Nuspire has published its Q2 2022 Quarterly Threat Report. The report outlines new cybercriminal activity and tactics, techniques, and procedures (TTPs) and is sourced from over a trillion traffic logs gained from Nuspire client sites and associated with thousands of devices around the globe.
Nuspire’s data reveals a significant increase in overall threat activity across malware, botnet, and exploits. Malware events increased over 25 percent, botnets doubled over the first quarter and exploit activity grew by nearly 150 percent, buoyed by the Log4j vulnerability.
Additional key findings from Nuspire’s Q2 2022 Threat Report include:
- The top five malware variants witnessed over Q2 were CoinMiners, Injectors, Microsoft Excel Trojans, and password-protected office trojans.
- VBA agent activity, which has been one of the top offenders over the past year in Nuspire’s Quarterly Threat Reports, has significantly decreased as predicted last quarter, due to Microsoft’s announcement of blocking them by default.
- A substantial increase in botnet activity near the end of Q2, attributed to Torpig Mebroot botnet, which is a banking trojan designed to scrape and collect credit card and payment information from infected devices. Torpig Mebroot is particularly difficult to detect and remove, as it infects the victim machine’s master boot record.