Anna Golushko
Senior Analyst, Research Group of PT Cyber Analytics
Senior Analyst, Research Group of PT Cyber Analytics
In Q4 2024, the number of incidents rose by 5% compared to Q3 and by 13% compared to Q4 2023. Malware remains the main method of attackers and was used in 66% of successful attacks against organizations and in 51% of attacks on individuals. The most commonly used types of malware were ransomware (42%), remote access trojans (38%), and spyware (20%). We have observed an increase in the use of spyware in attacks targeting organizations, which is 4 percentage points higher than in the previous quarter. Over the reporting period, 53% of successful attacks on organizations led to the exposure of confidential information, while 32% resulted in disruptions to core business operations. When it comes to attacks on individuals, 48% of successful incidents were financially motivated—a sharp increase of 18 percentage points compared to the same period last year.
This report contains information on current global cybersecurity threats based on Positive Technologies own expertise, investigations by Positive Technologies Expert Security Center, and reputable sources.
We estimate that most cyberattacks are not made public due to reputational risks. As a consequence, even companies specializing in incident investigation and analysis of hacker activity are unable to quantify the precise number of threats. Our report seeks to draw the attention of companies and individuals to the key motives and methods of cyberattacks, as well as to highlight the main trends in the changing cyberthreat landscape.
This report considers each mass attack (for example, phishing emails sent to multiple addresses) as one attack, not several. For explanations of terms used in this report, please refer to the Positive Technologies glossary.
In Q4 2024, the number of incidents rose by 5% compared to Q3 and by 13% compared to Q4 2023. Malware remains the main method of attackers and was used in 66% of successful attacks against organizations and in 51% of attacks on individuals. The most commonly used types of malware were ransomware (42%), remote access trojans (38%), and spyware (20%). We have observed an increase in the use of spyware in attacks targeting organizations, which is 4 percentage points higher than in the previous quarter. Over the reporting period, 53% of successful attacks on organizations led to the exposure of confidential information, while 32% resulted in disruptions to core business operations. When it comes to attacks on individuals, 48% of successful incidents were financially motivated—a sharp increase of 18 percentage points compared to the same period last year. This trend suggests that financial losses among individuals are a defining characteristic of Q4.
As of Q4 2024, social engineering remained one of the most popular methods of attacks on organizations (50%) and individuals (88%). Social engineering attacks against organizations and individuals were mainly conducted via email (84%) and websites (44%), respectively. Meanwhile, there was an increase in the use of social media (up 10 percentage points to 22%) and messengers (up 11 percentage points to 18%) in attacks on individuals. This is largely due to the broad opportunities these platforms offer attackers to deceive users. Communication on social media and messengers tends to occur quickly, making it easier for attackers to mislead their victims and prevent them from taking the time to think critically. In addition, attackers are using leaked personal data, hacked accounts of other users and organizations, and even creating deepfakes based on them.
Microsoft Word documents are widely used in organizations around the world. The ubiquity of this file format provides attackers with ample opportunities to develop new attack methods. In Q4 2024, a new phishing campaign was identified that involved emails containing Microsoft Office attachments intentionally corrupted to evade security tools. These email attachments bypass antivirus software, prevent files from being uploaded to sandboxes, and evade Outlook spam filters, allowing malicious documents to reach recipients. When opened, the document displays a message claiming it is damaged and requires a recovery process to access its contents.

The ultimate goal of the attack is to trick users into opening infected documents with embedded QR codes. When scanned, these QR codes redirect victims to fraudulent websites where malicious software is installed on victim’s devices or to fake login pages designed to steal credentials. Quishing1 (QR phishing) peaked in popularity during the first half of 2024, as we highlighted in our Q2 2024 report. This technique continued to see widespread use in H2 2024.

