These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data.
According to Kaspersky Security Network, in Q3 2023:
In Q3 2023, Kaspersky solutions blocked the launch of at least one piece of banking malware on the computers of 76,551 unique users.
Number of unique users attacked by financial malware, Q3 2023 (download)
To assess the extent to which PC users in different countries and territories are at risk of infection by banking Trojans and ATM/PoS malware, for each country and territory we calculated the share of Kaspersky users who encountered this threat during the reporting period out of all users of our products in the given country or territory.
TOP 10 countries and territories by share of attacked users
Country or territory* | %** | |
1 | Afghanistan | 3.9 |
2 | Turkmenistan | 3.5 |
3 | China | 2.4 |
4 | Tajikistan | 2.1 |
5 | Yemen | 1.7 |
6 | Egypt | 1.5 |
7 | Thailand | 1.5 |
8 | Venezuela | 1.4 |
9 | Syria | 1.4 |
10 | Paraguay | 1.2 |
* Excluded are countries and territories with relatively few Kaspersky users (under 10,000).
** Unique users whose computers were targeted by financial malware as a percentage of all unique users of Kaspersky products in the country/territory.
TOP 10 banking malware families
Name | Verdicts | %* | |
1 | Ramnit/Nimnul | Trojan-Banker.Win32.Ramnit | 34.0 |
2 | Zbot/Zeus | Trojan-Banker.Win32.Zbot | 16.0 |
3 | Emotet | Trojan-Banker.Win32.Emotet | 12.6 |
4 | CliptoShuffler | Trojan-Banker.Win32.CliptoShuffler | 7.1 |
5 | SpyEyes | Trojan-Spy.Win32.SpyEye | 3.0 |
6 | Danabot | Trojan-Banker.Win32.Danabot | 2.4 |
7 | Qbot/Qakbot | Trojan-Banker.Win32.Qbot | 2.1 |
8 | Gozi | Trojan-Banker.Win32.Gozi | 0.9 |
9 | Tinba | Trojan-Banker.Win32.Tinba | 0.8 |
10 | IcedID | Trojan-Banker.Win32.IcedID | 0.6 |
* Unique users who encountered this malware family as a percentage of all users attacked by financial malware.
In Q3, ransomware groups were detected exploiting vulnerabilities in various server software. For example, CVE-2023-3519, a remote code execution vulnerability in Citrix NetScaler, was used by attackers believed to be affiliated with the BlackCat/ALPHV group. The groups using Akira and Lockbit malware exploited the CVE-2023-20269 vulnerability in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) as a way to compromise victims’ networks. The Cuba group utilized an exploit for the CVE-2023-27532 vulnerability in Veeam Backup & Replication (VBR) to extract credentials from the configuration files of this software. Also detected were attacks by unknown ransomware on unpatched Openfire servers with CVE-2023-32315. This vulnerability allows an unauthenticated attacker to create an administrative account on the server and install arbitrary malware in the form of a JAR plugin.
Our Q2 report already noted a significant amount of news coverage of ransomware attacks on hospitals, universities, and municipal organizations. This trend continued in Q3. Among the victims of high-profile incidents in the healthcare industry were: McLaren HealthCare (the BlackCat/ALPHV group claimed responsibility for the attack and posted information about it on its data leak site); Prospect Medical Holdings (the Rhysida group posted a statement on its website announcing the theft of 1 TB of documents and a 1.3 TB database of personal data); PhilHealth (the Medusa group demanded the equivalent of $300,000 and began releasing sensitive data stolen in the attack shortly afterwards).
This section looks at ransomware groups that engage in so-called “double extortion”, that is, stealing and encrypting confidential data. Most of these groups target large companies, and often maintain a DLS (data leak site), where they publish a list of organizations they have attacked. Here’s the chart of the busiest ransomware gangs of Q3 2023:
The most prolific ransomware gangs, Q3 2023 (download)
The diagram shows each group’s share of the total number of victims published on all the DLS sites analyzed.
In Q3 2023, we uncovered nine new ransomware families and 11,387 new modifications of this malware type.
Number of new ransomware modifications, Q3 2022 — Q3 2023 (download)
In Q3 2023, Kaspersky products and technologies protected 46,872 users from ransomware attacks.
Number of unique users attacked by ransomware Trojans, Q3 2023 (download)
TOP 10 countries and territories attacked by ransomware Trojans
Country or territory* | %** | |
1 | Yemen | 1.63 |
2 | Bangladesh | 1.39 |
3 | South Korea | 0.65 |
4 | Pakistan | 0.51 |
5 | Mozambique | 0.51 |
6 | Iraq | 0.27 |
7 | Taiwan | 0.27 |
8 | Mainland China | 0.26 |
9 | Nigeria | 0.26 |
10 | Libya | 0.23 |
* Excluded are countries and territories with relatively few Kaspersky users (under 50,000).
