0% found this document useful (0 votes)
262 views49 pages

Internet Security Report q4 2024

The Q4 2024 Internet Security Report reveals a significant increase in network malware detections, nearly doubling by 94%, while endpoint malware detections reached an all-time low, decreasing by 91%. The report highlights the resurgence of coinminer malware and the prevalence of zero-day malware, which evaded traditional signature-based detection methods. Additionally, network attacks decreased by 27%, with ongoing threats primarily stemming from older web application vulnerabilities.

Uploaded by

Or Yaacobovich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
262 views49 pages

Internet Security Report q4 2024

The Q4 2024 Internet Security Report reveals a significant increase in network malware detections, nearly doubling by 94%, while endpoint malware detections reached an all-time low, decreasing by 91%. The report highlights the resurgence of coinminer malware and the prevalence of zero-day malware, which evaded traditional signature-based detection methods. Additionally, network attacks decreased by 27%, with ongoing threats primarily stemming from older web application vulnerabilities.

Uploaded by

Or Yaacobovich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Q4 2024

Quarter 4, 2022
CONTENTS
The Firebox Feed™ provides quantifiable data and trends
about hackers’ latest attacks, and understanding these trends
can help us improve our defenses.

03 Introduction

04 Executive Summary

06 Firebox Feed Statistics


07 Malware Trends
09 Top 10 Malware Detections
10 Top 5 Encrypted Malware Detections
10 Top 5 Most-Widespread Malware Detections
11 Geographic Threats by Region
12 Individual Malware Sample Analysis

14 Network Attack Trends


14 Top 10 Network Attacks Review
17 Most-Widespread Network Attacks
19 Network Attack Conclusion
20 DNS Analysis
20 Top Malware Domains
22 Firebox Feed: Defense Learnings

23 Endpoint Threat Trends


29 Top Malware and PUPs
32 Attack Vectors
39 Ransomware Landscape

46 Conclusion and Defense Highlights

47 About WatchGuard

Q4 2024 Internet Security Report 2


INTRODUCTION In this report, we cover:
With the ever-evolving landscape of cybersecurity, the threats we

07
face morph as rapidly as the technologies we adopt. Much like Network-based malware trends:
a skilled sailor must continuously adjust their sails to navigate WatchGuard Fireboxes offer multiple malware detection engines.
the capricious winds at sea, organizations must remain vigilant Our products use everything from signature-based malware
and responsive to the shifting tides of cyber threats. The threat detection engines to full-on behavioral code analysis to find
landscape is not static; it is a dynamic arena where threat actors both old malware and sophisticated, new, and unique threats.
innovate their tactics, techniques, and procedures (TTPs), requiring This section of our report highlights the most prominent and
us to adapt our defenses or risk being swept away by unforeseen widespread malware seen during Q4. We analyze the top
challenges. threats by volume, by most Fireboxes affected, and by region.
We also cover the differences in malware seen over encrypted
According to author William S. Burroughs, “When you stop growing,
connections and how much malware bypasses signature-based
you start dying.” This sentiment rings especially true in the field
detection. Network malware detections almost doubled in Q4,
of cybersecurity. By diligently observing and analyzing the latest
and zero-day malware detections increased significantly as well.
malware variants, network attacks, and malicious domains – from
Top malware included the return of coinminers, Linux-based
both a network and endpoint perspective – we can develop malware in our top 20, and email-based script malware (VBA/
the insights necessary to learn how to fortify our defenses. Our PowerShell) that installed spyware and info stealers.
quarterly Internet Security Report (ISR) encapsulates these critical

14 Network attack trends:


findings, shedding light on the characteristics of emerging threats
and providing actionable intelligence that helps organizations The Firebox’s Intrusion Prevention Service (IPS) blocks many
better prepare and grow defenses for potential attacks, rather than client- and server-based network exploits. This section highlights
dying when their businesses succumb to a new threat. the most common network attacks we saw during Q4. Network
attacks dropped this quarter and the top exploits by volume or by
In this report, we delve into the key malware trends observed from
how widespread mostly mirrored Q3. Old exploits for ProxyLogin
both network and endpoint malware detection solutions, offering
and HaProxy continue to persist on our top lists.
a window into the shifting patterns of malware variants and their

20
creators. Additionally, we highlight the top network security attacks Top malicious domains:
or exploits detected by our network Intrusion Prevention Service Using data from our DNSWatch service, we share trends about
(IPS) – each revelation acting as a beacon that guides us away from the malicious web links your users click. We prevent your users
danger. By sharing these insights, we empower security teams to from reaching these domains, thus protecting your organization.
not only respond to current threats but to anticipate future ones, In Q2, we saw malicious cryptocurrency-related domains, once
allowing for a proactive rather than reactive stance. associated with cryptomining and one with Etherhiding, as well
Our commitment to producing this report stems from the urgent as a continuation of threat actors leveraging vanity domains for
legit services like XXX.sharepoint.com.
need for organizations to understand the dangers they face in a

23
digital realm, where adversaries are more tenacious and resourceful
Endpoint malware trends:
than ever. As we venture into 2025, it is our hope that this report
We also track the malware trends we see at the endpoint from
serves as a guiding star, enabling all of us to reinforce our cyber our WatchGuard EPDR and AD360 products. Often, the malware
defenses and ensure our organizational resilience amidst the we see on endpoints differs greatly from what network security
tempest of continual change. devices see. Endpoint-based malware detections decreased
Let this report be not just a retrospective glance at past challenges, significantly both quarterly and for the year. However, we did see
but a forward-looking analysis that inspires adaptive strategies malicious coinminers increase, and browser exploits became the
in the face of persistent evolution. Together, we can navigate this second most common vector for malware delivery for the first
complex cybersecurity terrain, always ready to adjust our sails in time in years.

46
response to the winds of change.
The latest defense tips:
We break our report into the sections you see to the right. Though this report details and analyzes attack trends, the true
point of the report is both to show you what your network,
endpoint, and identity security controls are blocking, and to learn
from changes in the threat landscape so we can all fine-tune our
defenses to prevent the latest attacks. Throughout the report, and
at the end of various sections, we will share many defense tips
you can use to continue to protect your organizations from the
latest threat actor tactics and techniques.

