{"id":1663,"date":"2025-04-22T12:26:04","date_gmt":"2025-04-22T12:26:04","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=1663"},"modified":"2025-04-22T12:26:04","modified_gmt":"2025-04-22T12:26:04","slug":"most-regularly-encountered-malware-and-abused-software-program-sophos-information","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=1663","title":{"rendered":"Most regularly encountered malware and abused software program \u2013 Sophos Information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>This appendix to our <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2025\/04\/16\/the-sophos-annual-threat-report-cybercrime-on-main-street-2025\/\">Annual Risk Report<\/a> supplies extra statistics on incident information and telemetry detailing the instruments utilized by cybercriminals focusing on small and midsized companies (SMBs). For a broader take a look at the menace panorama dealing with SMBs, see our<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2025\/04\/16\/the-sophos-annual-threat-report-cybercrime-on-main-street-2025\/\"> fundamental report<\/a>.<\/p>\n<h2>Appendix Contents:<\/h2>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600941\"\/>Most often-encountered malware varieties<\/h3>\n<p>Small and midsized companies face an unlimited set of threats to information\u2014a few of which can be precursors to ransomware assaults or could lead to different breaches of delicate data. Ransomware dominates the malware noticed in Sophos MDR and Sophos Incident Response instances from 2024, with the highest 10 accounting for over 25% of all incidents MDR and IR tracked over the 12 months. However they weren&#8217;t the whole story, and almost 60% of MDR incidents concerned threats not involving ransomware.<\/p>\n<p>\u00a0<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960448 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide7.png\" alt=\" Other12.79% Miner 0.89% Ransomware 1.18% Web\/Browser Hijack 3.60% Attack tool\/Exploit\/EDR Killer 7.95% RAT\/Backdoor 15.52% Stealer\/Spyware 18.63% Loader\/Downloader\/Dropper 39.74% 9.13% of all malware was malware-as-a-service\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide7.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide7.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide7.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><\/p>\n<p><em>Determine 13: Probably the most generally seen classes of malware detection seen in 2024, based mostly on buyer detection reviews<\/em><\/p>\n<figure id=\"attachment_960449\" aria-describedby=\"caption-attachment-960449\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide8.png\" data-wp-editing=\"1\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960449 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide8.png\" alt=\"Qilin (ransomware)1.05% Blacksuit (ransomware) 1.23% Faust (ransomware) 1.23% Crytox (ransomware) 1.41% Playcrypt (ransomware) 1.58% Black Basta (ransomware) 1.93% RansomHub (ransomware) 2.28% Gootloader (malware loader\/dropper) 2.64% ChromeLoader (malware loader\/dropper) 3.51% Fog (ransomware) 3.51% LockBit (ransomware) 4.39% Lumma Stealer (information stealer) 4.57% Akira (ransomware) 4.92% Cobalt Strike (C2 tool) 8.08% Web shell (C2) 9.84%\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide8.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide8.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide8.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960449\" class=\"wp-caption-text\"><em>Determine 14: High 15 malware and assault instruments encountered in MDR and IR incidents<\/em><\/figcaption><\/figure>\n<p>Command-and-control instruments, malware loaders, distant administration instruments, and information-stealing malware make up nearly all of the malicious software program seen focusing on small companies (apart from ransomware). And these instruments, not all of that are technically malware, are used as a part of the supply of ransomware and different cybercriminal assaults.<\/p>\n<p>Solely one of many high 10 instruments and malware seen in Sophos MDR and IR incidents doesn&#8217;t fall into this class: XMRig. It&#8217;s a cryptocurrency-mining malware usually used to passively generate income <em>earlier than<\/em> entry is offered or in any other case exploited by a ransomware actor.<\/p>\n<figure id=\"attachment_960579\" aria-describedby=\"caption-attachment-960579\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960579 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png\" alt=\"\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960579\" class=\"wp-caption-text\"><em>Determine 20: High information-stealing malware detections reported by endpoint safety clients<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_960523\" aria-describedby=\"caption-attachment-960523\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide12_be34bf.