** Unique users whose computers were attacked by ransomware Trojans as a percentage of all unique users of Kaspersky products in the country/territory.
Name | Verdicts* | Share of attacked users** | |
1 | (generic verdict) | Trojan-Ransom.Win32.Gen | 16.80 |
2 | WannaCry | Trojan-Ransom.Win32.Wanna | 14.45 |
3 | (generic verdict) | Trojan-Ransom.Win32.Encoder | 11.98 |
4 | (generic verdict) | Trojan-Ransom.Win32.Phny | 7.26 |
5 | Stop/Djvu | Trojan-Ransom.Win32.Stop | 5.69 |
6 | (generic verdict) | Trojan-Ransom.Win32.Crypren | 5.69 |
7 | Magniber | Trojan-Ransom.Win64.Magni / Trojan-Ransom.Win32.Magni | 4.06 |
8 | PolyRansom/VirLock | Trojan-Ransom.Win32.PolyRansom / Virus.Win32.PolyRansom | 3.43 |
9 | (generic verdict) | Trojan-Ransom.Win32.Agent | 2.72 |
10 | Lockbit | Trojan-Ransom.Win32.Lockbit | 2.39 |
* Statistics are based on detection verdicts of Kaspersky products. The information was provided by Kaspersky product users who consented to providing statistical data.
** Unique Kaspersky users attacked by specific ransomware Trojan families as a percentage of all unique users attacked by ransomware Trojans.
In Q3 2023, Kaspersky solutions detected 2199 new miner modifications.
Number of new miner modifications, Q3 2023 (download)
In Q3, we detected attacks that used miners on the computers of 363,120 unique users of Kaspersky products worldwide.
Number of unique users attacked by miners, Q3 2023 (download)
TOP 10 countries and territories attacked by miners
Country or territory* | %** | |
1 | Tajikistan | 2.38 |
2 | Kazakhstan | 1.96 |
3 | Uzbekistan | 1.69 |
4 | Venezuela | 1.57 |
5 | Kyrgyzstan | 1.56 |
6 | Mozambique | 1.44 |
7 | Pakistan | 1.44 |
8 | Belarus | 1.43 |
9 | Sri Lanka | 1.30 |
10 | Ukraine | 1.19 |
* Excluded are countries and territories with relatively few users of Kaspersky products (under 50,000).
** Unique users attacked by miners as a percentage of all unique users of Kaspersky products in the country/territory.
Q3 2023 was quite eventful in terms of in-the-wild (ITW) vulnerability discoveries. Worth noting are:
Since each of these vulnerabilities was found ITW, we recommend installing the latest updates of the relevant software.
As is customary, Microsoft Office (80.14%) ranks first by number of attempts to exploit vulnerabilities in Q3, gaining 4.5 p.p. Cybercriminals continue to use old vulnerabilities to attack unpatched corporate systems. Among the most commonly exploited vulnerabilities in the suite are:
Distribution of exploits used by cybercriminals, by type of attacked application, Q3 2023 (download)
In second place are browsers (5.85%), whose share decreased by 2 p.p. against the previous quarter. The Android platform (4.70%) rounds out the TOP 3: exploits for it were up by 0.37 p.p. against the previous period.
Network threats in Q3 2023 are mainly brute-force password attacks on MSSQL and RDP services. Note that among exploits for operating system vulnerabilities, EternalBlue and EternalRomance remain popular. Additionally, we observed scanning for Log4j-type vulnerabilities (CVE-2021-44228), attacks on them, and probing of systems for insecure deserialization in Java.
This quarter saw the appearance of a new version of XLoader masquerading as a popular document viewing and editing application. As with previous versions, the Trojan grabs clipboard contents and authorization data from Chrome and Firefox browsers.