Q4 2024 Internet Security Report 3


EXECUTIVE SUMMARY
At the highest level, network malware almost doubled, but endpoint malware reached an all-time low. We also saw sophistication in network-de-
tected malware increase with the increase in our zero-day malware percentage, but at the endpoint, unique and new malware is way down,
suggesting that what the endpoints saw was more generic and run-of-the-mill malware variants. Though these differences might seem unusual,
one thing is sure – you need both network- and endpoint-based malware detection for the defense in depth necessary to prevent all these
attacks.
As far as network-based attacks and exploit, those decreased by more than ¼ during Q4. While attackers did at least launch a slightly higher
number of unique exploits, most of the top network attacks by volume and devices affected were almost identical to last quarter and mostly
consisted of older or generic web application flaws. We still see threat actors trying to find servers vulnerable to ProxyLogin and HAProxy
vulnerabilities.
That said, we have seen new trends across many of our security services. For instance, coinminers are back. Network and endpoint malware
detection solutions saw an increase in them, and we saw many top malicious domains focused on malicious cryptocurrency mining or Etherhid-
ing.
Here are some of the executive highlights from our Q4 2024 report:

• Total network-based malware detections almost doubled, • We extrapolate that if all the estimated currently active (licensed)
increasing 94%. We saw this increase across all of our malware Fireboxes enabled all malware detection security services and
detection services, but the largest increases came from our more were reporting to us, we would have had 600,127,343 malware
proactive services like IntelligentAV (increased 315%) and APT detections during Q4 2024.
Blocker (increased 74%).
• More than half (53%) of malware detected evaded signature-
• Strangely, endpoint unique malware detection shows a based methods. We call this zero-day malware, as it requires
completely different picture, decreasing about 91% QoQ, and more proactive techniques (IAV/APT) to catch this never-before-
showing the lowest volume of unique detections we have seen seen malware. In general, zero-day malware has been on a
this year. While we saw a huge spike in unique endpoint detected declining trend over the past year or so, compared to old highs
malware during Q2, even if we consider that as an outlier, this that almost always accounted for more than half and sometimes
quarter’s malware still would have decreased ~65% compared to even three-fourths of detected malware in the past. This quarter is
the rest of the year. one of the first where we have seen it return to a significant level.
• Not only were endpoint unique malware detections down, but • Furthermore, zero-day malware accounts for 78% of malware
new malware threats also hit an all-time low of only 8 new detected over encrypted connections. This suggests that threat
threats per 100,000 malware detections. In general, we saw actors combine evasion techniques, both using encryption to
less targeted malware that only affected one or a few machines, avoid some security scans and then leveraging malware evasive
and rather generic, sometimes-old malware that affected many techniques more often for these more advanced threats. If you
machines aren’t already decrypting and scanning TLS web traffic, you really
should.
• 60% of malware spread over encrypted connections (TLS)
during Q4, which is an 8pt increase from last quarter, and a • Unlike network malware, network attacks decreased 27% during
continued increase for the year. Q4 2024, with only 92 software exploits per Firebox caught by IPS
signatures. That said, we did see a slight increase in the number of
• Our “per Firebox” malware results for various network malware
unique exploits attackers tried, with unique IPS signature hits up
detection services:
13%.
• Average total malware detections per Firebox: 1,553
• Coinminer malware and malicious cryptocurrency mining are on
(~94% increase)
the rise again. Though we have seen many quarters of coinmining
• Average malware detections by GAV per Firebox: 543 malware decreasing, during Q4 we saw it has returned. A
(6% increase) malicious coinminer made the second spot on our network
• Average malware detections by IAV per Firebox: 883 malware top ten, it increased 141% QoQ in endpoint detections,
(315% increase) and some of the top malicious domains we blocked involved
malicious cryptocurrency mining.
• Average malware detections by APT Blocker per Firebox:
127 (74% increase)

Q4 2024 Internet Security Report 4


• Along with coinminers, we also saw more evidence of blockchain • As far as endpoint malware delivery vectors, malicious scripts
and cryptocurrency-related attacks like Etherhiding. Etherhiding is (primarily PowerShell) remain the most common way malware
a malicious tactic of hiding malware on an immutable blockchain, arrives on an endpoint. Windows binaries used to be the second
which both leaves it there forever and can act as a back channel most common, but not only did they drop precipitously, but for
to hide malware delivery. In Q4, Etherhiding domains made their the first time in years browsers (specifically browser vulnerabilities
way onto our top compromised domain list. or exploits) became the second most common malware delivery
vector.

This is just a preview of the insights we found from our product threat intelligence during Q4 2024. If you need more help sailing the rough
threat landscape, you can find more details about our findings, as well as what you can do about them, in the meat of this report.

Q4 2024 Internet Security Report 5


FIREBOX
FEED STATS
WHAT IS THE FIREBOX FEED? HELP US IMPROVE
Firebox Feed provides anonymized data from Fireboxes around Our data comes from Fireboxes in our Firebox Feed and the
the world. This data from those who have opted into the feed more Firebox admins that provide the anonymous data the
allows us to identify cyberattack trends. We filter this feed and better we can make our reports. If you configure your Firebox
analyze it to identify trends in malware, network attacks, and to do so, we will have more accurate information in this report
malicious server activity. Our analysis, along with data from to apply to your network. So please configure your Firebox to
previous quarters, provides an overview of threats and recent enable device feedback by following these steps.
trending threats. Furthermore, we break the data down by region
and sometimes country so we can know what to look out for in
those areas. 1. Upgrade to Fireware OS 11.8 or higher
(we recommend 12.x)
We identify encrypted connections that detect malware or
a network attack and what service caught it in the Gateway 2. Enable device feedback in your Firebox settings
AntiVirus (GAV), APT Blocker, and Intrusion Prevention Service 3. Configure WatchGuard proxies and our security
(IPS) sections. DNSWatch data will also provides details on why services, such as GAV, IPS, APT Blocker, and DNSWatch,
it blocked the domain. We can see if the server is compromised, if available
spreading malware, or hosting a phishing page. If you only have
a few minutes, we highlight charts to provide a quick overview of
the threat landscape and details on our analysis.
A Firebox configured to provide anonymized feed provides
details from the GAV, APT Blocker, and IPS services. The DNSWatch
application provides details on DNSWatch.