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960523 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide12_be34bf.png\" alt=\"ExMatter (data exfiltration)0.56% Backstab (EDR killer) 0.56% Parcel RAT 0.56% DataGrabber (data exfiltration) 0.56% AsyncRAT 0.56% Sliver attack tool 0.56% Pikabot backdoor 0.56% Brute Ratel C4 0.56% Metasploit exploit framework 1.11% Grixba network scanning tool 1.11% SystemBC proxy\/RAT 1.67% XMRIG miner malware 2.22% Web shell 7.22% Cobalt Strike attack tool 10.56%\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide12_be34bf.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide12_be34bf.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide12_be34bf.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960523\" class=\"wp-caption-text\"><em>Determine 16: High non-ransomware malware and instruments seen in Sophos MDR and Sophos Incident Response instances particularly in ransomware-related incidents<\/em><\/figcaption><\/figure>\n<p>\u00a0<\/p>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600942\"\/>Twin-use instruments<\/h3>\n<p>One development that continues from earlier years is the intensive use of typically accessible industrial, freeware, and open-source software program by cybercriminals to conduct ransomware assaults and different malicious exercise. Sophos MDR refers to those as \u201cdual-use instruments,\u201d as they might be current on networks for professional causes, however are regularly utilized by cybercriminals for malicious functions.<\/p>\n<p>Twin-use instruments are completely different from \u201cliving-off-the-land binaries\u201d (LOLBins) in that they&#8217;re full functions deployed and used as supposed by malicious actors, moderately than working system-supplied parts and scripting engines. Among the instruments that fall into \u201ctwin use\u201d are particularly safety testing-oriented and supposed for crimson groups\u2014Impacket and Mimikatz are open-source instruments that had been constructed particularly for safety researchers. Others akin to SoftPerfect Community Scanner and Superior IP Scanner are supposed as instruments for community directors, however can be utilized by cybercriminals for discovery of networked gadgets and open community ports.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" style=\"font-size: 1em\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-960452 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11.png\" alt=\"Advanced Port Scanner (network discovery)4.92% FileZilla (file exfiltration) 5.10% Rclone (file exfiltration) 7.38% 7-Zip (file archiving\/encryption) 7.38% PuTTy (remote command execution) 7.73% ScreenConnect (remote desktop access) 9.14% WinRAR (file archiving\/encryption) 9.31% Sophos Uninstall (security tool removal) 9.49% Advanced IP Scanner (network discovery) 10.72% Mimikatz (credential dumping) 11.60% RDPclip (remote\/local shared clipboard) 16.70% Impacket (network protocol exploitation) 17.05% AnyDesk (remote desktop access) 17.40% PsExec (remote command execution) 18.28% SoftPerfect Network Scanner (network discovery) 19.51%\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><\/p>\n<p><em>Determine 17: High 15 \u201ctwin use\u201d instruments seen in Sophos MDR and Sophos Incident Response incidents, by frequency<\/em><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/dual-use.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-960565\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/dual-use.png\" alt=\"\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/dual-use.png 1280w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/dual-use.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/dual-use.png?resize=768,432 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/dual-use.png?resize=1024,576 1024w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><\/p>\n<p><em>Determine 18: High 9 \u201ctwin use\u201d assault instruments in Sophos endpoint detections<\/em><a rel=\"nofollow\" target=\"_blank\" class=\"CID557ddb98-b6b2-4db5-8b5c-7252cde8f4e5\" data-copystatus=\"32\" data-copyfailedreason=\"0\" data-clipservice-ccpid=\"cb280f8b-bbb2-4cf9-8793-f3869bf93a92\" data-clipservice-version=\"0\" data-clipservice-location=\"5Lt1S21uTUGEWzWqh0xmYWNodHRwczovL2xuMnBlcGYwMDAwZDA4MTo4Mi9wb2RzL3BvZENsaXAuc3ZjP1BvZFNJRD1fLl8uXy5hNDUyMzhiZi02NzM3LTlhZmEtNDVkOS05MjNiOWYwMGFjM2EtLi0uLS41\" data-clipservice-dc=\"GUK5\" data-clipservice-type=\"shape\" data-clipservice-count=\"1\" data-clipservice-cut=\"false\" data-clipservice-isemptyplaceholder=\"false\" data-pkey=\"b8a408fa-5e4c-4c45-9684-f35501dce679\" data-timestamp=\"Wed, 