In Q2 2023, the number of incidents rose by 4% on Q1 and by 17% year-on-year. Targeted attacks accounted for 78% of the total. Successful cyberattacks on organizations most often resulted in leakage of confidential information (67%) and disruption of core operations (44%). The period saw numerous major leaks of users' personal data and large-scale attacks that exploited vulnerabilities.
Targeting secure data transfer products
In Q1, the Cl0p ransomware group executed a large string of corporate hacks that took advantage of a zero-day vulnerability (CVE-2023-0669) in GoAnywhere MFT. In Q2, they managed to successfully exploit a vulnerability they had found (CVE-2023-34362), where malicious SQL could be injected into MOVEit Transfer, a managed file transfer application by Progress Software. Cl0p had been aware of the vulnerabilities for some time, as the group tried to extract data from hacked MOVEit servers as early as April 2022.
Among the victims were the owners of well-known cybersecurity brands. For instance, Gen Digital (Avast, CCleaner, Norton LifeLock) confirmed, that some of its employees' personal data was compromised as a result of the latest attack on MOVEit (At the time of publishing this text, the group has listed more than 700 companies on its leak site as victims of the MOVEit hack, demanding that they pay a ransom).
Considering how successful Cl0p has been in exploiting zero-day vulnerabilities in managed file transfer software, one can expect the group to stick to a similar strategy against other products in the category going forward. Cl0p's zero-day exploitation approach suggests that not every ransomware group wants to see its efforts produce instant financial gains, and some are capable of playing the long game to maximize their profits. Cybercriminals realize that attacking multiple victims at a time achieves greater effect, and the time invested pays off in the long run.
Blockchain projects under attack
Blockchain remains an attractive goal for attacks that target not just protocols but also social media accounts to deceive users and steal funds: blockchain projects were hit by cybercriminals twice as frequently in Q2 than in Q1. A well-prepared attack in Discord that targeted the owners of cryptocurrency exchange servers resulted in the loss of $3,000,000. Posing as journalists, the attackers used social engineering techniques to trick the server administrators into verifying their identities following an "interview". After being redirected to a malicious website, the administrator had their Discord user token stolen from them. The cybercriminals then logged in to the server using the administrator's account, removed all other administrators, and published a phishing post.

Official Twitter accounts were hacked as well. Thus, attackers posted a fake crypto giveaway tweet on behalf of KuCoin, promising that anyone who sent cryptocurrency would get twice the amount. The 45 minutes that KuCoin's Twitter account remained compromised was enough for users to make transactions totaling $22,600. The platform promised to reimburse all losses.
There were also bigger attacks on blockchain protocols by both anonymous hackers who promised to return most of the stolen funds if inquiries into their past crimes were discontinued ([1], [2]) and APT groups, such as Lazarus, which was involved in the Atomic Wallet hack and the theft of $35,000,000 from cryptocurrency wallets.
Continued growth in ransomware activity
Ransomware attacks continued growing in Q2, increasing by 13%.

The situation in the research, academic, government, and healthcare sectors remained tense despite hacker infighting and prosecution by security agencies: the LockBit ransomware gang blocked one of its affiliates for targeting Keystone SMILES Community Learning Center, a nonprofit serving preschoolers, while Cl0p said it had deleted any data stolen from U.S. Federal agencies after the government offered a bounty for information about the group.

