GLOBAL ANALYSIS

Cyber Attack Categories by Region

Cyber Attack Categories by Region

Global

Multipurpose Malware
0%
Infostealers
0%
Ransomware
0%
Cryptominers
0%
Mobile
0%

Americas

Multipurpose Malware
0%
Infostealers
0%
Ransomware
0%
Cryptominers
0%
Mobile
0%

EMEA

Multipurpose Malware
0%
Infostealers
0%
Ransomware
0%
Cryptominers
0%
Mobile
0%

APAC

Multipurpose Malware
0%
Infostealers
0%
Ransomware
0%
Cryptominers
0%
Mobile
0%

Global Threat Index Map

The map displays the cyber threat risk index globally, demonstrating the main risk areas around the world.

  • - Darker - higher risk
  • - Insufficient Data

Global Average of weekly attacks per organization by Industry in 2023 [% of change from 2022]

Education/Research
0 [-0%]
Government/Military
0 [-0%]
Healthcare
0 [+0%]
Communications
0 [+0%]
ISP/MSP
0 [-0%]
Finance/Banking
0 [+0%]
Utilities
0 [+0%]
Retail/Wholesale
0 [+0%]
Leisure/Hospitality
0 [+0%]
Manufacturing
0 [-0%]
Consultant
0 [+0%]
SI/VAR/Distributor
0 [-0%]
Transportation
0 [-0%]
Insurance/Legal
0 [-0%]
Software vendor
0 [-0%]
Hardware vendor
0 [+0%]

The education, government, and healthcare sectors continue to be prime targets for cyberattacks. Enhanced awareness and a large number of impactful attacks during the last few years have led to the launch of significant improvements in education sector security protocols, which may have contributed to a small, recent decrease in the number of attacks against this sector. However, the average educational institution is still hit with over 2,000 attack attempts weekly. Some attacks have been part of larger campaigns, such as those involving Johns Hopkins University and the University System of Georgia, which were compromised by the CL0P ransomware through the MOVEit managed file transfer software.

Schools are particularly vulnerable to cyber-attacks due to the vast amounts of sensitive personal information they have in their systems and lower levels of investment in cybersecurity. The private sector — including retail, wholesale manufacturing, and financial institutions — is more likely to acquiesce to ransom demands than public sector groups, and has seen an increase in targeting over the previous year. Access to these institutions is often traded in underground markets.

Delivery Protocols - Email vs. Web Attack Vectors in 2018-2023

0%
20%
40%
60%
80%
100%
0%
0%
2018
0%
0%
2019
0%
0%
2020
0%
0%
2021
0%
0%
2022
0%
0%
2023
Web
Mail

Web – Top malicious file types in 2023

0%
10%
20%
30%
40%
50%
60%
56%
exe
15%
sh
8%
pdf
7%
py
4%
dll
2%
jar
1%
msi
1%
ps1
1%
doc*
1%
vbs

Email – Top malicious file types in 2023

0%
10%
20%
30%
40%
50%
60%
70%
80%
69%
html
20%
pdf
3%
exe
2%
link
1%
doc*
1%
js
1%
xls*
1%
jar
1%
rtf
0.1%
msi

Email-delivered malicious archive file types in 2023

0%
10%
20%
30%
40%
35%
rar
25%
zip
9%
7z
8%
gz
5%
img
4%
z
3%
cab
2%
iso
2%
arj
2%
xz

xls* includes common Office Excel files such as .xls, .xlsx, .xlsm

doc* includes common Office Word files such as .doc, .docx, docm, and .dot

The education, government, and healthcare sectors continue to be prime targets for cyberattacks. Enhanced awareness and a large number of impactful attacks during the last few years have led to the launch of significant improvements in education sector security protocols, which may have contributed to a small, recent decrease in the number of attacks against this sector. However, the average educational institution is still hit with over 2,000 attack attempts weekly. Some attacks have been part of larger campaigns, such as those involving Johns Hopkins University and the University System of Georgia, which were compromised by the CL0P ransomware through the MOVEit managed file transfer software.

Schools are particularly vulnerable to cyber-attacks due to the vast amounts of sensitive personal information they have in their systems and lower levels of investment in cybersecurity. The private sector — including retail, wholesale manufacturing, and financial institutions — is more likely to acquiesce to ransom demands than public sector groups, and has seen an increase in targeting over the previous year. Access to these institutions is often traded in underground markets.