16 Apr 2025 09:16:03 GMT\" data-clipboardasbytes-url=\"https:\/\/ukc-powerpoint.officeapps.live.com\/pods\/GetClipboardBytes.ashx?Id=cb280f8b-bbb2-4cf9-8793-f3869bf93a92&amp;DC=GUK5&amp;pkey=b8a408fa-5e4c-4c45-9684-f35501dce679&amp;wdwaccluster=GUK5&amp;DataType=shape\" data-clipservice-param=\"{&quot;uud&quot;:[true],&quot;vud&quot;:[false]}\" data-sessionid=\"2ac821fe-3279-28e4-98b8-c4608a1244ce\" data-shapeids=\"3\" data-slideid=\"\">\u00a0<\/a><\/p>\n<p>Business distant entry instruments are collectively essentially the most regularly used dual-use instruments encountered in MDR and IR incidents:<\/p>\n<figure id=\"attachment_960532\" aria-describedby=\"caption-attachment-960532\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960532 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide13.png\" alt=\"TypeFrequency LevelRMM (remote machine management) 0.70% RemCom (remote command execution) 0.70% MobaXterm (remote shell) 0.88% VNC (remote desktop) 1.58% NetSupport (remote machine management) 1.76% Cloudflared (Cloudflare network tunneling client) 1.76% Ngrok (web application tunneling) 2.11% WinRM (remote machine management) 2.28% Splashtop (remote desktop) 2.99% TeamViewer (remote desktop) 3.16% Atera (remote machine management) 3.51% OpenSSH (remote shell) 4.04% PuTTy (remote shell) 7.73% ScreenConnect (remote desktop) 9.14% AnyDesk (remote desktop) 17.40% PSExec (remote command execution) 18.28%\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide13.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide13.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide13.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960532\" class=\"wp-caption-text\"><em>Determine 19: High 15 dual-use instruments seen in Sophos MDR and Incident Response incidents, by frequency<\/em><\/figcaption><\/figure>\n<p>With industrial distant entry instruments, the attackers normally abuse trial account licenses or use pirated licenses for the variations they deploy to focused machines. In lots of instances, that is completed after preliminary exploitation by malware droppers, internet shells, or different command-and-control instruments. In others, it&#8217;s pushed by social engineering\u2014getting a focused particular person to obtain and set up the instrument themselves, as we have now seen in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2025\/01\/21\/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing\/\">current Groups \u201cvishing\u201d assaults<\/a>.<\/p>\n<p>Use of professional distant machine administration instruments, notably by ransomware actors, has been rising, although distant desktop entry instruments AnyDesk and ScreenConnect stay essentially the most regularly used industrial IT assist instruments seen in Sophos MDR and IR incidents. And the commonest instrument stays <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/psexec\">PSExec<\/a>, a Microsoft \u201c<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/psexechttps:\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/psexec\">light-weight Telnet replacemen<\/a>t\u201d used to remotely execute instructions and create command shell classes.<\/p>\n<p>Sophos clients can prohibit their utilization by Sophos Central utilizing software management insurance policies\u2014and may prohibit any instruments that aren&#8217;t getting used for professional IT assist.<\/p>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600943\"\/>Assault instruments<\/h3>\n<p>Cobalt Strike, Sliver, Metasploit, and Brute Ratel are penetration testing instruments, and never malware within the authorized sense. However they&#8217;re regularly used to ship malware and for command and management of malware assaults. Having a well-documented, commercially supported post-exploitation instrument like these is a serious plus for cybercriminals who would in any other case should construct their very own instruments to develop their footprint inside a focused group.<\/p>\n<p>Cobalt Strike stays essentially the most closely used of those assault instruments, current in eight p.c of all incidents and almost 11 p.c of ransomware-related incidents. It is a vital decline from 2023, when Cobalt Strike was the third most regularly seen industrial instrument utilized in MDR incidents, rating solely behind the AnyDesk and PSExec distant entry instruments. Sliver and Metasploit-based instruments, which can be found as open-source, are seen even much less regularly, and Brute Ratel utilization by cybercriminals stays extraordinarily uncommon.