We saw the share of IT companies in the total number of ransomware victims rise by 5 p.p. to 11% in Q2 compared with Q1. The driving factor was potential benefits for cybercriminals: successful attacks on IT companies provide access to the companies' and their clients' confidential data and open up possibilities for both supply chain and trusted relationship attacks.
New names are appearing among active ransomware gangs: 8Base is an experienced player that has been hitting organizations everywhere in the world. After a period of silence and low popularity, the group launched a new leak site and took second place, after LockBit, in June in terms of the number of victims. First detected in March 2023, the Akira ransomware operators upped their game in Q2 by entering the rankings of 10 most prolific groups. However, already in late June, Avast released released a free decryption utility for Windows systems. Akira then targeted Linux systems, which had no decryptor support.
Q2 was not without unique campaigns. MalasLocker, first detected in April 23, attacks Zimbra servers by exploiting the CVE-2022-24682 vulnerability and encrypts victim systems, but demands that the victim make a charitable donation, rather than pay a ransom. In Q2, MalasLocker became the second-largest group by number of victims. Most of the attacked companies were based in Italy, the United States, and Russia.
Extortion without encryption
ВExtortion in the cyberspace has evolved from demanding ransom for decrypting data to encrypting data and threatening to publish it (also known as double extortion).
Companies have responded by increasing the focus on cybersecurity, implementing cyberattack response protocols, endpoint monitoring and response tools, and backup systems. Ransomware does not always produce the desired effect on the victim, while requiring the attacker to exert significant effort to bypass security and deploy the malware. All of the above has prompted hackers to abandon the encryption stage and adopt the use of stolen confidential information as the main tool for pressuring victims, as also reported by Barracuda. Cl0p's attacks on organizations, which did not use double extortion, suggests that this is an effective and still-relevant type of attack. The Karakurt and RansomHouse groups, which originally aimed only at stealing data to extort money, continued to pursue their campaigns into Q2 2023.
A further reason for the groups to give up encryption and switch to threats of publishing stolen data might be the inflow of decryption tools released by security professionals. For example, White Phoenix helps to recover files encrypted with the popular intermittent encryption method. The BianLian group continued its extortion campaign, but stopped to encrypt victim systems because a decryptor was published.
Spyware on the rise
Q2 saw the share of malware attacks on organizations drop by 8 p. p. compared to Q1. The decrease is due to a rise in vulnerability exploitation attacks, with their share reaching 35%. The usage of malware in attacks on individuals increased by 5 p. p.
According to ANY.RUN, the RedLine infostealer became the top malware family, experiencing a surge in popularity in Q2. The most popular Android malware, according to a Check Point study, was SpinOk, also a type of spyware. The trend for using this malware type in attacks on organizations (21%) and individuals (62%) continued.
In Q2, the PT Expert Security Center team managed to discover a new lightweight stealer written in Go that searched for files (by name extension) in the home directory and on local drives, and then sent these files to the C&C server, along with screenshots and the contents of the clipboard. The stealer was delivered with phishing email messages that contained a link to an NSIS installer. Phishing email is one of the most widely used (57%) malware delivery vectors in attacks on organizations. When launched, the installer opened a PDF file and simultaneously attempted to deliver a payload to the user's device.
In attacks on individuals, malware is delivered mainly with the help of websites (40% of all cases). The trend for using SEO poisoning, which we described earlier, remained active in Q2. Threat actors combined SEO poisoning and malvertising on websites ([1], [2], [3]) to spread malware.
Trending vulnerabilities
The number of vulnerabilities discovered per quarter is on the rise: 7% more were detected in Q2 than in Q1. The number of new vulnerabilities exceeded 7,500, according to the data released by the U.S. National Institute of Standards and Technology (NIST). Cybercriminals continue to exploit older vulnerabilities, as some systems still run outdated operating systems and software. The following vulnerabilities were actively exploited in Q2:
- CVE-2023-34362. A widely exploited zero-day vulnerability in MOVEit MFT that allows attackers to gain access to any files and escalate their privileges on a server by injecting malicious SQL code into requests sent to the server.
- CVE-2023-27350 and CVE-2023-27351. Critical vulnerabilities in PaperCut MF and NG print management software. The Lace Tempest group group has been able to compromise vulnerable servers, gain remote access, deliver ransomware, and then exfiltrate confidential information.
- CVE-2023-2868. A zero-day vulnerability in Barracuda Email Security Gateway, associated with incomplete validation of incoming data in the email attachment scanning module. The flaw allows injecting remote commands using specially generated malicious TAR files. The APT group known as UNC4841 took advantage of the vulnerability to conduct a cyberespionage campaign by mass-mailing a malicious attachment. Barracuda releasing a security patch for vulnerable appliances was deemed insufficient: the company insists that compromised appliances be replaced.
- CVE-2018-9995 and CVE-2016-20016. In April 2023, researchers from FortiGuard recorded significant upsurges in attacks that exploited the CVE-2018-9995 vulnerability in DVR devices by TBK (more than 50,000 unique attempts) and the CVE-2016-20016 vulnerability in MVPower digital video recorders. Exploiting CVE-2018-9995 allows attackers to bypass authentication on the device and gain access to a vulnerable network, while exploiting CVE-2016-20016 allows executing commands unauthenticated with the help of malicious HTTP requests. Spikes like this one suggest that old and vulnerable devices are susceptible to attacks years after the exploit is first discovered.
To protect yourself against attacks, we first and foremost suggest following our general guidelines on personal and corporate cybersecurity. Considering the types of incidents we saw in Q2 2023, we strongly recommend treating incoming email, instant messages, and messages you get on social media with caution: checking the sender and refraining from clicking any suspicious links to avoid falling for social engineering attacks or having your device compromised by malware. Be prudent and think through your decisions, especially when you see attractive offers. Download applications from trusted sources only, use file backup services, and install security patches as they become available. In addition, we recommend thoroughly investigating every major incident to identify points of compromise and vulnerabilities exploited by attackers, making sure that the cybercriminals did not leave any backdoors open. You can harden the perimeter with the help of modern security tools, such as web application firewalls (WAF). To prevent malware infection, we recommend using sandboxes to analyze the behavior of files in a virtual environment and detect any malicious activity.
To protect yourself against attacks, we first and foremost suggest following our 