Postings in an underground forum selling access to retail companies.

In 2023, the cybersecurity landscape experienced a worrying surge in ransomware attacks across various sectors. Ransomware attacks now account for 10% of all malware types detected by Check Point sensors. This trend is further underscored by CPIRT (Check Point Incident Response Team) data and victim postings on ransomware “shame sites.” According to CPIRT data, nearly half of all of the incidents they handled involved ransomware and the reported number of ransomware victims has reached nearly 5,000 victims, a marked increase from the 2,600 reported in 2022.

Email-based attacks continue to bethe dominant initial infection vector. Eighty-eight percent of all malicious file deliveries occur through email, with the remainder downloaded directly from the internet. Threat actors have adapted to email protection strategies and are exploring innovative delivery techniques. Following Microsoft’s restrictions on Office VBA macros in files from external sources denoted with the Mark-of-the-Web (MotW), there was a sharp decrease in the prevalence of malicious Office files, from nearly 50% in 2022 to 2% in 2023. Notable alternative attack vectors include HTML files and various archive file types. In particular, the exploitation of HTML files saw a significant uptick. HTML files comprise 69% of all malicious file attachments.

Threat actors use HTML files in several ways. They are used in phishing schemes to imitate legitimate website login pages and steal user credentials. They can include malicious JavaScripts or exploits to unpatched browser and browser-plugins. As demonstrated in recent CP<R> research, these tactics are not limited to low-level criminals but are also utilized by advanced APT actors. Other uses of HTML include HTML smuggling, or auto download for executables and redirections to other malicious URLs. Legitimate use cases of email-delivered HTML are unusual and therefore organizations should consider implementing restrictions.

Utilization of various archive files has also been on the rise. The contents of password-protected archives are hidden from many security services, thus forming an effective attack vector. Other formats like .img and .iso depend on the software used for their extraction to propagate the MotW functionality, which is used to prevent malicious attempts. While Microsoft has fixed this feature, other providers like 7-zip have opt-in policies, thus decreasing the effectiveness of the MotW protection mechanism.

The increased detection of malicious .py files, ranking fourth in the list of the most common web-delivered malicious file types, indicates a rising use of malicious code packages. This trend is explored in detail in a separate section. The continued decrease in the use of executables as malicious email attachments, which dropped from 26% in 2022 to just 3% in the past year, can be attributed to restrictive corporate policies, the integration of security mechanisms by popular email service providers, such as Google and Microsoft, and enhanced user awareness.

Global Malware Statistics

Data comparisons presented in the following sections are based on data drawn from the Check Point Threat Cloud between January and December 2023.

For each of the regions below, we present the most prevalent malware in 2023 and the percentage of corporate networks impacted by each malware family.

Top Malware Families

Global

FakeUpdates
0%
Qbot
0%
AgentTesla
0%
FormBook
0%
CloudEyE
0%
XMRig
0%
Emotet
0%
Nanocore
0%
LokiBot
0%
Remcos
0%

Americas

FakeUpdates
0%
Qbot
0%
AgentTesla
0%
FormBook
0%
Emotet
0%
CloudEyE
0%
XMRig
0%
Nanocore
0%
NJRat
0%
Remcos
0%

EMEA

FakeUpdates
0%
Qbot
0%
FormBook
0%
AgentTesla
0%
CloudEyE
0%
Nanocore
0%
Emotet
0%
LokiBot
0%
XMRig
0%
Remcos
0%

APAC

AgentTesla
0%
FakeUpdates
0%
FormBook
0%
Qbot
0%
XMRig
0%
CloudEyE
0%
LokiBot
0%
NJRat
0%
Remcos
0%
Nanocore
0%

Global Analysis of Top Malware

At the top of Check Point’s list for the most prevalent malware globally in 2023 is a scheme called FakeUpdates. Also known as SocGholish, it relies on a network of compromised websites to redirect users to fake software and browser updates. In turn, these fake updates trick users into downloading and executing a JavaScript downloader that acts as the initial access point, enabling further compromise through other malware such as GootLoader, NetSupport and DoppelPaymer. The network of compromised websites is linked to TA569, a prolific threat actor who serves as an Initial Access Broker (IAB).