<\/p>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600944\"\/>Data stealers<\/h3>\n<figure id=\"attachment_960579\" aria-describedby=\"caption-attachment-960579\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960579 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png\" alt=\"\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide17_68263e.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960579\" class=\"wp-caption-text\">Determine 20: High information-stealing malware detections reported by endpoint safety clients<\/figcaption><\/figure>\n<p>\u00a0<\/p>\n<p>Data-stealing malware is usually step one within the entry dealer\u2019s playbook, offering passwords, cookies, and different information that can be utilized for monetary fraud, enterprise electronic mail compromise, and ransomware assaults, amongst different schemes.<\/p>\n<p>Lumma Stealer, offered by Russian-speaking boards as a Malware-as-a-Service (MaaS), was essentially the most regularly encountered data stealer in MDR incidents, and second in general endpoint detection reviews. A significant Lumma Stealer marketing campaign starting in October made it essentially the most reported stealer for the final quarter of 2024, far surpassing final 12 months\u2019s MaaS stealer chief RaccoonStealer (which launched\u00a0 a brand new model in 2024 after its infrastructure was disrupted) and by 12 months\u2019s finish eclipsing Strela Stealer (which was rising within the ranks in 2023; it peaked early in 2024, however trailed off within the second half of the 12 months). No MDR incidents tracked in 2024 concerned Strela Stealer.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" style=\"font-size: 1em\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-960444 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide3.png\" alt=\"A chart showing a histogram of Lumma Stealer detections, with a majority of detections occurring in October and November of 2024. \" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide3.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide3.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide3.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><\/p>\n<p><em>Determine 21: Lumma Stealer exercise in 2024 as noticed in buyer endpoint detections<\/em><\/p>\n<figure id=\"attachment_960445\" aria-describedby=\"caption-attachment-960445\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960445 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide4.png\" alt=\"A histogram showing a peak of Lumma Stealer events in November\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide4.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide4.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide4.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960445\" class=\"wp-caption-text\"><em>Determine 22: Lumma Stealer associated MDR incidents in 2024<\/em><\/figcaption><\/figure>\n<p>\u00a0<\/p>\n<figure id=\"attachment_960447\" aria-describedby=\"caption-attachment-960447\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960447 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide6.png\" alt=\"A histogram showing spikes of Strela Stealer detections in February, March and July of 2024.\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide6.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide6.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide6.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960447\" class=\"wp-caption-text\"><em>Determine 23: Strela Stealer exercise in 2024 as noticed in buyer endpoint detections<\/em><\/figcaption><\/figure>\n<p>First tracked in August 2022, Lumma Stealer is believed to be a successor of\u00a0 Mars Stealer, one other data stealer <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/darktrace.com\/blog\/the-rise-of-the-lumma-info-stealer\">purportedly of Russian origin<\/a>. This stealer primarily targets cryptocurrency wallets, browser session cookies, browser two-factor authentication extensions, saved File Switch Protocol server addresses and credentials, and different person and system information.<\/p>\n<p>Like another data stealers (akin to Raccoon Stealer), Lumma Stealer can be used to ship extra malware\u2014both by launching executables or PowerShell scripts, or by loading malicious DLLs from its personal course of. Usually, Lumma Stealer is delivered from a\u00a0 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2024\/10\/20\/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha\">compromised web site (usually a faux CAPTCHA internet web page) as a obtain<\/a> that victims are delivered to through <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/tag\/malvertising\/\">malvertising<\/a>.