Infostealer Vulnerability Report

03/09/2020 – 03/15/2020
Share AnalysisSocial Media

United KingdomUnited Kingdom

Infostealer United Kingdom Risk Summary

9 Mar 2020 - 15 Mar 2020 This United Kingdom risk summary for the period is based on general trends from DarkRadar sources. The content serves as an assessment aimed at understanding potential cyber threat dynamics in different regions and reflects only the general overview.

27Infected
Machines
12Infected Android
Devices
3Leaked Employee
Accounts
1.2KLeaked User
Accounts
562Affected
Domains

Risk Score

0%
0%
100%

United Kingdom risk score showed a 1363.5% increase compared to last month and is at 100 points out of 100. This increase was particularly influenced by leaks in the northern hemisphere.

Employee Data Leak

A total of 3 employee account leaks were detected across United Kingdom. The most affected domains are shown in the chart.

Customer Data Leak

A total of 1.241 user account leaks were detected across United Kingdom. The most affected domains are shown in the chart.

Most Affected Domains

50+

Favicon
facebook.com
48

Total

Favicon
google.com
48

Total

Favicon
live.com
38

Total

Favicon
twitch.tv
34

Total

Favicon
amazon.co.uk
23

Total

Favicon
steampowered.com
21

Total

Favicon
minecraft.net
20

Total

Favicon
epicgames.com
18

Total

Favicon
nexusmods.com
15

Total

Favicon
rockstargames.com
15

Total

Top 10 Infostealer Families

GENERIC STEALER100.0%
2

Top Threats

The most detected malware on your systems: GENERIC STEALER (%100.0 - 2).

Top 5 Antivirus Solutions

27

Sample Machines

Protection Status

0%ProtectedActive antivirus
100%UnprotectedNo antivirus
0%Free/BasicFree AV

Popular Antivirus Solutions

Critical Security Vulnerability

Danger

Critical situation: 100% (27 devices) unprotected systems detected! Only 0 devices are protected. Immediate antivirus deployment and security scan required. Your company data is at high risk.

darkradar Logo

Secure Your Brand

Strengthen your company's cybersecurity posture with DarkRadar.