We anticipate that this new technique of corrupting documents may soon be adopted by other attackers who use Microsoft Office files as bait to deliver malware. Attackers often embed harmful macros, templates, and exploits within Microsoft Word documents. While these techniques are not new and are well-detected by security tools like secure email gateways, antivirus software, sandboxes, and EDR solutions, attackers are shifting towards more complex, multi-stage malware delivery schemes designed to evade detection. The newly identified file corruption technique may become an effective tool for launching such sophisticated campaigns in the coming months.
To prevent malicious macros from running, organizations should Configure the group policy setting «Block macros from running in Office files from the Internet». Organizations are also recommended to implement a whitelist of trusted websites to prevent employees from visiting phishing pages. To detect malicious email attachments, we advise that companies enforce sandbox checks for damaged or otherwise altered files. To detect malicious activity on workstations, organizations should use modern EDR solutions capable of identifying behavioral anomalies.
Employees should exercise caution when receiving damaged or unreadable Microsoft Word or PDF files, especially if they are prompted to recover the document. Documents sent via email from unknown senders should not be downloaded or opened hastily. We recommend contacting the sender through a trusted communication channel to verify the authenticity of the document. This simple step can help avoid potentially harmful consequences for the company.
Throughout 2024, we observed phishing campaigns such as «Contagious interview,» which targeted developers by inviting them to fake interviews, ultimately tricking them into downloading malicious code onto their devices. By the end of the year, attackers devised a new scheme with the opposite motivation. This new phishing campaign targets organizations across various industries, using fear as a tactic to manipulate victims into action. The attack begins with an email designed to look like an official notification about legal proceedings and employee termination. Recipients are urged to download a document to access more details. Attached to the email is a RAR archive containing a malicious Visual Basic script. This script delivers the main payload, which is likely a banking trojan, indicating that the attackers are financially motivated. Experts predict that, in the future, this campaign may expand beyond email to platforms like LinkedIn or Facebook.
In Q4 2024, attackers widely adopted a new phishing scheme involving fake CAPTCHA pages. Victims are directed to a malicious website displaying a fake CAPTCHA page. When the victim clicks the «I’m not a robot» button, an encrypted PowerShell command string is copied to the device’s clipboard. The attackers then prompt the user to paste the clipboard’s contents into the command line, which activates a script to download and install malware onto the victim’s device.
This scheme first appeared in Q3 2024, primarily targeting gamers with the distribution of the popular infostealer Lumma Stealer capable of stealing browser credentials and access to cryptocurrency wallets. In Q4 2024, this phishing tactic scaled up significantly. Attackers used the Monetag advertising network to serve pop-up ads promoting over 3,000 malicious websites offering fake software and pirate video platforms to spread Lumma Stealer via fake CAPTCHAs. In addition to Lumma Stealer, cybercriminals also distributed the Amadey malware, which steals browser credentials, replaces cryptocurrency wallet addresses in the clipboard with attacker-controlled addresses, and, in some cases, installs the Remcos RAT (remote access trojan). Moreover, fake CAPTCHA pages were massively deployed on compromised WordPress-based websites to distribute a new piece of malware called CoinLurker, designed to steal data from cryptocurrency wallets as well as applications like Telegram, Discord, and FileZilla. This fake CAPTCHA technique was found not only in attacks on individuals but also on organizations. For example, in December, a phishing campaign targeted the hospitality industry in the UK. Hotel managers received emails purportedly from a booking service, containing links to phishing pages. As a result of these attacks, the XWorm RAT malware was installed on employees’ devices.

Legitimate CAPTCHA checks never require entering commands in the operating system or within the web page itself. Real CAPTCHA methods involve simple tasks like arranging shapes, entering a sequence of 6–8 alphanumeric characters, or checking a box to confirm you’re human. Additionally, a genuine CAPTCHA will never ask for sensitive information such as login credentials, passwords, or credit card numbers. If a CAPTCHA prompts you to provide such details, it’s a clear red flag and should be treated with caution.
