Infostealer Vulnerability Report

05/11/2020 – 05/17/2020
Share AnalysisSocial Media

Saudi ArabiaSaudi Arabia

Infostealer Saudi Arabia Risk Summary

11 May 2020 - 17 May 2020 This Saudi Arabia risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

17Infected
Machines
0Infected Android
Devices
1Leaked Employee
Accounts
302Leaked User
Accounts
151Affected
Domains

Risk Score

0%
0%
100%

Saudi Arabia risk score showed a 215.6% increase compared to last month and is at 100 points out of 100. This increase was particularly influenced by leaks in the northern hemisphere.

Employee Data Leak

A total of 1 employee account leaks were detected across Saudi Arabia. The most affected domains are shown in the chart.

Customer Data Leak

A total of 302 user account leaks were detected across Saudi Arabia. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
google.com
36

Total

Favicon
facebook.com
23

Total

Favicon
twitter.com
11

Total

Favicon
live.com
9

Total

Favicon
instagram.com
7

Total

Favicon
sammobile.com
6

Total

Favicon
netflix.com
5

Total

Favicon
u.net
4

Total

Favicon
leagueoflegends.com
4

Total

Favicon
hirezstudios.com
4

Total

Top 10 Infostealer Families

VIDAR69.2%
9
GENERIC STEALER30.8%
4

Top Threats

The most detected malware on your systems: VIDAR (%69.2 - 9), GENERIC STEALER (%30.8 - 4).

Top 5 Antivirus Solutions

17

Sample Machines

Protection Status

0%ProtectedActive antivirus
100%UnprotectedNo antivirus
0%Free/BasicFree AV

Popular Antivirus Solutions

Critical Security Vulnerability

Danger

Critical situation: 100% (17 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.