Gateway AntiVirus (GAV): Signature-based malware detection


IntelligentAV (IAV): Machine-learning engine to proactively
detect malware
APT Blocker: Sandbox-based behavioral detection for malware
Intrusion Prevention Service (IPS): Detects and blocks net-
work-based, server, and client software exploits
DNSWatch: Blocks various known malicious sites by domain name

Q4 2024 Internet Security Report 7


Average combined total
malware hits per Firebox MALWARE TRENDS
1,553 In Q4 2024, the malware landscape continues to challenge network
security, as captured in detailed data from Firebox detections.
Average detections per This information, spanning regional trends, encrypted threats,
Firebox jumped by 94% and detection rates, offers a critical view into the evolving tactics
of cybercriminals. To ensure its value, we rigorously analyze data,
then transform raw numbers into actionable insights. Our process
Basic Gateway AntiVirus involves validating detection counts, cross-referencing regional
(GAV) service distributions, and confirming malware classifications to eliminate
noise and inconsistencies. Finally, we normalize figures to account

543 for deployment variations. This meticulous approach increases


reliability, enabling security teams to trust the data as a foundation
for decision-making. From spotting encrypted malware surges to
Basic malware increased 6%
identifying regional hotspots, this refined data set empowers orga-
nizations to adapt defenses, prioritize resources, and stay ahead of
threats like botnets, droppers, and exploits that dominated Q4.
APT Blocker (APT)
Starting off with an overview, the table below shows average

127 hits across various security services and their changes since the
previous quarter. Total malware detections average 1,553 per Fire-
box, up 94%, reflecting a steady rise in threats. Gateway AntiVirus
APT blocker increased
(GAV) logs 543 detections, with a modest 6% increase, while APT
74%
Blocker sees 127 detections, up 74%. IntelligentAV (IAV) stands out
with 883 detections, surging 315%, indicating its growing role in
IntelligentAV (IAV) catching sophisticated malware.

883 When inspecting TLS traffic, GAV hits rose to 663 – up 21%, and
evasive malware over TLS, averaging 153 hits per Firebox, increased
by 363%. This aligns with TLS malware’s share jumping to 60%, an
jumped a whole 315% 8-point rise, highlighting encrypted channels as a favored attack
vector. These evasive threats, often never seen before or polymor-
phic (where the malware changes itself ), evade signature-based
GAV with TLS detection, driving the higher APT and IAV numbers.

663
TLS detections by GAV
The table paints a dual picture: basic malware persists, but
advanced, encrypted threats are accelerating. The significant
upticks in IAV and TLS evasive hits suggest attackers are leaning
harder into obfuscation and encryption, challenging traditional
increased 21%
defenses. Fireboxes equipped to decrypt and analyze TLS traffic are
increasingly vital, as the 8-point TLS malware surge underscores
APT Blocker with TLS a critical need for enhanced visibility and adaptive protection

153
strategies.

TLS detections of evasive


malware increased by 363%

TLS malware

60% We not only use the Firebox Feed data to build this report,
but also to identify areas where we can improve our
Malware over an
WatchGuard products’ security. If you would like to help with
encrypted connection
these improvements, please enable WatchGuard Device
increased 8 points
Feedback on your device.

Q1 2023 Internet Security Report Malware Trends 8


Top 10 Malware Detections
The latest Q4 2024 malware detection data gathered from Fireboxes offers a snapshot of the most prevalent threats targeting systems world-
wide. This table lists the top 10 malware variants by detection count, providing actionable insights for security teams.
Topping the list is JS.Heur.Morpheus.1.E810619B.Gen, a Windows code injection malware with 194,709 detections. It often arrives via an email
with a zipped attachment, which, when opened, connects to 0x0[.]st through a VBA script. Embedded within is a PowerShell script that installs a
keylogger and spyware, quietly compromising systems. Another heavy hitter is Application.Linux.Generic.24096, a coinminer detected 181,752
times, showcasing the persistent profitability of this type of malware.
Droppers also loom large, with Trojan.GenericKD.71026669 (36,437 detections) and the newly emerged Trojan.Sesfix.1 (31,739 detections) deliv-
ering malicious payloads. Meanwhile, PasswordStealer.GenericKDS (46,201 detections) continues its credential-theft spree. A striking resurgence
comes from Trojan.Linux.Mirai.1, a botnet malware with 45,903 detections. Known for crippling IoT devices with DDoS attacks, Mirai’s return is
notable. While we saw a loader in Q3, Q4 marks the full malware’s comeback, targeting Linux-based systems with renewed vigor.
The table itself is a curated rundown of malware categories, counts, and last-seen timestamps, ranging from coinminers and hacktools to phish-
ing and botnets. Beyond the top 10, an intriguing trend emerges: spots 11 through 13 are occupied by Linux-targeting threats. These include
Masscan, a port-scanning tool for reconnaissance; Mirai.gen, another Mirai clone botnet; and a Monero Coinminer, quietly siphoning processing
power. This trio underscores a growing focus on Linux environments, often perceived as secure but increasingly exploited.
By analyzing this Firebox data, we ensure it’s not just numbers – it’s a roadmap for action. From JS.Heur.Morpheus’s stealthy spyware to Mirai’s
botnet revival and Linux-specific threats, the landscape demands proactive defenses tailored to these persistent and emerging risks.

Threat Name Malware Category Count Last Seen

JS.Heur.Morpheus.1.E810619B.Gen Win Code Injection 194,709 New

Application.Linux.Generic.24096 Coinminer 181,752 Q3 2024

Application.Agent.LGP (impacket) Hacktool 110,594 Q1 2023

Application.Agent.IIQ Dropper 88,777 Q1 2023

JS.Phishing.3.39554A09 Phishing 53,302 Q1 2023

PasswordStealer.GenericKDS Password Stealer 46,201 Q3 2024

Trojan.Linux.Mirai.1 Botnet 45,903 Q3 2024

Trojan.GenericKD.71026669 Dropper 36,437 Q3 2024

Generic.Application.3Proxy.A.9560BBDD Linux Hacktool 32,368 Q3 2024

Trojan.Sesfix.1 Dropper 31,739 New

Figure 1. Top 10 Malware Detections

Q4 2024 Internet Security Report Malware Trends 9


Top 5 Encrypted Malware Detections
The Top 5 TLS Malware table, derived from Firebox detections, highlights malware traversing encrypted connections, posing unique challenges.
With many threats cloaked by TLS, unmonitored connections create a blind spot attackers exploit.

Leading the list is Heur.BZC.PZQ.Pantera.157, a Windows code injection malware with 240,669 detections. This batch script harbors suspicious
commands, executing stealthy injections over encrypted channels. Next, Application.Agent.IIQ, a dropper with 88,777 detections, delivers
payloads discreetly. Office exploits follow, with VBA.Heur2.ObfDldr.9.63A9E772.Gen (18,135 detections) and Exploit.CVE-2017-0199.Gen (9,148
detections) leveraging encrypted traffic to target vulnerabilities.