In Q4 2024, the most commonly used types of malware in successful attacks on organizations were ransomware (42%), remote access trojans (RATs) (38%), and spyware (20%). Ransomware continues to be a major threat to organizations worldwide, used not only for financial gain but also as a tool for hacktivists. During this period, RansomHub was the most active ransomware group, overtaking LockBit in terms of the number of victims. Another key player, the well-known Akira ransomware group, also demonstrated a significant rise in attacks. Akira is believed to have infiltrated organizational infrastructures through the exploitation of vulnerabilities such as CVE-2024-40766 (rated 9.8 on the CVSS 3.1 scale) in SonicWall VPNs and CVE-2024-40711 (also rated 9.8) in Veeam Backup & Replication servers. The last quarter of 2024 marked the emergence of several new ransomware groups, including Interlock, Termite, SafePay, and FunkSec. These groups quickly launched aggressive campaigns, targeting companies’ infrastructures and publishing statements on their data leak sites (DLS)2.
As for attacks on individuals in Q4 2024, spyware remained the most frequently used malware, accounting for 48% of successful incidents. Banking trojans also saw a surge in usage, increasing to 19% of attacks—an 8 percentage point rise compared to Q3. According to Cyble Research and Intelligence Labs (CRIL), malicious actors started to distribute a modified version of the Cerberus banking trojan in October. This trojan was disguised as an installer for the Google Play Store. Banking trojans often masquerade as legitimate applications. In December, Dr.Web analysts uncovered new versions of the NGate banking trojan, which specifically targeted Russian users. NGate collects NFC chip data from compromised devices, enabling attackers to withdraw funds from victims’ accounts at ATMs without their involvement. This malware was distributed as an APK file via malicious links, disguised as apps for the Russian government services portal Gosuslugi or popular banking apps.
The use of remote access trojans (RATs) in successful attacks on both organizations and individuals declined in Q4 2024, dropping by 6 percentage points compared to Q3. RATs accounted for 38% of attacks on organizations and 29% of attacks on individuals. This trend aligns with findings from Any.Run researchers who reported a 10.8% decline in the number of detected RATs during the quarter. However, this decrease is likely temporary and may reflect shifts in cybercriminal strategies or tool preferences. Despite this short-term decline, RATs remain a significant threat in 2024, with Q4 showing a 6 percentage point increase compared to Q1 2024 and a 16 percentage point increase compared to Q4 2023.
During Q4 2024, we observed the emergence of updated remote access trojans (RATs) using increasingly sophisticated methods to evade detection. For example, attackers modified Remcos RAT, embedding multiple layers of obfuscation using JavaScript, VBScript, and PowerShell to bypass security tools. Another highly popular RAT, AsyncRAT, adopted an intricate infection chain in the final quarter of 2024. The attack began with a text file concealing an encrypted VBS script, which triggered a sequence of malicious commands designed to cover the infection traces. AhnLab’s Security Emergency Response Center (ASEC) uncovered a new delivery method for AsyncRAT using SVG files. These malicious files, sent via email, prompted users to download a PDF document, which covertly installed AsyncRAT onto compromised systems. Even developers were not spared. A malicious npm package, disguised as a tool for detecting vulnerabilities in Ethereum smart contracts, was discovered to be installing Quasar RAT onto devices. Published on December 18, 2024, this package would retrieve a script from a remote server after installation and execute it to deploy the RAT on Windows systems.
In Q4 2024, the use of spyware in successful attacks on organizations increased by 4 percentage points compared to the previous quarter. Spyware, as noted earlier, remained the dominant malware type in attacks on individuals (48%), leading the list of malware types.
