Akamai: 36% of IoT devices get infected with QSnatch malware
The report shows the global distribution of Emotet and QSnatch malware.
Company Akamai announced the results of the report attack superhighway dedicated to malicious domains. According to the report, during 2022, about 10-16% of organizations were exposed to malicious activity related to malware Emotet And QSnatch.
The Attack Superhighway report analyzes the malicious domains of Emotet and QSnatch malware, which pose the greatest threat to corporate networks around the world.
Additional findings from the report:
- 26% of affected devices attempted to contact C2-servers of well-known Initial Access Brokers (IABs), including domains associated with Emotet;
- Networked storage devices are more attractive for hacking , as they are less likely to be updated and contain sensitive data. Cybercriminals abuse these devices through QSnatch, with 36% of affected devices linking to QSnatch’s C2 domains;
- Attacks on home networks are aimed at misusing not only computers, but also mobile phones and IoT-devices. A significant amount of malicious traffic can be associated with mobile malware and botnets of thousands of IoT devices.
The Attack Superhighway report also includes regional and industry-specific attack data. While QSnatch is the leading threat in the world, other common attacks vary by region, with Emotet, REvil, Ramnit And Agent Tesla. Regional trends are vital for organizations to consider when deciding on specific threats and vulnerability management strategies.
Attackers succeed when they use malware as a service (MaaS) and can combine different tools in one integrated multi-stage attack. Attack Superhighway details methodologies and indicators of compromise, and offers recommendations for mitigating threats.