Variant.MSILHeracles.156368, a code injection threat with 11,188 detections contains an “activator” or keygen to bypass software licensing. We
find it often bundled with malware like Remcos or Formbook, amplifying its risk. See our 2023 Q3 report for more on Remcos.

Detecting these threats requires decrypting TLS traffic, a critical step given their reliance on encryption to evade traditional scans. Only 20% of
Fireboxes configured to inspect this traffic, the majority miss these concealed dangers. Enabling TLS inspection is vital to unmasking scripts like
Heur.BZC.PZQ and tainted tools like MSILHeracles, ensuring robust defense against encrypted threats.

Threat Name Malware Category Count

Heur.BZC.PZQ.Pantera.157 (variants) Win Code Injection 240,669

Application.Agent.IIQ Dropper 88,777

VBA.Heur2.ObfDldr.9.63A9E772.Gen Office Exploit 18,135

Variant.MSILHeracles.156368 Win Code Injection 11,188

Exploit.CVE-2017-0199.Gen Office Exploit 9,148

Figure 2. Top 5 TLS Malware

Top 5 Widespread Malware Detections


The Q4 2024 table of the most-widespread malware, detected across the highest number of Fireboxes, reveals key geographic trends in malware
distribution. This data breaks down prevalence by country and region, highlighting where these threats are most pervasive. Notably, Europe,
Middle East, and Africa (EMEA) consistently sees higher percentages of widespread malware compared to Asia-Pacific (APAC), while Americas
(AMER) registers the lowest regional impact across the board.

Topping the list are familiar names from the previous quarter: Exploit.CVE-2017-0199.04.Gen, a Microsoft Office exploit, hits Greece (20.94%),
Turkey (20.42%), and Cyprus (20%), with EMEA at 11.25%. Trojan.Zmutzy.834 and Trojan.Zmutzy.1305 also reappear, targeting Greece (22.38%)
and Cyprus (15.38%) heavily, alongside Hong Kong. Exploit.RTF-ObfsObjDat.Gen, another holdover, dominates Greece (23.83%) and Turkey
(16.25%), with EMEA at 10.03%. Rounding out the table is Trojan.HTML.Phishing.CHJ, led by Hong Kong (15.62%).

The recurrence of Zmutzy variants, CVE-2017-0199, and RTF exploits signals persistent attack vectors. EMEA’s elevated exposure underscores
regional targeting, while AMER’s lower figures suggest less widespread impact, urging tailored defenses by region.

Q4 2024 Internet Security Report Malware Trends 10


Malware Name Top 3 Countries by % EMEA % APAC % AMER %

Exploit.CVE-2017-0199.04.
Greece - 20.94% Turkey - 20.42% Cyprus - 20% 11.25% 5.67% 4.16%
Gen

Trojan.Zmutzy.834 Greece - 22.38% Cyprus - 21.54% Hong Kong - 19.53% 9.98% 9.30% 2.55%

Exploit.RTF-ObfsObjDat.
Greece - 23.83% Turkey - 16.25% Hong Kong - 14.84% 10.03% 6.75% 3.04%
Gen

Trojan.HTML.Phishing.CHJ Hong Kong - 15.62% Germany - 12.96% Indonesia - 11.39% 9.15% 5.37% 2.74%

Trojan.Zmutzy.1305 Cyprus - 15.38% Germany - 14.8% Hong Kong - 11.72% 8.94% 3.05% 1.78%

Figure 3. Most-Widespread Malware

Geographic Threats by Region


The Region table presents malware distribution across regions normalized by the number of Fireboxes deployed in each. This metric, expressed as
a percentage per region, reveals the relative intensity of malware encounters, accounting for device density. Unlike raw counts, this normalization
highlights exposure per unit, offering a clearer view of regional targeting.

AMER leads with 54.83% per Firebox, indicating a higher malware load per device compared to EMEA at 31.29% and APAC at 13.88%. This
suggests that while AMER may see less widespread malware overall, its Fireboxes face a denser concentration of threats. EMEA follows, balancing
moderate exposure, while APAC’s lower percentage reflects fewer incidents per device.

Specific threats underscore this distribution. Trojan.Linux.Mirai.1, a botnet, heavily targeted Italy within EMEA, exploiting IoT vulnerabilities to
build attack networks. Meanwhile, Application.Agent.LGP, a hacktool, zeroed in on the United States in AMER, likely aiding reconnaissance or
lateral movement. These examples illustrate how regional targeting aligns with the normalized data, emphasizing AMER’s elevated per-device risk
and the need for region-specific defenses.

EMEA

31.9%
APAC

13.9%
RIC
AME AS

54.8%

Region % Share
EMEA 31.29%
AMER 54.83%
APAC 13.88%

Figure 4. Geographic Threats by Region

Q4 2024 Internet Security Report Malware Trends 11


Catching Evasive Malware 53%
Other
The Zero-Day Malware table reveals the split between advanced
evasive malware and basic, signature-detectable threats. Among
22%
devices with APT Blocker or IntelligentAV (IAV), 53% of detected Zero-Day
malware contains zero-day, evasive threats, while 47% is catchable Zero-Day with TLS
via signatures. For devices also inspecting encrypted traffic, the
zero-day share jumps to 78%, with only 22% being basic malware.

These evasive threats lack family names, as they’re either unique,


never-before-seen attacks or leverage polymorphism to morph 47%
their code, dodging traditional detection. This shift highlights Other
78%
the growing sophistication of attacks, especially over encrypted Figure 5. Zero-Day Malware
channels, underscoring the critical need for advanced tools and
TLS inspection to combat these elusive, shape-shifting dangers
effectively.

