Infostealer Vulnerability Report

06/03/2024 – 06/09/2024
Share AnalysisSocial Media

NorwayNorway

Infostealer Norway Risk Summary

3 Haz 2024 - 9 Haz 2024 This Norway risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

31Infected
Machines
9Infected Android
Devices
5Leaked Employee
Accounts
1.4KLeaked User
Accounts
591Affected
Domains

Risk Score

0%
0%
100%

Norway risk score showed a 56.7% decrease compared to last month and remains at 22 points out of 100.

Employee Data Leak

A total of 5 employee account leaks were detected across Norway. The most affected domains are shown in the chart.

Customer Data Leak

A total of 1.401 user account leaks were detected across Norway. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
google.com
50

Total

Favicon
live.com
33

Total

Favicon
facebook.com
24

Total

Favicon
twitch.tv
24

Total

Favicon
schibsted.no
21

Total

Favicon
viaplay.no
21

Total

Favicon
battle.net
21

Total

Favicon
riotgames.com
21

Total

Favicon
roblox.com
16

Total

Favicon
netflix.com
16

Total

Top 10 Infostealer Families

STEALC64.5%
20
REDLINE19.4%
6
META9.7%
3
RHADAMANTHYS6.5%
2

Top Threats

The most detected malware on your systems: STEALC (%64.5 - 20), REDLINE (%19.4 - 6), META (%9.7 - 3).

Top 5 Antivirus Solutions

31

Sample Machines

Protection Status

3.23%ProtectedActive antivirus
70.97%UnprotectedNo antivirus
25.81%Free/BasicFree AV

Popular Antivirus Solutions

Windows Defender25.81% of machines
8machine
F-Secure3.23% of machines
1machine

Critical Security Vulnerability

Danger

Critical situation: 71% (22 devices) unprotected systems detected! Only 1 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.