In attacks on Russian organizations, cybercriminals often employed well-known infostealers. In mid-November, experts at PT Expert Security Center Threat Intelligence observed a campaign distributing Lumma Stealer and NetSupport RAT. Attackers sent phishing emails containing LNK or DOCX file attachments to organizations. When opened, these attachments downloaded malicious programs either from GitHub repositories controlled by the attackers or their C2 servers. Additionally, a new wave of phishing campaigns targeting Russian organizations in industries such as manufacturing, agriculture, and energy was reported in Q4. These campaigns delivered the Snake keylogger, capable of intercepting keystrokes, taking screenshots, gathering clipboard data, and stealing credentials from popular browsers and email clients. Attackers sent phishing emails from spoofed or compromised addresses of Russian and international companies. The emails contained .bz archives with .exe files responsible for delivering and installing the malware on victims’ systems.
Both Lumma Stealer and Snake remain among the most popular tools for attackers and serve as foundations for creating new spyware strains. In Q4, two new malicious programs were observed in attacks on both individuals and organizations: LummApp and Nova. LummApp integrates Lumma Stealer components and is designed to covertly install malicious browser extensions for data theft. Nova is new variant of the Snake Keylogger malware, which uses a protector written in AutoIt.
Attackers also update older, specialized malware that has proven effective. According to PT Expert Security Center, a modified version of the infamous Owowa module was detected in attacks on Russian organizations. Owowa targets Microsoft IIS web servers running Outlook Web Access (OWA) and allows attackers to steal Exchange user credentials. Once attackers breach an infrastructure and locate a mail server, they integrate a malicious DLL into the targeted IIS server’s process, which complicates detection. Attackers then intercept OWA users’ web authentication, extracting credentials through HTTP requests. The updated version of Owowa stores compromised credentials in the server’s memory (using a HashSet data structure) rather than writing them to the file system, minimizing the digital footprint, bypassing EDR systems, and optimizing the reading and writing of stolen data.
In Q4 2024, botnet activity surged, successfully targeting network equipment, IoT devices, and web servers. Compromised devices and resources were used for DDoS attacks, cryptocurrency mining, and cyberespionage. According to Cloudflare, Q4 2024 saw the largest recorded DDoS attack in history, with a bandwidth of 5.6 Tbps.
Botnets exploited unpatched vulnerabilities in devices and software as their primary access vector. They also bruteforced weak or default passwords. For example, the Ficora botnet recorded increased activity during October and November, targeting popular D-Link routers used by individuals and organizations. It leveraged long-known exploits for vulnerabilities CVE-2015-2051, CVE-2019-10891, CVE-2022-37056, and CVE-2024-33112, for initial access. Another botnet, Androxgh0st, is exploiting vulnerabilities in Atlassian JIRA, GeoServer (CVE-2024-36401), and Laravel web servers, as well as in WordPress admin panels, to infiltrate critical infrastructure. The Gafgyt botnet, on the other hand, targeted publicly exposed, misconfigured Docker Remote API servers. Attackers created a Docker container using legitimate Alpine images and ran malicious code within it.
Some botnets exploited vulnerabilities that lack official patches or CVE identifiers. For instance, the new Mirai-based botnet Hail Cock began exploiting an RCE vulnerability in DigiEver DS-2105 Pro NVRs in November 2024. This vulnerability, disclosed by a researcher at a 2023 DefCamp security conference, remained unregistered and unpatched.
Among the most prominent threats to network equipment and IoT devices is XorBot, equipped with at least 12 exploits targeting devices from various manufacturers. This malware family has shown high activity recently, and its scripts demonstrate a wide compatibility with various CPU architectures, including MIPS, PowerPC, ARM, and x86_64, among others. IoT devices used by individuals are also heavily targeted by attackers. In December 2024, the Android-focused BadBox botnet expanded to more than 192,000 devices globally, despite a recent takedown operation. According to BitSight Technologies, BadBox infects devices through supply chain attacks during or shortly after manufacturing, though the exact infection vector remains unknown.