<\/p>\n<p>Lumma Stealer is mostly related to broader cybercriminal exercise. One other MaaS stealer offered on Russian-language boards, StealC, was seen with a a lot increased correlation to ransomware incidents. Launched in January 2023, it has been <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.sekoia.io\/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1\/\">labeled by researchers as a RaccoonStealer and Vidar copyca<\/a>t.<\/p>\n<p>Of regional observe is Mispadu Stealer, which continues to focus on Latin America (and Mexico specifically). Within the second quarter of 2024, it was the second-most detected stealer, coming in simply behind Strela Stealer, with 74% of these detections coming from Mexico.\u00a0 It has been seen utilizing malicious internet and search promoting, notably posing as internet advertisements for McDonald\u2019s.<\/p>\n<h2><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600945\"\/>High ransomware threats<\/h2>\n<figure id=\"attachment_960524\" aria-describedby=\"caption-attachment-960524\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11_b22d78.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960524 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11_b22d78.png\" alt=\"Stealc (information stealer)0.35% AsyncRAT (RAT with infostealer features) 0.53% More_eggs (RAT that can carry infostealer payload) 0.53% Brute Ratel C4 (red team C2 tool) 0.53% Metasploit (red team command and control tool) 0.70% Remcos (RAT) 0.70% FakeBat \/EugenLoader (malware loader) 0.70% Sliver (red team C2 tool) 0.88% XMRIG (cryptocurrency miner) 1.05% SystemBC (proxy and RAT) 1.05% Gootloader (malware loader) 2.64% ChromeLoader (browser malware loader) 3.51% Lumma Stealer (information stealer) 4.57% Cobalt Strike (red team C2 tool with information stealing modules) 8.08% Web shell (malware deployment, command and control) 9.84%\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11_b22d78.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11_b22d78.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide11_b22d78.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960524\" class=\"wp-caption-text\"><em>Determine 24: Most regularly detected ransomware households throughout all Sophos endpoint clients<\/em><\/figcaption><\/figure>\n<p>\u00a0<\/p>\n<figure id=\"attachment_960525\" aria-describedby=\"caption-attachment-960525\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide20.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960525 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide20.png\" alt=\"Cicada33011.64% Mimic 1.64% Hunters International 2.19% INC Ransomware 2.19% 8Base 2.73% Qilin 3.28% Blacksuit 3.83% Faust 3.83% Crytox 4.37% Playcrypt 4.92% Black Basta 6.01% RansomHub 7.10% Fog 10.93% LockBit 13.66% Akira 15.30%\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide20.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide20.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide20.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960525\" class=\"wp-caption-text\"><em>Determine 25: The highest ransomware households encountered in MDR and Incident Response incidents<\/em><\/figcaption><\/figure>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600946\"\/>LockBit, type of<\/h3>\n<p>Probably the most-detected ransomware household in 2024 was LockBit, however not due to the ransomware group that spawned it. In February 2024, US and UK regulation enforcement <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.justice.gov\/archives\/opa\/pr\/us-and-uk-disrupt-lockbit-ransomware-variant\">claimed to have disrupted the LockBit group<\/a> by seizing the ransomware-as-a-service group\u2019s servers, arresting two of its members, and charging one other in an indictment. Within the wake of this disruption, quite a few variants based mostly on the leaked LockBit 3.0 code turned energetic within the wild, leading to a spike of LockBit detections in early 2024. Nonetheless, by March, detections trailed off considerably with a slight rebound in April and early Could (although the LockBit gang <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.computerweekly.com\/news\/366617379\/LockBit-ransomware-gang-teases-February-2025-return\">will not be gone without end<\/a>).<\/p>\n<p>The teams utilizing LockBit 3.0 regularly used EDR killers and different malware and strategies to aim to disable endpoint safety. Their preliminary entry was usually by VPN accounts that had been compromised (in some instances on account of vulnerabilities within the VPN gadgets themselves), or by the abuse of credentials harvested from unmanaged gadgets to realize distant entry.<\/p>\n<figure id=\"attachment_960446\" aria-describedby=\"caption-attachment-960446\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960446 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide5.png\" alt=\"A histogram of Lockbit variant ransomware detections with a spike in late February 2024.