023, we have seen developments that highlight the remarkable adaptability of cybercriminals and the exploitation of new attack methods: through exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information and deception. One of the reasons for the changes in attack patterns is the stricter security policies introduced by the Microsoft, especially when it comes to opening macro files. Her telemetry data ESET also suggest that the operators of the once infamous botnet Emotet they struggled to adjust to the shrinking attacks possibly indicating that a different team got it botnet.

In his field ransomware, οι δράστες επαναχρησιμοποιούσαν πηγαίο που είχε διαρρεύσει προηγουμένως για τη δημιουργία νέων παραλλαγών ransomware. Κατά τη διάρκεια του πρώτου εξαμήνου του 2023, τα μηνύματα ηλεκτρονικού ταχυδρομείου με σεξουαλικού εκβιασμού (sextortion) also came back ESET noticed an alarming increase in the number of fraudulent loan applications for Android.

According to the threat report, in an attempt to bypass its security measures Microsoft, in the first half of 2023, attackers replaced the macros of Office with weaponized archives OneNote, taking advantage of the ability to embed scripts and files directly into the OneNote. In response, Microsoft adjusted the default setting, prompting cybercriminals to continue to look for alternative attack methods, by intensifying attacks brute-strength against the servers Microsoft SQL possibly be one of the tried-and-tested replacement approaches.

“Regarding the source code leak of the ransomware of families such as Babyk, lockbit in the upcoming years, while Accounts, these allow amateurs to participate in activities ransomware, but at the same time they allow us as defenders to cover a wider range of variations with a more general or known set of detections and rules" says Roman Kováč, head of its research ESET.

While threats against cryptocurrencies are steadily decreasing in its telemetry ESET, cryptocurrency-related cybercriminal activities continue to exist, with cryptomining capabilities (cryptomining) and crypto theft (cryptostealing) are increasingly incorporated into more flexible malware strains. This development follows a pattern seen in the past, such as when malware keylogger was initially identified as a separate threat, but eventually became a common feature of many malware families.

Looking at other threats that focus on financial gain, her researchers ESET they noticed the return of the so-called Email fraud sextortion, which exploit people's fears about their online activities, as well as an alarming increase in fraudulent loan applications for Android that masquerade as legitimate personal loan services and take advantage of vulnerable people with urgent financial needs. The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

threat report

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).