TOP 20 threats for macOS
Verdict | %* | |
1 | AdWare.OSX.Agent.ai | 9.08 |
2 | AdWare.OSX.Pirrit.ac | 6.84 |
3 | Hoax.OSX.MacBooster.a | 6.32 |
4 | AdWare.OSX.Agent.ap | 6.05 |
5 | Monitor.OSX.HistGrabber.b | 5.82 |
6 | AdWare.OSX.Amc.e | 5.72 |
7 | AdWare.OSX.Bnodlero.ax | 4.75 |
8 | AdWare.OSX.Pirrit.j | 4.33 |
9 | Trojan.OSX.Agent.gen | 4.25 |
10 | AdWare.OSX.Agent.gen | 3.84 |
11 | AdWare.OSX.Pirrit.ae | 3.39 |
12 | AdWare.OSX.Mhp.a | 2.97 |
13 | Trojan-Downloader.OSX.Agent.h | 2.74 |
14 | AdWare.OSX.Amc.c | 2.35 |
15 | Downloader.OSX.InstallCore.ak | 2.32 |
16 | AdWare.OSX.Pirrit.aa | 2.17 |
17 | AdWare.OSX.Bnodlero.bg | 2.09 |
18 | AdWare.OSX.Pirrit.gen | 2.06 |
19 | Backdoor.OSX.Twenbc.g | 2.01 |
20 | AdWare.OSX.Pirrit.o | 1.88 |
* Unique users who encountered this malware as a percentage of all users of Kaspersky security solutions for macOS who were attacked.
Adware programs and fake system accelerators remained the main threat to macOS users in Q3.
TOP 10 countries and territories by share of attacked users
Country or territory* | %** | |
1 | Hong Kong | 1.40 |
2 | Mainland China | 1.19 |
3 | Italy | 1.16 |
4 | France | 1.06 |
5 | United States | 1.04 |
6 | Mexico | 0.98 |
7 | Spain | 0.96 |
8 | Australia | 0.86 |
9 | United Kingdom | 0.81 |
10 | Russian Federation | 0.81 |
* Excluded from the rankings are countries and territories with relatively few users of Kaspersky security solutions for macOS (under 10,000).
** Unique attacked users as a percentage of all users of Kaspersky macOS security products in the country/territory.
In Q3 2023, the distribution of devices attacking Kaspersky traps using the Telnet and SSH protocols did not change significantly.
Distribution of attacked services by number of unique IP addresses of attacking devices, Q3 2023
In terms of session numbers, Telnet accounted for the absolute majority.
Distribution of cybercriminal working sessions with Kaspersky traps, Q3 2023
In Q3, the main sources of SSH attacks were again the United States and the APAC region. The share of attacks emanating from the mainland China (20.14%) rose, while those from South Korea (3.63%) and Vietnam (2.76%) fell slightly. The shares of other countries and territories changed insignificantly.
TOP 10 countries and territories as sources of SSH attacks
Country or territory | %* | |
Q2 2023 | Q3 2023 | |
Mainland China | 12.63 | 20.14 |
United States | 11.50 | 11.58 |
India | 5.01 | 5.54 |
Singapore | 5.32 | 5.54 |
Germany | 4.21 | 4.68 |
Brazil | 4.57 | 4.30 |
Russian Federation | 3.73 | 3.92 |
South Korea | 6.21 | 3.63 |
Vietnam | 3.39 | 2.76 |
Hong Kong | 2.33 | 2.64 |
Other | 41.96 | 35.27 |
* Unique IP addresses located in a country/territory as a percentage of all unique IP addresses where SSH attacks on Kaspersky honeypots originated.
Cybercriminals controlling devices in India increased their share of the total number of Telnet-based attacks (to 20.07%), while the share of threat actors owning devices in the mainland China dropped slightly (to 31.58%).
TOP 10 countries and territories as sources of Telnet attacks
Country or territory | %* | |
Q2 2023 | Q3 2023 | |
Mainland China | 35.38 | 31.58 |
India | 14.03 | 20.07 |
United States | 4.41 | 4.38 |
Brazil | 6.36 | 4.20 |
Russian Federation | 4.33 | 3.81 |
Taiwan | 2.79 | 2.67 |
South Korea | 2.51 | 2.50 |
Egypt | 0.93 | 2.35 |
Namibia | 0.41 | 2.13 |
Argentina | 2.24 | 2.11 |
Other | 20.40 | 24.19 |
* Unique IP addresses located in a country/territory as a percentage of all unique IP addresses where Telnet attacks on Kaspersky honeypots originated.
TOP 10 threats delivered to IoT devices via Telnet
Verdict | %* | |
1 | Trojan-Downloader.Linux.NyaDrop.b | 39.16 |
2 | Backdoor.Linux.Mirai.b | 16.95 |
3 | Backdoor.Linux.Mirai.ba | 9.03 |
4 | Backdoor.Linux.Mirai.es | 6.39 |
5 | Backdoor.Linux.Mirai.cw | 5.97 |
6 | Backdoor.Linux.Mirai.fg | 3.58 |
7 | Trojan.Linux.Agent.nx | 2.22 |
8 | Trojan-Downloader.Linux.Mirai.d | 1.87 |
9 | Trojan-Downloader.Shell.Agent.p | 1.77 |
10 | Backdoor.Linux.Gafgyt.a | 1.62 |
* Share of each threat delivered to infected devices as a result of a successful Telnet attack out of the total number of delivered threats.
