Infostealer Vulnerability Report

03/30/2026 – 04/05/2026
Share AnalysisSocial Media

SurinameSuriname

Infostealer Suriname Risk Summary

30 Mar 2026 - 5 Nis 2026 This Suriname risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

2Infected
Machines
2Infected Android
Devices
3Leaked Employee
Accounts
1.2KLeaked User
Accounts
717Affected
Domains

Risk Score

0%
0%
100%

Suriname risk score showed a 3171.1% increase compared to last month and is at 100 points out of 100. This increase was particularly influenced by leaks in the northern hemisphere.

Employee Data Leak

A total of 3 employee account leaks were detected across Suriname. The most affected domains are shown in the chart.

Customer Data Leak

A total of 1.240 user account leaks were detected across Suriname. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
live.com
25

Total

Favicon
google.com
23

Total

Favicon
caixa.gov.br
23

Total

Favicon
uol.com.br
21

Total

Favicon
consumidorpositivo.com.br
20

Total

Favicon
facebook.com
14

Total

Favicon
pharaoh-gaming.net
13

Total

Favicon
serasaconsumidor.com.br
13

Total

Favicon
z8games.com
12

Total

Favicon
minestore.com.br
12

Total

Top 10 Infostealer Families

KATZ STEALER50.0%
1
VIDAR50.0%
1

Top Threats

The most detected malware on your systems: KATZ STEALER (%50.0 - 1), VIDAR (%50.0 - 1).

Top 5 Antivirus Solutions

2

Sample Machines

Protection Status

0%ProtectedActive antivirus
100%UnprotectedNo antivirus
0%Free/BasicFree AV

Popular Antivirus Solutions

Critical Security Vulnerability

Danger

Critical situation: 100% (2 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.