Individual Malware Sample Analysis Application.Agent.LGP (Impacket)


We found the Application.Agent.LGP malware family contains
Trojan.Sesfix.1 the hacktook Impacket, a powerful set of Python scripts listed
A new malware detection identifies a VBA script. A Microsoft Office on GitHub (check it out here). This isn’t your typical library. It’s
file will usually run this type of script; however, in this case another built to manipulate low-level network protocols with precision. It
VBA script runs the file detected. We never found a malicious can target Windows systems SMB shares or execute commands
Microsoft Office file in this chain, but we still believe this is the remotely on a machine.
original infection vector. The malware installs xmrig, a coinminer.
What caught our eye is its versatility. It handles protocols like SMB,
We’ve covered Xmrig in the past so we will just look at the infection NTLM, and Kerberos, making it a go-to for testing network security.
path. It’s designed to authenticate and move through systems, often
• Unknow Office file loads Logo.ICO exploiting weaknesses like stolen credentials. Seeing Python3-
Impacket on a corporate network isn’t normal. It’s a hacker’s tool,
• Logo.ICO contains AppSetup.ICO not an admin’s tool. One should never see this on a corporate
• AppSetup.ICO contains the main install script and uses network.
contents from Logo.ICO
JS.Phishing.3
• AppSetup.ICO installs TProcHandler.exe, which is Xmrig Microsoft credentials. At its core, it deploys a web page that’s a
near-perfect replica of the official Microsoft login portal. It has the
AppSetup.ico loads these files into memory. By loading all files in
same layout, fonts, and branding. Unsuspecting users enter their
the infection path into memory, even if the antivirus catches one
credentials, believing they’re accessing their accounts, but instead
of these files the malware can recover itself. In this way, it gains
of authenticating with Microsoft, the data is silently funneled to a
persistence.
malicious domain, panteraaaprojectionsi[.]sbs. This phishing tactic
ON ERROR RESUME NEXT exploits trust in familiar interfaces, making it dangerously effective.
DIM ACTIV_NAME Once credentials are harvested, attackers can infiltrate email, Cloud
ACTIV_NAME = “APPSETUP.ICO” storage, or corporate systems, often undetected until it’s too late.
DIM PASSIV_NAME To stay safe, always verify the URL before logging in. Microsoft’s
PASSIV_NAME = “LOGO.ICO” legitimate domains will never redirect to obscure sites like this.
DIM T_NAME, T_CONF_NAME Vigilance and two-factor authentication are your best defenses
T_NAME = “TPROCHANDLER.EXE” against this deceptive threat lurking in plain sight.
T_CONF_NAME = “TPROCCONF.DB”
Below we see a CAPTCHA one receives when first visiting this page.
DIM M_NAME, M_CONF_NAME
In the next screenshot, we see the fake Microsoft login portal and
M_NAME = “MPROCHANDLER.EXE”
the payload sent when we enter the password WGpassword. You
M_CONF_NAME = “MPROCCONF.DB”
can see “WGpassword” in the payload under the form data. Finally,
We didn’t find anything new in this malware sample, but the in the next screenshot we see the login credentials passed to
techniques used to infect and persist makes the malware panteraaaprojectionsi[.]sbs
dangerous. The sooner we can catch the malware the less damage
we incur from it. If we prevent the malware from ever reaching the
workstation then we don’t even need to worry about the damage
done.

Q4 2024 Internet Security Report Malware Trends 12


Figure 6. Phishing.3.human

Figure 8. Phishing.3.header

Figure 7. Phishing.3.human

Conclusion
Malware distribution varies by region, as seen by trends where certain families targeted areas like EMEA and AMER. Subscribing to threat feeds
provides insights into local risks, enabling organizations to adjust firewall policies and security measures accordingly. This tailored approach
ensures defenses align with the most relevant threats, boosting efficiency and resilience.
By combining advanced detection tools with regional threat intelligence, organizations can address both sophisticated and geographically
specific malware challenges. This dual strategy enhances visibility, improves response capabilities, and significantly reduces vulnerability to
cyberattacks. Adopting these practices equips businesses to stay ahead in the dynamic world of cyber threats.

Q4 2024 Internet Security Report Malware Trends 13


NETWORK ATTACK TRENDS
Network exploits continued to bombard organizations in Q4 Unique
Unique IPS Detections
IPS Detections
2024, with attack volumes remaining high and a mix of both old 600
and new threats. In fact, many tried-and-true exploits persisted
500
as top attacks this quarter – some more than five to ten years
400
old – underscoring that attackers stick with what works. One
notable trend was the enduring presence of critical vulnerabilities 300
in widely used enterprise software. For instance, the Microsoft 200
Exchange “ProxyLogon” flaw (a 2021 pre-authentication exploit)
100
remained among the most-targeted attacks and a 2023 HAProxy
web proxy request smuggling flaw stayed under active exploit. 0
Q3, Q4, Q1, Q2, Q3, Q4, Q1, Q2, Q3, Q4, Q1, Q2, Q3,
Overall, Q4’s network attack landscape shows that while novel 2021 2021 2022 2022 2022 2022 2023 2023 2023 2023 2024 2024 2024
exploits emerge, attackers continue heavily leveraging unpatched Figure 9. Unique IPS Detections
legacy vulnerabilities at scale. The takeaway for this quarter is clear,
organizations face a dual challenge of patching old holes and
keeping up with new threats. Average IPS Detections
IPS Activity
After an increase through the middle of the year, in Q4 we saw 140

Total Detections per FIrebox


a sizable drop in network-based attacks targeting organizations 120
around the world. This quarter, each Firebox saw, on average, 92 100
network attacks, a 27% drop compared to 126 for Q3. There was
IPS Attacks
80
a notable 13% increase in the number of unique detection rules
60
triggered over the quarter though, with 492 unique signatures
40
compared to 435 in Q3. Even with overall attacks down for the
quarter, the wider variety of attack techniques means defenders 20

shouldn’t let their guard down. 0


Q4, 2023 Q1, 2024 Q2, 2024 Q3, 2024 Q4, 2024
Throughout the rest of this section, we’ll take a closer look at the
Average Detections per Firebox
network attack trends and specific attacker techniques targeting
organizations worldwide in Q4 2024. Figure 10. Average IPS Detections per Firebox

Top 10 Network Attacks Review


The top 10 network attacks by volume show us the overall trends of network attacks worldwide, in aggregate. In Q4 2024, the data reveals a
heavy concentration of web application exploits. The list is dominated by web-based attacks – from file inclusion and path traversal to XSS
and SQL injection – illustrating that web servers and applications remained prime targets. Many of these signatures represent broad classes of
attacks rather than single vulnerabilities, covering a range of CVEs. Notably, even very old exploits (e.g. decades-old CVEs in file inclusion and XSS
categories) still generate significant traffic, implying that attacks against unpatched legacy systems are widespread on the Internet.

