Infostealer Vulnerability Report

10/16/2023 – 10/22/2023
Share AnalysisSocial Media

KazakhstanKazakhstan

Infostealer Kazakhstan Risk Summary

16 Eki 2023 - 22 Eki 2023 This Kazakhstan risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

46Infected
Machines
16Infected Android
Devices
6Leaked Employee
Accounts
2.0KLeaked User
Accounts
677Affected
Domains

Risk Score

0%
0%
100%

Kazakhstan risk score showed a 80.1% decrease compared to last month and remains at 10 points out of 100.

Employee Data Leak

A total of 6 employee account leaks were detected across Kazakhstan. The most affected domains are shown in the chart.

Customer Data Leak

A total of 2.012 user account leaks were detected across Kazakhstan. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
mail.ru
148

Total

Favicon
htii.kz
81

Total

Favicon
google.com
57

Total

Favicon
wargaming.net
42

Total

Favicon
vk.com
41

Total

Favicon
live.com
40

Total

Favicon
aliexpress.ru
31

Total

Favicon
facebook.com
31

Total

Favicon
ppy.sh
31

Total

Favicon
yandex.ru
30

Total

Top 10 Infostealer Families

LUMMAC89.1%
41
DARKCRYSTAL6.5%
3
META4.3%
2

Top Threats

The most detected malware on your systems: LUMMAC (%89.1 - 41), DARKCRYSTAL (%6.5 - 3), META (%4.3 - 2).

Top 5 Antivirus Solutions

46

Sample Machines

Protection Status

2.17%ProtectedActive antivirus
89.13%UnprotectedNo antivirus
8.7%Free/BasicFree AV

Popular Antivirus Solutions

Windows Defender8.7% of machines
4machine
Unknown2.17% of machines
1machine

Critical Security Vulnerability

Danger

Critical situation: 89% (41 devices) unprotected systems detected! Only 1 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.