The subsequent most prevalent malware packages noticed have been GootLoader, a JavaScript-based downloader and dropper; WIREFIRE, a Python internet shell for Ivanti Pulse Safe home equipment; SystemBC, a proxy tunneler with a customized communication protocol that may additionally execute extra payloads from a C2 server; and the Akira, RansomHub, LockBit and Basta ransomware packages.
Stolen and weak credentials gas ransomware and cloud compromises
When it comes to ransomware, the commonest an infection vector noticed by Mandiant final 12 months have been brute-force assaults (26%), equivalent to password spraying and use of frequent default credentials, adopted by stolen credentials and exploits (21% every), prior compromises leading to offered entry (15%), and third-party compromises (10%).
Cloud accounts and belongings have been compromised by means of phishing (39%), stolen credentials (35%), SIM swapping (6%), and voice phishing (6%). Over two-thirds of cloud compromises resulted in information theft and 38% have been financially motivated with information extortion, enterprise electronic mail compromise, ransomware, and cryptocurrency fraud being main objectives.