TA569 is suspected of selling initial access to malware victims in a pay-per-install (PPI) pricing model to other cybercriminals who can then leverage compromised systems to deploy ransomware. The infection chain begins when a victim visits a compromised website, whether they were lured there by a phishing email or they access it directly. On the website itself, the victim may encounter a fake browser update request, or fake Captcha puzzles, and security software updates, then leading to malware infection.

Qbot, also known as QakBot or PinkslipBot, ranks second on our list. Qbot is a Windows malware that was first discovered in 2008 as a banking Trojan. Through many updates and evolutions, it has become one of the most well-known and longest-prevailing malware droppers out there. In fact, Qbot has caused so much damage in terms of data theft and extortion, that in August 2023 the FBI and the Department of Justice launched an international campaign to dismantle the botnet, remove it from infected servers and seize over $8 million in illicit profits. In December, Qbot was observed in new phishing campaigns.

Emotet has long persisted on Check Point’s most prevalent malware list. Despite its diluted operational mode, it affected 4% of corporate networks globally, mostly in the first quarter of the year. Emotet was taken down in a Europol-led global effort in November 2021, but made a measured comeback in 2022, orchestrated by the cybercrime group Mealybug (AKA TA542) through multiple spam campaigns alternating with prolonged periods of silence.

After Microsoft restricted the exploitation of VBA macros in downloaded documents (the principal method used in Emotet’s campaign), Mealybug went on to explore alternative infection methods. In 2023, Mealybug was observed trying out different techniques, and in March began using VBScript-embedded OneNote files in their campaigns. Upon downloading the file, the victims were lured to click the ‘View’ button to see the document contents, which would then download the Emotet DLL. This campaign was planned to coincide with tax season deadlines in the United States.

  • MULTIPURPOSE MALWARE

    Top Multipurpose Malware

    Global
    Americas
    EMEA
    APAC

    Multipurpose Malware Global Analysis

    As in our previous report, we have merged two malware categories, banking Trojans and botnets.We have also introduced a new unified category called ‘multipurpose malware’. This change reflects the evolution of many banking Trojans, which have acquired additional functionalities.

    In addition to FakeUpdates, Qbot, and Emotet, which were discussed in the previous section, DarkGate, a Windows RAT developed in Delphi, has also risen in popularity and is especially prominent in campaigns targeting entities in the APAC region. In the latter half of 2023, DarkGate gained significant notoriety for its ability to evade security system detection. In contrast to Emotet and Qbot, which run their own infection campaigns and subsequently sell access and infections, DarkGate employed a more direct sales strategy in a Malware-as-a-Service (MaaS) model. It was directly advertised on underground forums to a select group of customers, highlighting its new capabilities and limited availability. Conducted by a broad range of actors, campaigns delivering DarkGate utilize numerous techniques, including phishing and Teams messages.

    DarkGate-pricing

    DarkGate pricing and offering on an underground forum during 2023

  • INFOSTEALER

    Top Infostealer Malware

    Global
    Americas
    EMEA
    APAC

    Infostealer Malware Global Analysis

    The infostealer malware market operates mainly in a Malware-as-a-Service (MaaS) model, involving several key players. At the heart of this ecosystem are MaaS providers, who focus on developing and maintaining both the malware and its operational infrastructure. Infostealer operators, who either rent or purchase the malware, deploy them in cyber-attack campaigns against victim platforms. Underground marketplaces are crucial for trading the data harvested from these campaigns.

    In the past year, this ecosystem has seen only minimal changes, with malware such as AgentTesla, FormBook, and LokiBot remaining prevalent. The accessibility of these infostealers is evident in their pricing on underground forums, where they are offered for monthly subscriptions ranging from $60 to $1,000 USD. This tiered pricing structure accommodates a wide spectrum of threat actors, from novices to seasoned hackers. In addition, there are the Initial Access Brokers, who utilize the purchased data to breach networks, often leading to extensive exploitation by ransomware.