Both AhnLab (ASEC) and Symantec Security Center independently reported a significant increase in malware distributed via AutoIt scripts in the second half of 2024. AutoIt is a programming language designed for automating tasks in Windows, making it easy to create .exe files. With minimal dependencies on system configurations or runtime environments and no need for additional libraries, it’s a more straightforward alternative to development in the .NET framework. The discovered trend persisted throughout Q4 2024, with only a slight decline in December. Throughout Q4 2024, AutoIt was used in the attack chains of the DarkGate and Snake campaigns. As mentioned earlier, the Nova variant of the Snake Keylogger, which uses a protector written in AutoIt, was detected.
To protect themselves from advanced malware, organizations should use sandboxes that allow programs to be run in an isolated virtualized environment to detect malicious activity. To evaluate how well employees are protected against phishing, we recommend using services that test the security of corporate email systems. To detect malicious activity within the infrastructure early and prevent data exfiltration via C2 channels, we recommend implementing network traffic analysis systems.
To secure cloud infrastructure, we recommend using container security solutions and web application firewalls to prevent unauthorized access to client data. For efficient network perimeter protection, we recommend using next-generation firewalls. To strengthen their security operations centers (SOC), we recommend that companies implement metaproducts that provide a high level of automation for incident detection and response.
Throughout 2024, attackers refined their techniques and tools by leveraging artificial intelligence (AI)—and the final quarter was no exception.
For several quarters now, we have been witnessing the use of evolving phishing-as-a-service (PHaaS)3 platforms. To ensure phishing pages reach end users, cybercriminals must devise effective ways to bypass detection filters in antivirus solutions and modern browsers. Recently, dark web forums have introduced new anti-bot services designed to help phishing pages evade Google Safe Browsing security mechanisms. Services like Otus Anti-Bot, Remove Red, and Limitless Anti-Bot help attackers to keep malicious websites hidden and functional for extended periods. Limitless Anti-Bot stands out for its use of AI and traffic filtering based on geolocation and internet service provider data. These tools are capable of distinguishing genuine users from automated scanners, reducing the likelihood of phishing sites being discovered.

Advancements in AI have given rise to new tools that automate and speed up the process of identifying vulnerable devices and exploiting their weaknesses. In Q4 2024, a research project called Burpference was published on GitHub. This extension for Burp Suite collects all in-scope links from HTTP request history and sends them to a remote LLM API in JSON format to automate vulnerability discovery in analyzed resources. The use of such tools allows attackers to identify vulnerabilities faster and shorten the time between discovery and exploitation.
At the end of Q4 2024, a new ransomware group called FunkSec made its mark on the cybercrime scene, claiming responsibility for attacks on more than 80 victims. According to research by Check Point, FunkSec members appear to have low technical skills but likely created their Rust-based ransomware variant with the help of AI. The group demands relatively small ransoms, sometimes as low as $10,000, and shows tendencies toward hacktivism. However, in January 2025, FunkSec announced plans for an updated ransomware version to be distributed as a subscription-based service (Ransomware-as-a-Service, RaaS). Additionally, the group intends to organize training courses for novice hackers, teaching them phishing and vulnerability exploitation techniques. After these updates, the ransom amounts are expected to increase to as much as $1 million. FunkSec also announced an auction to sell various hacking tools and stolen databases.

In Q4 2024, financially motivated attackers and APT groups successfully carried out supply chain attacks. Cybercriminals compromised the repository of the Python library Ultralytics, which supports multiple computer vision tasks, and uploaded malicious versions of the library to PyPI. These versions were specifically designed for cryptocurrency mining. The attackers exploited a vulnerability in GitHub Actions handlers to gain the ability to publish code on behalf of developers. This vulnerability allowed them to format project code through pull requests. While the developers quickly addressed the issue and released an update, the attackers uploaded malicious versions with different code just two days later. The exact number of compromised users remains unknown, but the incident highlights the critical importance of secure development processes at every stage of a product’s lifecycle.