Q4 2024 Internet Security Report Network Attack Trends 14


Top 10 History
Signature Type Name Affected OS Percentage
Windows, Linux, Freebsd, Solaris,
1059877 Exploits WEB Directory Traversal -8 13.12%
Other Unix
WEB dotCMS CMSFilter assets Access
1136822 Web Threats Network Device, Others 7.26%
Control Weakness (CVE-2020-6754)
WEB Microsoft Exchange Server Remote
1138800 Web threats Code Execution Vulnerability -6 (CVE-2021- Windows 7.16%
26855)
Windows, Linux, Freebsd, Solaris,
1054837 Web Threats WEB Remote File Inclusion /etc/passwd 4.75%
Other Unix
WEB-CLIENT Microsoft Internet Explorer
1131523 Buffer Overflow Memory Corruption Vulnerability -2 (CVE- Windows 4.71%
2015-2425)

1059958 Web Threats WEB Directory Traversal -27.u Windows, Linux, Others 4.56%

Windows, Linux, Freebsd, Solaris,


1055396 Web Threats WEB Cross-site Scripting -9 4.35%
Other Unix, Network Device
WEB HAProxy h1_headers_to_hdr_list
1231780 Web Threats Empty Header Name Access Control Bypass Network Device 4.13%
(CVE-2023-25725)
Windows, Linux, FreeBSD, Solaris,
1133539 Web Attacks WEB SQL injection attempt -2.u 3.82%
Other Unix, macOS
Windows, Linux, FreeBSD, Solaris,
1058468 Web Attacks WEB SQL injection attempt -25.a 3.46%
Other Unix

Figure 11. Top 10 Network Attacks by Volume


There were no new additions to the top 10 list by volume this quarter, but there were two returning signatures that had been absent for
several years. Signatures 1133539 and 1058468 rounding out the end of the top 10 list were both absent from the top 10 since Q3 2021 and
Q4 2022 respectively. Both signatures are designed to catch SQL injection attempts against exposed web services. Even in 2024, SQL injection
vulnerabilities remain relevant targets for adversaries.
TopTop
10 10
History
History
[Q4, [Q3, [Q4, [Q1, [Q2, [Q3, [Q4, [Q1, [Q2, [Q3, [Q4, [Q1, [Q2, [Q3, [Q4,
2020] 2021] 2021] 2022] 2022] 2022] 2022] 2023] 2023] 2023] 2023] 2024] 2024] 2024] 2024]
1 1 1

2 2 2 2 2 2

3 3 3 3 3 3

4 4 4 4 4 4 4 4 4

5 5 5 5 5 5 5 5

6 6 6 6 6 6 6 6

7 7 7 7 7 7 7 7

8 8 8 8 8 8 8 8 8

9 9 9 9 9 9 9

10 10 10 10 10 10 10

1059877 1136822 1138800 1054837 1131523


1059958 1055396 1231780 1133539 1058468
Figure 12. History of prominent signatures in the Top 10 since Q3 2022

Q4 2024 Internet Security Report Network Attack Trends 15


New Detections in the Top 50
Signature Type Name Affected OS Rank
WEB SolarWinds Orion API Authentication
1138459 Web Threats Other 39
Bypass -2 (CVE-2020-10148)
WEB Moxa MXview Private Key Disclosure
1134968 Web Threats Network Device 42
Vulnerability -2 (CVE-2017-7455)
WEB Oracle WebLogic Server WorkContextX-
1134359 Web Threats mlInputAdapter Insecure Deserialization -1 Linux, Freebsd, Other Unix 45
(CVE-2017-10271)
WEB Apache Struts ParametersInterceptor
Windows, Linux, Freebsd, Solaris,
1059436 DoS Attacks ClassLoader Security Bypass -2 46
Other Unix
(CVE-2014-0094)

Figure 13. New signatures this quarter among the top 50 signatures by volume.

Signature 1139459 Signature 1059436


This signature blocks exploit attempts against CVE-2020-10148, The final new entry to the top 50 signature detections for the
an authentication bypass vulnerability in the SolarWinds Orion quarter was a decade-old flaw in the popular Apache Struts
platform. CISA pointed to this vulnerability in their analysis of the framework. This vulnerability allows an attacker to access and
SUPERNOVA malware used in the attack against SolarWinds Orion even modify sensitive internal Java class objects on a vulnerable
customers at the end of 2020. The vulnerability stems from how web server. The vulnerability is caused by the Apache Struts’
the Orion web API handles certain HTTP request paths, allowing ParamtersInterceptor function, which is responsible for copying
an attacker to skip authentication entirely by including particular request parameters into the corresponding Java object’s properties
substrings in the URL like WebResource.axd or ScriptResource.axd. on the server. The function lets the attackers use a parameter
The server mistakenly treats requests with these substrings in the named “class” to access and invoke the getClass() method of the
request path as authenticated, which lets the attacker invoke API action object that handles their request. Through this invocation,
commands that should be restricted. they can access the original class object and ultimately access other
classes through the built-in getclassLoader() method. Ultimately,
Signature 1134968
attackers can use this vulnerability to chain together an exploit
This is a vulnerability in Moxa MXview, a network management
capable of executing arbitrary code on the server.
application. Version 2.8 of the application stored the private key
for its web server in a publicly accessible location. Anyone with
network access to the application could retrieve the private key
from the server and use it to decrypt all other communications to
and from the server.

Signature 1134359
This is an insecure deserialization vulnerability in Oracle WebLogic
Server (part of Oracle Fusion Middleware) that was patched and
disclosed in 2017. An unauthenticated attacker could exploit this
vulnerability by sending a SOAP request with a specially crafted
XML body. Deserialization vulnerabilities like this happen when
an application converts user-supplied input into a programming
object (like a function or a data variable) without sanitizing it. With
the right payload, an attacker can trick the server into executing
arbitrary code. In web servers, attackers commonly exploit
deserialization flaws to deploy web shells, giving them extended
remote shell access to the server that can even survive patching
the original vulnerability.

Q4 2024 Internet Security Report Network Attack Trends 16


Most-Widespread Network Attacks
While some network attacks generate high volumes of detections due to repeated exploitation attempts against a few vulnerable systems, oth-
ers stand out because they impact a large number of unique networks. These widespread attacks often indicate opportunistic threat campaigns,
where attackers scan broadly for exposed systems rather than targeting specific organizations. The prevalence of these attacks underscores the
importance of proactive defense measures, as even well-maintained networks can be probed for weaknesses.