    AgentTesla, first identified in 2014, is a MaaS with keylogging capabilities and is one of the infostealers commonly detected by CP<R>. Its current version has been enhanced to steal credentials from multiple applications, including web browsers, VPN software, FTP services, and email clients. Beyond credential theft, AgentTesla has functionalities for collecting system information, disabling anti-malware processes, and capturing clipboard contents. AgentTesla is adept at extracting credentials from system registries and configuration files, and it transmits this stolen data to its command and control (C&C) server. Notably, this malware is marketed on underground forums through low-cost subscription models, making it accessible to cybercriminals with limited technical expertise.

  • CRYPTOMINING

    Top Cryptomining Malware

    Global
    Americas
    EMEA
    APAC

    Cryptominers Global Analysis

    Illegal cryptomining saw a decrease in 2023 due to Bitcoin rates not rebounding to their 2021 peak and the continued increase in mining difficulty. Only 9% of global corporate entities were affected by cryptominers in 2023, compared to 16% in 2022. With the increase in GPU (Graphics Processing Unit) prices, some threat actors are now specifically targeting graphic designers and engineering platforms for their enhanced GPU capabilities as miners. Monero remains profitable for mining, and its common open-source mining tool, XMRig, was used in 65% of cryptomining attacks in 2023. Cryptominers are integrating additional malicious functionalities, transforming some of them, like LemonDuck, into multifaceted threats that span beyond their core function of mining cryptocurrency. In some instances, as with the StripedFly malware, cryptomining activities might just be a cover for more complex espionage operations.

    Cloud infrastructure continues to be a target for cryptomining exploitation. In October, researchers reported a years-long operation that exploited poorly secured IAM keys to access cloud environments for deploying Monero miners. Often, the same access that allows threat actors to install a cryptominer is later used for additional exploitation and breaches. This makes the presence of cryptominers a potential precursor to broader security issues.

  • MOBILE

    Top Mobile Malware

    Global
    Americas
    EMEA
    APAC

    Mobile Malware Global Analysis

    Mobile devices are prime targets for cyberattacks, largely due to their central role in our daily lives and the wealth of valuable data that they contain. These devices not only store personal and financial information but may also serve as potent surveillance tools, given their capabilities to track location, record audio, and capture images.

    The AhMyth Android Remote Access Trojan (RAT) is an open-source malware freely available on GitHub that is often used as basis for attack campaigns. Not surprisingly, it occupies a significant position on the Check Point top mobile malware charts. A variant of the malware, AhRat, was found in a weaponized app called ‘iRecorder – Screen Recorder’ available in the Google Play Store with over 50,000 downloads.

    A “clean” version of the application has been available for Android users since 2021, and the malicious characteristics were only added later. In addition to iRecorder’s self-explanatory screen-grabbing feature, its malicious update includes sound recording and data exfiltration capabilities, including retrieval of saved web pages, images, audio, video, document, and

    archive formats. The spyware functionalities may suggest a cyber-espionage campaign, which is not uncommon in the mobile malware world. For example, there is the Kamran Android malware which is specifically designed to target Urdu-speaking victims in Pakistan, or the Chinese-aligned APT operated BadBazaar Android spyware.

    As always, these types of malware are also often exploited for financial gain by cyber criminals. For example, the newly emerged Chameleon Android banking Trojan targets Australian and European users’ mobile banking and cryptocurrency applications. A similar campaign was observed in India, where malicious apps impersonating banks and government services were distributed via social media platforms. Ransomware was also given a new spin within the Android ecosystem: SpyLoan applications were spread through Google Play Store to over 12 million users in Asia, Africa and South America. The malware collected victims’ personal and financial data from their mobile devices, which it used to harass and blackmail them to extort funds.

  • RANSOMWARE

    Ransomware

    This section features information derived from almost 200 ransomware “shame sites” operated by double-extortion ransomware groups, 68 of which posted the names and information of victims from 2023. Cybercriminals use these sites to amplify pressure on victims who do not pay the ransom immediately. The data from these shame sites carries its own biases but still provides valuable insights into the ransomware ecosystem, which is currently the number one risk to businesses. The data presented below was collected for the period between January and December 2023.

    Top Double-Extortion Ransomware Actors

    In 2023, a total of 68 active ransomware groups reported they had breached the systems of and publicly extorted over 5,000 victims. This marks a substantial increase over past years. The ransomware events only intensified as 2023 went on. H2 recorded more than 2,800 victims compared to 2,200 in the first half of the year. Lockbit emerged as the most active during this period, responsible for 21% of the reported incidents with over 1,050 cases. Typically, threat actors grant victims a one-to-two-week grace period to meet the ransom demands. Victims who pay the ransom are not publicly exposed, which suggests that the actual number of victims could be significantly higher.

