Threat Reports

This issue of ESET’s Threat Report reviews the key developments that defined the threat landscape in the final four months of 2022. Russia’s war on Ukraine continued to impact everything from global economy to cyberspace, where the ransomware scene in particular went through major shifts, all while RDP attacks took a nosedive. This, of course, barely scratches the surface of what the report reveals. Additionally, the report highlights some of the key findings by ESET researchers in late 2022.

This issue of the ESET APT Activity Report reviews the activities of selected APT groups as observed, investigated, and analyzed by ESET researchers from September to December 2022. Russia-aligned APT groups continued to be particularly involved in operations targeting Ukraine, deploying destructive wipers and ransomware. For example, we detected the infamous Sandworm group using a previously unknown wiper against an energy sector company in Ukraine.

The first instalment of the ESET APT Activity Report – which looks at advanced persistent threat (APT) activity in May to August 2022 and accompanies the ESET Threat Report covering the same period – features insights of ESET Research into the activity of Russia-, China-, Iran-, and North Korea-aligned threat actors. Among many other things, the report shows that even more than eight months after the Russian invasion, Ukraine continues to be a prime target of Russia-aligned APT groups.

In the T2 2022 Threat Report, the ESET research team reviews the main trends and developments shaping the threat landscape from May to August 2022. The report sheds light on the changes in ideologically motivated ransomware, Emotet activity, the most-used phishing lures, the continuation of the sharp decline of Remote Desktop Protocol (RDP) attacks, as well as on how the plummeting cryptocurrency exchange rates affected online threats. The report also reviews the most important findings and achievements by ESET researchers in recent months.

The T1 2022 issue of the ESET Threat Report provides an in-depth exploration of the key developments, trends and threats that shaped the cybersecurity landscape in the first four months of 2022. What kinds of implications did Russia’s invasion of Ukraine have for attackers’ tactics and techniques? What are some of the most impactful attacks that were connected to the war and were discovered (and thwarted) by ESET research? Speaking of which, the report also summarizes the various recent findings from ESET research labs and features highlights from ESET investigations into operations by various APT groups.

In its T3 2021 Threat Report, which covers September to December 2021, ESET Research summarizes key statistics from ESET detection systems, looks at the most frequent external attack vectors and shifts in the prevalence of certain types of threats due to fluctuating exchange rates of cryptocurrencies. It also highlights notable examples of ESET cybersecurity research, including exclusive, previously unpublished updates on current threats. It also comes with commentary on the broader trends observed throughout the year, as well as predictions for 2022 by ESET malware researchers and detection specialists.

The T2 2021 issue of the ESET Threat Report examines the key trends and developments that shaped the threat landscape between May and August 2021, highlighting several particularly disconcerting trends: increasingly aggressive ransomware tactics, escalating brute-force attacks, and deceptive phishing campaigns targeting remote workers. Beside these – and many other – findings, the report also looks at some of the most notable research publications from ESET malware analysts and brings previously unpublished discoveries by ESET researchers.

This issue of the ESET Threat Report provides an in-depth look at the threat landscape of the first four months of 2021, offering a breakdown of the latest global attack trends and statistics and providing unique insights to help defenders navigate the evolving and increasingly complex threat environment. This report also brings several exclusive ESET research updates and new findings about the Turla and Lazarus APT groups.

What were the key developments that defined the threat landscape in the final quarter of 2020 and what lies ahead in 2021? This issue of the ESET Threat Report not only highlights and comments on the key cyber-threats and trends in the fourth quarter and all of 2020, but also features predictions about broader trends expected in 2021. Additionally, it brings previously unpublished ESET research updates about APT group operations.

What were the key developments that shaped the threat landscape in the third quarter of 2020? For one thing, with coronavirus-themed lures played out, cybercriminals seem to have gone “back to basics”. One area where the effects of the pandemic persist, however, is remote work and its myriad security challenges. This report looks at these and many other trends in great detail, providing defenders with unique insights into the threat ecosystem, as well as brings previously unpublished ESET research updates.

This issue of ESET Threat Report’s provides a snapshot of the top cyber-threats and trends in the second quarter of 2020, highlighting a number of notable developments on the threat landscape, including when it comes to ransomware and phishing attacks and many other types of threats and attack vectors. In addition to providing an overview of these findings, the report highlights some of the key research published by ESET malware analysts between April and June 2020 and brings exclusive, previously unpublished ESET research updates.

This edition of the ESET Threat Report summarizes the findings and achievements of ESET researchers, detection engineers and security experts during the first three months of 2020. As the COVID-19 pandemic upended the lives of billions of people, what types of threats surged, which threats trended down, and what are the key takeaways for cyber-defenders? Our overview of the threat landscape in the first quarter of this year provides answers to these and other questions.