\" width=\"960\" height=\"540\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide5.png 960w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide5.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/04\/Slide5.png?resize=768,432 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"\/><\/a><figcaption id=\"caption-attachment-960446\" class=\"wp-caption-text\"><em>Determine 26: LockBit variant detections per day, 2024<\/em><\/figcaption><\/figure>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600947\"\/>Akira and Fog<\/h3>\n<p>When it comes to precise incidents, the Akira ransomware-as-a-service led the pack in 2024, in the end stepping in to fill the void left by LockBit. Initially seen in 2022, Akira assaults ramped up in late 2023. The group and its associates had been steadily energetic all through 2024, spiking in August when Akira accounted for 17% of the ransomware detections reported by Sophos clients\u2014doubling from its place within the first two quarters of the 12 months. By 12 months\u2019s finish, it nonetheless accounted for 9% of ransomware detection reviews.<\/p>\n<p>Notably, Sophos noticed associates tied to Akira additionally deploying different ransomware variants, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2024\/11\/08\/veeam-exploit-seen-used-again-with-a-new-ransomware-frag\/\">together with Fog, Frag<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-109a\">Megazord<\/a>. These attackers (akin to these in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2025\/04\/16\/the-sophos-annual-threat-report-appendix-most-frequently-encountered-malware-and-abused-software\/_Packaged_playbooks,\">STAC5881<\/a>) sometimes centered on exploiting VPNs for preliminary entry. Usually, Akira\u2019s targets had VPNs with no multifactor authentication, or had misconfigured VPN gateways that allowed the attackers to realize entry with stolen credentials or brute drive assaults.<\/p>\n<p>Whereas Akira stays energetic, Fog ransomware has sometimes been used as a alternative by associates beforehand related to Akira, which accounts for its place in third among the many high 15 ransomware households encountered in MDR and IR incidents.<\/p>\n<h3><a rel=\"nofollow\" target=\"_blank\" name=\"_Toc192600948\"\/>RansomHub<\/h3>\n<p>RansomHub was one other rising chief in ransomware incidents in 2024. Whereas tied for sixth in general detections, RansomHub was the fourth most noticed ransomware household in precise MDR and IR incidents.<\/p>\n<p>Between February and August 2024, in accordance with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-242a\">a Cybersecurity and Infrastructure Safety Company #StopRansomware advisory<\/a>, RansomHub had \u201cencrypted and exfiltrated information from a minimum of 210 victims.\u201d Nearly all of Sophos MDR and IR instances involving RansomHub got here within the second half of the 12 months, mounting in numbers in November.<\/p>\n<p>Most RansomHub assaults concerned abuse of RDP along with different professional distant desktop instruments, together with AnyDesk. Preliminary entry in some reported instances got here from leveraging the seven-year-old Home windows SMB Distant Code Execution Vulnerability (CVE-2017-1444), although this was not noticed within the Sophos MDR and IR instances represented in our information. Preliminary entry vectors Sophos X-Ops noticed in RansomHub instances included abuse of externally dealing with Microsoft SQL Servers for command execution, abuse of open RDP and Distant Desktop Net entry, and compromise of unmanaged gadgets.<\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>This appendix to our Annual Risk Report supplies extra statistics on incident information and telemetry detailing the instruments utilized by cybercriminals focusing on small and midsized companies (SMBs). For a broader take a look at the menace panorama dealing with SMBs, see our fundamental report. Appendix Contents: Most often-encountered malware varieties Small and midsized companies [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1603,1602,1601,216,121,802,120],"class_list":["post-1663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-abused","tag-encountered","tag-frequently","tag-malware","tag-news","tag-software","tag-sophos"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1663"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1663\/revisions"}],"predecessor-version":[{"id":1664,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1663\/revisions\/1664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/1665"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-11 23:03:47 UTC -->