    ALPHV, also known as BlackCat, targeted over 440 victims in 2023 and was the focus of a law enforcement operation. In December, a US-led operation resulted in the takedown of the group’s websites and the release of a decryption tool. According to CISA, since the beginning of its operations, the group compromised more than 1,000 victims and received ransom payments totaling nearly $300 million. The group has since resumed its criminal operation and its presence on the Dark Web.

    CL0P’s activity is underrepresented in this count. In early June, CL0P exploited a zero-day vulnerability that allowed it to gain access to the MOVEit file-transfer software, leading to the compromise of over 2,600 organizations. Most of the victims’ identities were not disclosed on its shame site and therefore not included in the above count. CL0P also utilized alternative methods to further extort its victims. CL0P’s use of zero-day exploits this year also included an attack on GoAnywhere, which is detailed in another section of this report.

    In terms of geographical distribution, 45% of the affected companies are situated in the United States, followed by the United Kingdom at 7%, and Canada, Germany, and Italy each at 4%. The presence of Russian victims on this list in 2023 can be attributed primarily to two actors: MalasLocker and Werewolves. Cyberattacks on entities from the former Soviet Union remain relatively infrequent. MalasLocker, active in the first part of 2023, adopted an unconventional approach by replacing traditional ransomware demands with requests for charitable donations.

    When analyzing the industry sectors affected by ransomware attacks, data from the Check Point Threat Cloud highlights the education, government, and healthcare sectors as the primary targets. However, the ransomware victim landscape offers a different view. Manufacturing and retail sectors exhibit the highest number of victims, while government and education entities are positioned lower in the target hierarchy. In December 2023 alone, prominent companies like Coca-Cola Singapore (DragonForce), Nissan Motor Australia (Akira), Kraft Heinz (Snatch), Xerox (Inc ransom) were all claimed as victims by double-extortion ransomware groups.

    The aforementioned discrepancy likely arises from differences in the willingness of these sectors to comply with ransom demands, with educational and governmental organizations being less inclined to make payments. These sectors are primarily targeted for the exploitation of their data, including personal and technical information, rather than for extortion-based attacks.

    Top Double-Extortion Ransomware Actors

    Victims by country, as reported on shame sites - 2023

    USA
    45%
    UK
    7%
    Canada
    4%
    Germany
    4%
    Italy
    4%
    France
    3%
    Australia
    2%
    Spain
    2%
    Brazil
    2%
    India
    2%
    Russia
    1%

    Industry distribution of ransomware victims, as reported on shame sites – 2023

    Manufacturing
    22%
    Retail/ Wholesale
    10%
    Consultant
    9%
    Healthcare
    8%
    Education/ Research
    7%
    Software Vendor
    6%
    Insurance/ Legal
    6%
    Finance/ Banking
    6%
    Transportation/ Logistics
    5%
    Government/ Military
    4%
    Leisure/ Hospitality
    3%
    Communications
    3%
    ISP/ MSP/ IT
    3%
    Energy/ Utilities
    2%

Top Multipurpose Malware

Global
Americas
EMEA
APAC

Multipurpose Malware Global Analysis

As in our previous report, we have merged two malware categories, banking Trojans and botnets.We have also introduced a new unified category called ‘multipurpose malware’. This change reflects the evolution of many banking Trojans, which have acquired additional functionalities.

In addition to FakeUpdates, Qbot, and Emotet, which were discussed in the previous section, DarkGate, a Windows RAT developed in Delphi, has also risen in popularity and is especially prominent in campaigns targeting entities in the APAC region. In the latter half of 2023, DarkGate gained significant notoriety for its ability to evade security system detection. In contrast to Emotet and Qbot, which run their own infection campaigns and subsequently sell access and infections, DarkGate employed a more direct sales strategy in a Malware-as-a-Service (MaaS) model. It was directly advertised on underground forums to a select group of customers, highlighting its new capabilities and limited availability. Conducted by a broad range of actors, campaigns delivering DarkGate utilize numerous techniques, including phishing and Teams messages.