Towards the end of the year, attacks on retail and e-commerce companies tend to increase. Attackers hack poorly protected websites based on platforms like WordPress, WooCommerce, and 1C-Bitrix to embed web skimmers for stealing customers’ credit card data. However, in 2024, attackers adopted a more sophisticated approach by hacking the FreshClick application used by the e-commerce SaaS platform BigCommerce. Unknown attackers injected malicious code designed to collect credit card data into FreshClick. While the exact number of affected retail companies remains unclear, at least one company, ZAGG—a household electronics accessory manufacturer—filed an official notice regarding the compromise of customer credit card data for orders placed between October 26 and November 7.
A larger supply chain attack at the end of 2024 resulted in the compromise of 35 Google Chrome extensions, with attackers injecting malicious code to steal user credentials. The attackers sent phishing emails to extension developers, masquerading as messages from Google, claiming their extensions violated Chrome Web Store policies and could be removed. Developers were directed to follow a link purportedly to accept the new Chrome Web Store policies, but instead, they inadvertently granted external applications access to their Google accounts. The first report of this attack came from Cyberhaven, a cybersecurity solutions provider whose extension was also compromised.

The attackers used a tool called GoIssue, which automatically extracts email addresses from GitHub profiles and sends mass phishing emails directly to developers’ inboxes. The investigation revealed that the attackers primarily targeted Facebook account credentials. The malicious code added a mouse click event listener for the victim’s interactions on Facebook, looking for QR code images related to the platform’s two-factor authentication or CAPTCHA mechanisms. The attackers focused on business Facebook accounts to conduct direct payments using victims’ credit cards, spread disinformation, or monetize access by selling the accounts to other users.
Organizations developing software or hardware solutions should establish secure development processes and supply chain protection mechanisms. They should regularly update their source-code management tools and storage solutions, as well as ensure security and integrity throughout the entire software development life cycle. We recommend implementing application security tools, dynamic application security testing (DAST), and source code and package analyzers like PT PyAnalysis.
The payment card data obtained during attacks can be sold on darknet platforms and used in subsequent attacks. To avoid that, organizations should regularly update their CMS and plugins, as well as use strong passwords and multifactor authentication. This is particularly important because attackers typically exploit weak passwords and plugin vulnerabilities to gain extended access to websites and advance their attacks.
In Q4 2024, there was a notable rise in successful attacks targeting telecommunications companies. These attacks accounted for 6% of all successful incidents against organizations, reflecting a 2 percentage point increase compared to Q3. The attacks were conducted by APT (Advanced Persistent Threat) groups, financially motivated cybercriminals, and hacktivist collectives.
Telecom companies handle vast amounts of data about their subscribers—both individuals and businesses—including phone call records. Successful attacks on telecom providers can lead to massive data breaches with severe consequences. In December 2024, Namibia’s state-owned company Telecom Namibia fell victim to a ransomware attack by Hunters International. Over 600 GB of sensitive client data was leaked, including personal and financial information. According to the news outlet The Namibian, the victims included at least eight government ministries, five regional councils, ten municipal authorities, as well as corporate clients like Qatar Airways and Ethiopian Airlines.
One of the most prominent incidents in Q4 2024 was a long-lasting cyberespionage campaign targeting several major U.S. telecom providers. This campaign likely began in early 2024 and lasted through the November presidential elections. Cybercriminals infiltrated the infrastructure of at least eight major providers, including AT&T, Lumen Technologies, T-Mobile, and Verizon. Systems used by the U.S. federal government for court-authorized wiretapping were compromised in the attack. The ultimate goal was likely to target devices belonging to presidential candidates and other participants in the election campaign. Investigations revealed that attackers gained access to telecom networks nationwide by exploiting vulnerabilities in outdated network equipment and the lack of two-factor authentication. This large-scale campaign is believed to have been orchestrated by the APT group Salt Typhoon. According to Trend Micro, this group employs malware such as the GhostSpider backdoor, Masol RAT, the modular backdoor SnappyBee, and the Demodex rootkit. Exploited vulnerabilities included CVE-2023-46805 and CVE-2024-21887 (Ivanti Connect Secure VPN), CVE-2023-48788 (Fortinet FortiClient EMS), CVE-2022-3236 (Sophos firewalls), and the ProxyLogon vulnerabilities in Microsoft Exchange (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065).
