Infostealer Vulnerability Report

05/19/2025 – 05/25/2025
Share AnalysisSocial Media

BhutanBhutan

Infostealer Bhutan Risk Summary

19 May 2025 - 25 May 2025 This Bhutan risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

7Infected
Machines
4Infected Android
Devices
1Leaked Employee
Accounts
122Leaked User
Accounts
62Affected
Domains

Risk Score

0%
0%
100%

Bhutan risk score has been calculated as 50 points out of 100 for this period. Comparison could not be made due to lack of previous period data.

Employee Data Leak

A total of 1 employee account leaks were detected across Bhutan. The most affected domains are shown in the chart.

Customer Data Leak

A total of 122 user account leaks were detected across Bhutan. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
google.com
11

Total

Favicon
facebook.com
11

Total

Favicon
drc.gov.bt
7

Total

Favicon
qliteswallet.com
6

Total

Favicon
instagram.com
4

Total

Favicon
rcsc.gov.bt
4

Total

Favicon
codemonkey.com
3

Total

Favicon
blmis.gov.bt
3

Total

Favicon
btfn.bt
3

Total

Favicon
konami.net
3

Total

Top 10 Infostealer Families

STEALC83.3%
5
LUMMAC16.7%
1

Top Threats

The most detected malware on your systems: STEALC (%83.3 - 5), LUMMAC (%16.7 - 1).

Top 5 Antivirus Solutions

7

Sample Machines

Protection Status

0%ProtectedActive antivirus
71.43%UnprotectedNo antivirus
28.57%Free/BasicFree AV

Popular Antivirus Solutions

Windows Defender14.29% of machines
1machine
Windows Defender [ON]14.29% of machines
1machine

Critical Security Vulnerability

Danger

Critical situation: 71% (5 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.