DarkGate-pricing

DarkGate pricing and offering on an underground forum during 2023

Top Infostealer Malware

Global
Americas
EMEA
APAC

Infostealer Malware Global Analysis

The infostealer malware market operates mainly in a Malware-as-a-Service (MaaS) model, involving several key players. At the heart of this ecosystem are MaaS providers, who focus on developing and maintaining both the malware and its operational infrastructure. Infostealer operators, who either rent or purchase the malware, deploy them in cyber-attack campaigns against victim platforms. Underground marketplaces are crucial for trading the data harvested from these campaigns.

In the past year, this ecosystem has seen only minimal changes, with malware such as AgentTesla, FormBook, and LokiBot remaining prevalent. The accessibility of these infostealers is evident in their pricing on underground forums, where they are offered for monthly subscriptions ranging from $60 to $1,000 USD. This tiered pricing structure accommodates a wide spectrum of threat actors, from novices to seasoned hackers. In addition, there are the Initial Access Brokers, who utilize the purchased data to breach networks, often leading to extensive exploitation by ransomware.

AgentTesla, first identified in 2014, is a MaaS with keylogging capabilities and is one of the infostealers commonly detected by CP<R>. Its current version has been enhanced to steal credentials from multiple applications, including web browsers, VPN software, FTP services, and email clients. Beyond credential theft, AgentTesla has functionalities for collecting system information, disabling anti-malware processes, and capturing clipboard contents. AgentTesla is adept at extracting credentials from system registries and configuration files, and it transmits this stolen data to its command and control (C&C) server. Notably, this malware is marketed on underground forums through low-cost subscription models, making it accessible to cybercriminals with limited technical expertise.

Top Cryptomining Malware

Global
Americas
EMEA
APAC

Cryptominers Global Analysis

Illegal cryptomining saw a decrease in 2023 due to Bitcoin rates not rebounding to their 2021 peak and the continued increase in mining difficulty. Only 9% of global corporate entities were affected by cryptominers in 2023, compared to 16% in 2022. With the increase in GPU (Graphics Processing Unit) prices, some threat actors are now specifically targeting graphic designers and engineering platforms for their enhanced GPU capabilities as miners. Monero remains profitable for mining, and its common open-source mining tool, XMRig, was used in 65% of cryptomining attacks in 2023. Cryptominers are integrating additional malicious functionalities, transforming some of them, like LemonDuck, into multifaceted threats that span beyond their core function of mining cryptocurrency. In some instances, as with the StripedFly malware, cryptomining activities might just be a cover for more complex espionage operations.

Cloud infrastructure continues to be a target for cryptomining exploitation. In October, researchers reported a years-long operation that exploited poorly secured IAM keys to access cloud environments for deploying Monero miners. Often, the same access that allows threat actors to install a cryptominer is later used for additional exploitation and breaches. This makes the presence of cryptominers a potential precursor to broader security issues.

Top Mobile Malware

Global
Americas
EMEA
APAC

Mobile Malware Global Analysis

Mobile devices are prime targets for cyberattacks, largely due to their central role in our daily lives and the wealth of valuable data that they contain. These devices not only store personal and financial information but may also serve as potent surveillance tools, given their capabilities to track location, record audio, and capture images.

The AhMyth Android Remote Access Trojan (RAT) is an open-source malware freely available on GitHub that is often used as basis for attack campaigns. Not surprisingly, it occupies a significant position on the Check Point top mobile malware charts. A variant of the malware, AhRat, was found in a weaponized app called ‘iRecorder – Screen Recorder’ available in the Google Play Store with over 50,000 downloads.

A “clean” version of the application has been available for Android users since 2021, and the malicious characteristics were only added later. In addition to iRecorder’s self-explanatory screen-grabbing feature, its malicious update includes sound recording and data exfiltration capabilities, including retrieval of saved web pages, images, audio, video, document, and

archive formats. The spyware functionalities may suggest a cyber-espionage campaign, which is not uncommon in the mobile malware world. For example, there is the Kamran Android malware which is specifically designed to target Urdu-speaking victims in Pakistan, or the Chinese-aligned APT operated BadBazaar Android spyware.