Telecom operators provide communication services to critical sectors such as government, industry, and finance. They often supply equipment to corporate clients and maintain remote access to manage it, thereby creating communication channels between infrastructures. This close integration makes telecom companies attractive targets for cybercriminals. By compromising a provider’s infrastructure, attackers can launch attacks on its clients. This highlights the serious risk of attacks that exploit trusted communication channels (trusted relationship compromise).
We recommend that telecommunications companies and service providers implement a comprehensive set of security measures, including replacing or upgrading outdated equipment and software, establishing robust vulnerability management processes, and adopting multifactor authentication methods for corporate services. It is also recommended to use sandboxes to promptly detect malicious email attachments. Additionally, we advise ensuring the security of the network perimeter by deploying next-generation firewalls.
Based on an analysis of the latest cyber threats at the end of 2024, along with insights into recently discovered vulnerabilities, malware, increased access to emerging technologies, and other relevant data, we predict the following trends for the first half of 2025:
The exploitation of software vulnerabilities remains one of the most effective methods for attacking organizations (32% of successful breaches). Below are the most notable vulnerabilities exploited in Q4:
An extended list of the most popular vulnerabilities can be found in the monthly digest on our website.
Using systems containing vulnerabilities can jeopardize any company. We recommend establishing a vulnerability management process to promptly identify and address weaknesses. Attackers waste no time in taking advantage of flaws in popular solutions, especially if exploits are available. Moreover, attackers seek to exploit older, well-known vulnerabilities, often targeting weaknesses in an organization’s network perimeter. We also recommend segmenting networks and regularly updating information about existing network assets. Old or forgotten components with access to the corporate network can become a potential entry point for attackers.
Successful cyberattacks in Q4 2024 had diverse consequences, affecting individuals, organizations, and even entire regions. As in Q1—Q3, cybercriminals focused on stealing sensitive information (53% of successful attacks) and disrupting core business operations (32%). Most attacks on individuals resulted in data breaches (55%), but there was also a significant increase in attacks leading to direct financial losses (48%), the same trend we observed in 2023.
Attacks in Q4 with dire consequences and wide repercussions:
In successful attacks on organizations that led to confidential information breaches, criminals most often targeted personal data (29% of attacks), login credentials (26%), and trade secrets (20%). As for attacks against individuals, attacker interest was focused on credentials (47%), personal data (22%), and payment card information (12%).
The growth of phishing-as-a-service (PHaaS) platforms and the increasing use of infostealers have made it easier for attackers to steal credentials from both organizations and individuals. In Q4 2024, breaches of corporate credentials increased by 4 percentage points compared to the previous quarter and by 16 percentage points year-over-year. In attacks on individuals, credentials accounted for 47% of stolen data, an increase of 18 percentage points from the previous quarter and 20 percentage points from Q4 2023.
To protect against cyberattacks, we recommend following our general guidelines on personal and corporate cybersecurity. We strongly advise users to be careful when entering their credentials on unfamiliar websites, downloading email attachments, and following links from messaging apps, social media, and emails. An objective and critical assessment of the situation will help safeguard your data and money.
To protect your organization from potential data breaches, implement data protection measures. We recommend conducting regular inventory and classification of assets, establishing data access control policies, monitoring access to sensitive information, and using specialized data security solutions that apply the «data-centric security» concept.
We also recommend using web application firewalls (WAFs) to harden the network perimeter. To protect devices against advanced malware, use sandboxes to analyze file behavior in a virtualized environment, detect malicious activity, and prevent damage to your company. Organizations should develop vulnerability management processes and participate in bug bounty programs.
23% of successful attacks were aimed at individuals