Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief
Posted: Wednesday, Feb 01

i 3 Table of Contents

Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief
From KBI

Spear phishing attacks are often used as an initial attack vector and ransomware infection is often the final stage of the kill chain. For this report, we analysed malware detections collected in December 2022 from our static anti-malware engines. Note: we only count total cases, not how monetarily significant the impact of infection is. Opportunistic adversaries and someย Ransomware-as-a-Service (RaaS)ย groups represent a higher percentage compared to groups that are more selective about their targets, since they prefer volume over higher value.

When looking at this data, remember these are ransomware detections, not infections.

Top 10 Ransomware Families (H3)

We analysed malware detections from December 1 to December 31. In total, we identifiedย 207 ransomware families. The number of detected ransomware families can vary each month, depending on the current ransomware campaigns in different countries.

Top 10 Countries (H3)

In total, we detected ransomware from 147 countries in our dataset this month. Ransomware continues to be a threat that touches almost the entire world. Below is a list of the top 10 countries most impacted by ransomware. Many ransomware attacks continue to be opportunistic, and the size of population is correlated to the number of detections.

Android trojans (H2)

Below are the top 10 trojans targeting Android we have seen in our telemetry during December 2023.

SMSSend.AYEย –ย Malware that tries to register as the default SMS application on the first run by requesting the consent of the user. If successful, it collects the user’s incoming and outgoing messages and forwards them to a Command & Control (C&C) server.

Downloader.DNย โ€“ Repacked applications taken from Google App Store and bundled with aggressive adware. Some adware downloads other malware variants.

Banker.ACT, ACIย – Polymorphic applications that impersonate legit apps (Google, Facebook, Sagawa Express …). Once installed, it locates banking applications on the device and tries downloading a trojanised version from the C&C server.

Triada.LCย โ€“ย Malware that gathers sensitive information about a device (Device IDs, Subscriber IDs, MAC addresses) and sends them to a malicious C&C server. The C&C server responds by sending back a link to a payload that the malware downloads and executes.

Banker.ACX –ย Applications that impersonate Korean banking applications to record audio and video, collect sensitive information (SMS messages, contacts, GPS locationโ€ฆ) and upload it to a C&C server.

HiddenApp.AIDย – Aggressive adware that impersonates AdBlock applications. When running for the first time, it asks permission to display on top of other apps. With this permission, the application can hide from the launcher.

Banker.XJ –ย Applications that drop and install encrypted modules. This trojan grants device admin privileges, and gains access to manage phone calls and text messages. After deploying, it maintains a connection with the C&C server to receive command and upload sensitive information.

SpyAgent.GC โ€“Applications that exfiltrate sensitive data like SMS messages, call logs, contacts, or GPS location.

Banker.ZFย – Applications that disguise themselves as banking apps and can imitate conversation with customer support. When the malware runs for the first time, it asks for permissions to access contacts, microphone, geolocation, and camera. Once the permissions are granted, the malware can receive commands from the C&C server to exfiltrate sensitive data from the phone.

Homograph Phishing Report (H2)

Homograph attacks work to abuse international domain names (IDN). Threat actors create international domain names that spoof a target domain name. When we talk about โ€œtargetโ€ of IDN homograph phishing attacks, we refer to the domain that threat actors are trying to impersonate. You canย read moreย about this type of attack in one of our previous reports.

Below is the list of the top 10 most common targets for phishing sites.

The Production Team
The KBI Production Team is a staff of specialist technology professionals with a detailed understanding across much of cybersecurity and emerging technology. With many decades of collective industry experience, as well as expertise in marketing & communications, we bring news and analysis of the cybersecurity industry.
Share This