As always, these types of malware are also often exploited for financial gain by cyber criminals. For example, the newly emerged Chameleon Android banking Trojan targets Australian and European users’ mobile banking and cryptocurrency applications. A similar campaign was observed in India, where malicious apps impersonating banks and government services were distributed via social media platforms. Ransomware was also given a new spin within the Android ecosystem: SpyLoan applications were spread through Google Play Store to over 12 million users in Asia, Africa and South America. The malware collected victims’ personal and financial data from their mobile devices, which it used to harass and blackmail them to extort funds.

Ransomware

This section features information derived from almost 200 ransomware “shame sites” operated by double-extortion ransomware groups, 68 of which posted the names and information of victims from 2023. Cybercriminals use these sites to amplify pressure on victims who do not pay the ransom immediately. The data from these shame sites carries its own biases but still provides valuable insights into the ransomware ecosystem, which is currently the number one risk to businesses. The data presented below was collected for the period between January and December 2023.

Top Double-Extortion Ransomware Actors

In 2023, a total of 68 active ransomware groups reported they had breached the systems of and publicly extorted over 5,000 victims. This marks a substantial increase over past years. The ransomware events only intensified as 2023 went on. H2 recorded more than 2,800 victims compared to 2,200 in the first half of the year. Lockbit emerged as the most active during this period, responsible for 21% of the reported incidents with over 1,050 cases. Typically, threat actors grant victims a one-to-two-week grace period to meet the ransom demands. Victims who pay the ransom are not publicly exposed, which suggests that the actual number of victims could be significantly higher.

ALPHV, also known as BlackCat, targeted over 440 victims in 2023 and was the focus of a law enforcement operation. In December, a US-led operation resulted in the takedown of the group’s websites and the release of a decryption tool. According to CISA, since the beginning of its operations, the group compromised more than 1,000 victims and received ransom payments totaling nearly $300 million. The group has since resumed its criminal operation and its presence on the Dark Web.

CL0P’s activity is underrepresented in this count. In early June, CL0P exploited a zero-day vulnerability that allowed it to gain access to the MOVEit file-transfer software, leading to the compromise of over 2,600 organizations. Most of the victims’ identities were not disclosed on its shame site and therefore not included in the above count. CL0P also utilized alternative methods to further extort its victims. CL0P’s use of zero-day exploits this year also included an attack on GoAnywhere, which is detailed in another section of this report.

In terms of geographical distribution, 45% of the affected companies are situated in the United States, followed by the United Kingdom at 7%, and Canada, Germany, and Italy each at 4%. The presence of Russian victims on this list in 2023 can be attributed primarily to two actors: MalasLocker and Werewolves. Cyberattacks on entities from the former Soviet Union remain relatively infrequent. MalasLocker, active in the first part of 2023, adopted an unconventional approach by replacing traditional ransomware demands with requests for charitable donations.

When analyzing the industry sectors affected by ransomware attacks, data from the Check Point Threat Cloud highlights the education, government, and healthcare sectors as the primary targets. However, the ransomware victim landscape offers a different view. Manufacturing and retail sectors exhibit the highest number of victims, while government and education entities are positioned lower in the target hierarchy. In December 2023 alone, prominent companies like Coca-Cola Singapore (DragonForce), Nissan Motor Australia (Akira), Kraft Heinz (Snatch), Xerox (Inc ransom) were all claimed as victims by double-extortion ransomware groups.

The aforementioned discrepancy likely arises from differences in the willingness of these sectors to comply with ransom demands, with educational and governmental organizations being less inclined to make payments. These sectors are primarily targeted for the exploitation of their data, including personal and technical information, rather than for extortion-based attacks.

Top Double-Extortion Ransomware Actors

Victims by country, as reported on shame sites - 2023

USA
45%
UK
7%
Canada
4%
Germany
4%
Italy
4%
France
3%
Australia
2%
Spain
2%
Brazil
2%
India
2%
Russia
1%

Industry distribution of ransomware victims, as reported on shame sites – 2023

Manufacturing
22%
Retail/ Wholesale
10%
Consultant
9%
Healthcare
8%
Education/ Research
7%
Software Vendor
6%
Insurance/ Legal
6%
Finance/ Banking
6%
Transportation/ Logistics
5%
Government/ Military
4%
Leisure/ Hospitality
3%
Communications
3%
ISP/ MSP/ IT
3%
Energy/ Utilities
2%