Infostealer Vulnerability Report

03/09/2020 – 03/15/2020
Share AnalysisSocial Media

Russian FederationRussian Federation

Infostealer Russian Federation Risk Summary

9 Mar 2020 - 15 Mar 2020 This Russian Federation risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

2Infected
Machines
1Infected Android
Devices
0Leaked Employee
Accounts
107Leaked User
Accounts
48Affected
Domains

Risk Score

0%
0%
100%

Russian Federation risk score has been calculated as 50 points out of 100 for this period. Comparison could not be made due to lack of previous period data.

Employee Data Leak

A total of 0 employee account leaks were detected across Russian Federation. The most affected domains are shown in the chart.

Customer Data Leak

A total of 107 user account leaks were detected across Russian Federation. The most affected domains are shown in the chart.

Most Affected Domains

48+

Favicon
facebook.com
15

Total

Favicon
wargaming.net
11

Total

Favicon
tankionline.com
8

Total

Favicon
google.com
7

Total

Favicon
live.com
4

Total

Favicon
sonyentertainmentnetwork.com
3

Total

Favicon
williamhill.com
3

Total

Favicon
virginmedia.com
3

Total

Favicon
gosuslugi.ru
3

Total

Favicon
mail.ru
3

Total

Top 10 Infostealer Families

GHOSTBUSTERS STEALER100.0%
1

Top Threats

The most detected malware on your systems: GHOSTBUSTERS STEALER (%100.0 - 1).

Top 5 Antivirus Solutions

2

Sample Machines

Protection Status

0%ProtectedActive antivirus
100%UnprotectedNo antivirus
0%Free/BasicFree AV

Popular Antivirus Solutions

Critical Security Vulnerability

Danger

Critical situation: 100% (2 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.