Signature Name Top 3 Countries by % AMER % EMEA % APAC %

WEB-CLIENT Microsoft
Internet Explorer Memory France Poland
1131523 Spain 74.01 57.82 60.68 46.75
Corruption Vulnerability -2 70.99 67.05
(CVE-2015-2425)

WEB dotCMS CMSFilter


Germany Brazil Canada
1136822 assets Access Control Weak- 12.99 21.20 10.39
38.29 31.55 15.05
ness (CVE-2020-6754)

Switzerland Australia Germany


1059877 WEB Directory Traversal -8 11.03 16.03 22.51
28.92 22.73 21.8

WEB Microsoft Exchange


Server Remote Code Germany Portugal Switzer-
1138800 9.00 12.76 10.39
Execution Vulnerability -6 20.51 14.71 land 14.46
(CVE-2021-26855)

USA Canada
1132643 WEB Cross-Site Scripting -32 Brazil 27.38 22.30 8.58 9.96
23.89 19.35

Figure 14. Top 5 Most-Widespread Network Attacks

The Most-Widespread Network Attacks table remains entirely unchanged from Q3 2024, with no new additions and in fact, the exact same
rankings for each of the 5 exploits. With that said, there were some major changes in the countries that these exploit attempts most affected. For
example, Spain showed up as the top target for the #1 most-widespread threat, with 74% of all networks having at least one detection. Mean-
while, central Europe remained a popular target for the generic Web Directory Traversal detection (1059877), with Switzerland showing up as the
top victimized country.

Q4 2024 Internet Security Report Network Attack Trends 17


Network Attacks by Region
For much of 2024, the APAC region (consisting of Asia and the Pacific) had an outsized share of network attacks. In Q4, we saw a minor rebalanc-
ing with APAC’s share of network attacks dropping to just 39% of detections (weighted by the number of reporting networks). The bulk of the
volume that left the APAC region made its way to the Americas, which increased from 22% of the share in Q3 to just shy of 36% in Q4. Europe,
the Middle East, and Africa (EMEA) rose slightly from 19% in Q3 to 25% in Q4.

EMEA

20.4% APAC

56.3%
RIC
AME AS

23.3% Average % IPS


Detections
Region Detections
per Firebox
per Firebox
AMER 117 35.67%
EMEA 83 25.30%
APAC 128 39.02%
Figure 15. Average Detections per Firebox by Region

Detections Percentage by Region


Detections Percentage by Region
100.00%
90.00% 22.89% 23.02%
80.00% 39.02%
70.00% 56.31% 59.39%

60.00% 37.41% 37.51%


50.00% 25.30%
40.00%
20.36% 18.80%
30.00%

20.00% 39.70% 39.47% 35.67%


10.00% 23.33% 21.81%

0.00%
Q4, 2023 Q1, 2024 Q2, 2024 Q3, 2024 Q4, 2024

AMER EMEA APAC

Figure 16. Average Detection per Firebox Percentage since Q4 2023

Q4 2024 Internet Security Report Network Attack Trends 18


Average Detections Per
per Firebox by by
Region
Average Detections Firebox Region
850
750
650
550
450
350
250
150
50
-50 Q4, 2023 Q1, 2024 Q2, 2024 Q3, 2024 Q4, 2024

AMER EMEA APAC Overall

Figure 17. Average Detections per Firebox by Region since Q4 2023

Conclusion
Q4 2024’s network attack trends reveal a cybersecurity landscape where old habits die hard for attackers. Many of the quarter’s leading attack
vectors were familiar from past reports, a clear indication that adversaries continue to find success exploiting years-old weaknesses. As we’ve
observed before, once attackers identify an effective exploit, they will reuse it persistently rather than abandon it. This quarter was no exception;
well-known vulnerabilities in web servers (from Microsoft IIS to open-source platforms) and infrastructure software remained lucrative targets.
High-value systems like Microsoft Exchange and popular web apps continued to be in the crosshairs too, which is unsurprising given the poten-
tial payoff of compromising email or web servers.
From a defense perspective, the quarter’s findings reinforce a two-pronged strategy: patch diligently and layer your defenses. Organizations
must ensure that critical patches are applied, especially for the vulnerabilities named in this report, to close off the well-known holes attackers
are probing. Many of these top attacks succeed due to unpatched systems or misconfiguration – issues that good security hygiene can address.
At the same time, a robust intrusion prevention service (IPS) remains vital as a safety net, blocking exploit attempts (old and new alike) in case
something slips through. In short, Q4’s network attack trends highlight the importance of staying vigilant with the basics: keep systems updated,
monitor for abnormal activity, and use layered defenses to catch the inevitable exploit attempts. By doing so, organizations can greatly mitigate
the threats exemplified this quarter and be prepared for whatever new twists future quarters may bring.

Q4 2024 Internet Security Report 19


DNS ANALYSIS By hijacking system resources, Prometei forces infected machines
to mine cryptocurrency without the victim’s knowledge. The
presence of p2.feefreepool.net in this quarter’s DNS data confirms
Domain names play a crucial role in cyberattacks, serving as that cryptojacking remains an active and evolving threat.
gateways for phishing campaigns, malware distribution, and
command and control infrastructure. Cybercriminals continue to
employ tactics such as domain impersonation, typosquatting, and Top Phishing Domains
leveraging legitimate Cloud-based services to disguise malicious
activity. This makes DNS filtering an essential component of a Phishing
layered security strategy, helping organizations detect and block unitednations-my[.]sharepoint[.]com
threats before they reach their targets. WatchGuard’s DNSWatch ulmoyc[.]com
service actively monitors domain resolution requests, preventing
e[.]targito[.]com
users from accessing known malicious sites and analyzing
emerging trends in DNS-based threats. data[.]over-blog-kiwi[.]com
www[.]898[.]tv
edusoantwerpen-my[.]sharepoint[.]com
Malware
WARNING t[.]go[.]rac[.]co[.]uk
polyfill[.]io I t should go without saying nucor-my[.]sharepoint[.]com
newage[.]newminer- that you should not visit any of
the malicious links we share in bestsports-stream[.]com
sage[.]com this report; at least not without click[.]icptrack[.]com
newage[.]radnew- knowing exactly what you are
doing. Anytime you see us share Figure 19. Top Phishing Domains
age[.]com a domain or URL where we
p2[.]feefreepool[.] have purposely added brackets Phishing remains one of the most effective cyberattack tactics,
around a dot (e.g. www[.]site[.] with threat actors continuously leveraging deceptive domains to
net *
com), we are both making
trick users into revealing sensitive information. Attackers frequently
t[.]ouler[.]cc the hyperlink unclickable and
warning you not to visit the impersonate well-known brands, financial institutions, and
t[.]hwqloan[.]com malicious site in question. Please Cloud-based services to increase the credibility of their fraudulent
avoid these sites unless you are campaigns. WatchGuard’s DNSWatch service actively blocks access
profetestruec[.]net a fellow researcher who knows to these deceptive domains, protecting users from credential theft,
how to protect yourself.
pcdnbus[.]ou2sv[.] malware infections, and financial fraud.
com In Q4 2024, the top phishing domains list remained unchanged
from the previous quarter, highlighting the continued use of
backstage[.]cn[.]com
persistent and high-impact phishing infrastructure. The Share-
facturacionmx[.]autos Point-themed phishing domains – such as unitednations-my[.]
sharepoint[.]com, edusoantwerpen-my[.]sharepoint[.]com, and
* New in Q4 2025 nucor-my[.]sharepoint[.]com – suggest that attackers are still
Figure 18. Top Malware Domains exploiting business email compromise (BEC) tactics to target orga-
nizations relying on Microsoft 365 services. These phishing pages
Top Malware Domains often mimic legitimate login portals to harvest credentials.

