Infostealer Vulnerability Report

12/21/2020 – 12/27/2020
Share AnalysisSocial Media

Syrian Arab RepublicSyrian Arab Republic

Infostealer Syrian Arab Republic Risk Summary

21 Ara 2020 - 27 Ara 2020 This Syrian Arab Republic risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

76Infected
Machines
8Infected Android
Devices
10Leaked Employee
Accounts
614Leaked User
Accounts
231Affected
Domains

Risk Score

0%
0%
100%

Syrian Arab Republic risk score has been calculated as 50 points out of 100 for this period. Comparison could not be made due to lack of previous period data.

Employee Data Leak

A total of 10 employee account leaks were detected across Syrian Arab Republic. The most affected domains are shown in the chart.

Customer Data Leak

A total of 614 user account leaks were detected across Syrian Arab Republic. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
facebook.com
69

Total

Favicon
google.com
67

Total

Favicon
192.168.1.1
36

Total

Favicon
svuonline.org
29

Total

Favicon
live.com
28

Total

Favicon
mazbouta.cafe
11

Total

Favicon
omniya.sy
9

Total

Favicon
instagram.com
8

Total

Favicon
roblox.com
7

Total

Favicon
yahoo.com
7

Total

Top 10 Infostealer Families

VIDAR98.7%
75
TAURUS1.3%
1

Top Threats

The most detected malware on your systems: VIDAR (%98.7 - 75), TAURUS (%1.3 - 1).

Top 5 Antivirus Solutions

76

Sample Machines

Protection Status

0%ProtectedActive antivirus
100%UnprotectedNo antivirus
0%Free/BasicFree AV

Popular Antivirus Solutions

Critical Security Vulnerability

Danger

Critical situation: 100% (76 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.