Infostealer Vulnerability Report

08/17/2020 – 08/23/2020
Share AnalysisSocial Media

South AfricaSouth Africa

Infostealer South Africa Risk Summary

17 Ağu 2020 - 23 Ağu 2020 This South Africa risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

679Infected
Machines
244Infected Android
Devices
47Leaked Employee
Accounts
5.7KLeaked User
Accounts
1.9KAffected
Domains

Risk Score

0%
0%
100%

South Africa risk score showed no change compared to last month and remains at 50 points out of 100.

Employee Data Leak

A total of 47 employee account leaks were detected across South Africa. The most affected domains are shown in the chart.

Customer Data Leak

A total of 5.744 user account leaks were detected across South Africa. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
google.com
351

Total

Favicon
facebook.com
322

Total

Favicon
live.com
129

Total

Favicon
dstv.com
88

Total

Favicon
twitter.com
83

Total

Favicon
quickconnect.to
63

Total

Favicon
telkom.co.za
61

Total

Favicon
fnb.co.za
58

Total

Favicon
sarsefiling.co.za
53

Total

Favicon
instagram.com
52

Total

Top 10 Infostealer Families

CRYPTBOT99.4%
523
VIDAR0.2%
1
ELYSIUM STEALER0.2%
1
GHOSTBUSTERS STEALER0.2%
1

Top Threats

The most detected malware on your systems: CRYPTBOT (%99.4 - 523), VIDAR (%0.2 - 1), ELYSIUM STEALER (%0.2 - 1).

Top 5 Antivirus Solutions

679

Sample Machines

Protection Status

0%ProtectedActive antivirus
100%UnprotectedNo antivirus
0%Free/BasicFree AV

Popular Antivirus Solutions

Critical Security Vulnerability

Danger

Critical situation: 100% (679 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.