The statistics in this section come from Web Anti-Virus, which protects users when malicious objects are downloaded from malicious or infected web pages. Cybercriminals create such sites on purpose; they can infect hacked legitimate resources as well as web resources with user-created content, such as forums.
The following statistics show the distribution by country and territory of the sources of internet attacks blocked by Kaspersky products on user computers (web pages with redirects to exploits, sites hosting malicious programs, botnet C&C centers, etc.). Any unique host could be the source of one or more web-based attacks.
To determine the geographic source of web attacks, the GeoIP technique was used to match the domain name to the real IP address at which the domain is hosted.
In Q3 2023, Kaspersky solutions blocked 694,400,301 attacks from online resources located across the globe. A total of 169,194,807 unique URLs were recognized as malicious by Web Anti-Virus components.
Distribution of web-attack sources by country and territory, Q3 2023 (download)
To assess the risk of online infection faced by users in different countries and territories, for each country and territory we calculated the share of Kaspersky users on whose devices Web Anti-Virus was triggered at least once during the reporting period. The resulting data provides an indication of the aggressiveness of the environment in which computers operate in different countries and territories.
Note that these rankings only include attacks by malicious objects that fall under the Malware class; they do not include Web Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.
Country or territory* | %** | |
1 | Belarus | 15.42 |
2 | Moldova | 15.35 |
3 | Albania | 14.05 |
4 | Taiwan | 13.46 |
5 | North Macedonia | 13.08 |
6 | Bulgaria | 12.84 |
7 | Serbia | 12.75 |
8 | Kyrgyzstan | 12.73 |
9 | Latvia | 12.64 |
10 | Greece | 12.53 |
11 | Estonia | 12.06 |
12 | Bangladesh | 11.94 |
13 | Nepal | 11.91 |
14 | Sri Lanka | 11.91 |
15 | Slovenia | 11.70 |
16 | Algeria | 11.61 |
17 | Turkey | 11.58 |
18 | Bosnia and Herzegovina | 11.22 |
19 | Belgium | 11.15 |
20 | Canada | 11.04 |
* Excluded are countries and territories with relatively few Kaspersky users (under 10,000).
** Unique users targeted by Malware-class attacks as a percentage of all unique users of Kaspersky products in the country/territory.
On average during the quarter, 8.81% of computers of internet users worldwide were subjected to at least one Malware-class web attack.
In this section, we analyze statistical data obtained from the OAS (On-Access Scan) and ODS (On-Demand Scan) modules in Kaspersky products. It takes into account malicious programs that were found directly on users’ computers or removable media connected to them (flash drives, camera memory cards, phones, external hard drives), or which initially made their way onto the computer in non-open form (for example, programs in complex installers, encrypted files, etc.).
In Q3 2023, our File Anti-Virus detected 33,847,517 malicious and potentially unwanted objects.
For each country and territory, we calculated the percentage of Kaspersky product users on whose computers File Anti-Virus was triggered during the reporting period. These statistics reflect the level of personal computer infection in different countries and territories worldwide.
The ranking includes only Malware-class attacks; it doesn’t consider File Anti-Virus triggerings by potentially dangerous or unwanted programs such as RiskTool or adware.
Country or territory* | %** | |
1 | Turkmenistan | 49.40 |
2 | Yemen | 44.54 |
3 | Afghanistan | 40.48 |
4 | Tajikistan | 39.09 |
5 | Burundi | 34.92 |
6 | Bangladesh | 34.45 |
7 | Myanmar | 33.78 |
8 | South Sudan | 33.63 |
9 | Syria | 33.60 |
10 | Benin | 33.12 |
11 | Guinea | 32.81 |
12 | Chad | 32.61 |
13 | Cameroon | 31.92 |
14 | Tanzania | 31.90 |
15 | Uzbekistan | 31.86 |
16 | Republic of the Congo | 31.51 |
17 | Democratic Republic of the Congo | 31.18 |
18 | Malawi | 30.82 |
19 | Burkina Faso | 30.77 |
20 | Rwanda | 30.55 |
* Excluded are countries and territories with relatively few Kaspersky users (under 10,000).
** Unique users on whose computers Malware-class local threats were blocked, as a percentage of all unique users of Kaspersky products in the country or territory.
Overall globally, 15.4% of user computers faced at least one Malware-class local threat during Q3.