Infostealer Vulnerability Report

12/26/2022 – 01/01/2023
Share AnalysisSocial Media

BurundiBurundi

Infostealer Burundi Risk Summary

26 Ara 2022 - 1 Oca 2023 This Burundi risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

5Infected
Machines
2Infected Android
Devices
0Leaked Employee
Accounts
25Leaked User
Accounts
18Affected
Domains

Risk Score

0%
0%
100%

Burundi risk score showed a 2400% increase compared to last month and is at 100 points out of 100. This increase was particularly influenced by leaks in the northern hemisphere.

Employee Data Leak

A total of 0 employee account leaks were detected across Burundi. The most affected domains are shown in the chart.

Customer Data Leak

A total of 25 user account leaks were detected across Burundi. The most affected domains are shown in the chart.

Most Affected Domains

18+

Favicon
google.com
2

Total

Favicon
splunk.com
2

Total

Favicon
writesonic.com
2

Total

Favicon
vmware.com
2

Total

Favicon
meilleuraspirateur.fr
1

Total

Favicon
snis.bi
1

Total

Favicon
3cx.com
1

Total

Favicon
3cx.sc
1

Total

Favicon
127.0.0.1
1

Total

Favicon
cpagrip.com
1

Total

Top 10 Infostealer Families

RACCOON60.0%
3
REDLINE20.0%
1
META20.0%
1

Top Threats

The most detected malware on your systems: RACCOON (%60.0 - 3), REDLINE (%20.0 - 1), META (%20.0 - 1).

Top 5 Antivirus Solutions

5

Sample Machines

Protection Status

0%ProtectedActive antivirus
60%UnprotectedNo antivirus
40%Free/BasicFree AV

Popular Antivirus Solutions

Windows Defender40% of machines
2machine

Critical Security Vulnerability

Danger

Critical situation: 60% (3 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.