Cybercriminals continue to rely on malicious domains for malware Additionally, domains like bestsports-stream[.]com and
distribution, command and control (C2) operations, and illicit www[.]898[.]tv demonstrate how attackers use entertainment and
cryptomining. WatchGuard’s DNSWatch service actively monitors streaming-themed lures to attract unsuspecting users. Fraudulent
and blocks these domains to protect organizations from DNS- promotional emails or pop-ups often redirect victims to these
based threats. phishing pages, where they are prompted to enter personal
information or download malicious files.
In Q4 2024, the top malware domains list remained largely
unchanged from previous quarters, with one notable new entry: Despite no new domains appearing on the list, the persistence of
p2[.]feefreepool[.]net. This domain hosts a crypto mining pool, these phishing sites underscores the importance of ongoing secu-
allowing Monero cryptocurrency miners to work together and pool rity awareness training, email filtering, and DNS-layer protection.
their mining power. We added this specific mining pool domain Organizations should continue monitoring phishing trends and
to our block list in October after researchers found the Prometei reinforcing best practices, such as verifying URLs before entering
botnet heavily using it in cryptomining attacks. Prometei is a credentials and enabling multi-factor authentication (MFA) to
stealthy, modular malware that spreads across networks using mitigate credential theft risks.
exploits, stolen credentials, and brute force attacks.

Q4 2024 Internet Security Report DNS Analysis 20


Top Compromised Domains In Q4 2024, the top compromised domains list saw three new addi-
tions, all of which were linked to distinct cyberattack campaigns.
Compromised www[.]omegabrasil[.]net and eficacia[.]com[.]co joined our threat
ssp[.]adriver[.]ru feed in June 2024. Both domains were associated with an “Ether-
Hiding” attack, where threat actors embedded malicious code
www[.]sharebutton[.]co
within the Binance blockchain. Attackers injected fake web browser
www[.]omegabrasil[.]net * update notifications into these otherwise-benign websites, tricking
wieczniezywechoinki[.]pl visitors into downloading and executing malware. This technique
fernandestechnical[.]com * demonstrates how cybercriminals are abusing decentralized
infrastructure to evade detection and maintain persistence.
www[.]uniodonto[.]coop[.]br
We added fernandestechnical[.]com to our feed in March 2024 after
epicunitscan[.]info
finding it used by Magnet Goblin, a financially motivated threat
eficacia[.]com[.]co * actor that we previously covered in our reports. Magnet Goblin has
stopify[.]co targeted businesses with custom malware payloads and stealthy
a[.]pomf[.]cat persistence techniques, often exploiting known software vulnera-
bilities to compromise legitimate websites.
* New in Q4 2024
Beyond these new entries, previously listed compromised domains
Figure 20. Top Compromised Domains
continued to pose risks, serving as launch points for malvertising,
credential theft, and malware distribution. The growing trend of
Cybercriminals continue to exploit legitimate but compromised
leveraging blockchain technology and deceptive browser-update
websites to distribute malware, launch phishing attacks, and
lures highlights the need for proactive website security, timely
conduct financial fraud. Unlike domains specifically registered
patching, and DNS filtering to mitigate these evolving threats.
for malicious purposes, these websites often belong to reputable
businesses, making them more likely to bypass traditional security
measures. Attackers inject malicious scripts, host payloads, or lever-
age vulnerabilities in content management systems (CMS) to turn
these sites into unwitting vectors of cyber threats. WatchGuard’s
DNSWatch service monitors and blocks these compromised
domains, helping prevent users from unknowingly accessing
malicious content.

Q4 2024 Internet Security Report DNS Analysis 21


FIREBOX FEED: DEFENSE LEARNINGS
The cyber threat landscape underscored the need for robust, proactive defenses. As attackers evolve their tactics, securing your data doesn’t
stop where the data resides but extends to all devices and users interacting with your network. From endpoints to IoT, every touchpoint is
a potential vulnerability. Below are three critical takeaways to strengthen protections, ensuring comprehensive coverage across the ever-
expanding attack surface in this dynamic digital environment.

01
Monitor and Restrict Unusual Tools:
Users should report suspicious downloads, like keygens linked to Variant.MSILHeracles, which often bundle malware
such as Remcos or Formbook, amplifying risks. Admins must vigilantly monitor networks for unauthorized tools like
Impacket (Application.Agent.LGP), a Python-based hacktool suite used for protocol manipulation and credential theft.
By setting up alerts for unusual activity and restricting execution of unknown scripts, admins can halt reconnaissance or
lateral movement. This proactive stance prevents attackers from leveraging legitimate-looking tools to infiltrate systems
unnoticed, safeguarding critical infrastructure.

Layer Protection for Endpoints and IoT Devices

02 With droppers like Trojan.Sesfix.1 delivering coinminers and botnets like Trojan.Linux.Mirai.1 targeting Linux and IoT, layered
security is critical. The data supports hardening these systems through zero trust, strong credentials, and firmware updates
to curb malware persistence and spread. Memory-loading techniques and IoT exploitation, as seen in Xmrig infections,
highlight vulnerabilities requiring proactive measures. We recommend implementing these steps to limit resource-hijacking
and DDoS risks, addressing Q4’s diverse threat vectors effectively.

Prioritize Relentless Patching

03
The report underscores that patching remains vital, with attackers exploiting old vulnerabilities like CVE-2017-0199 in Office
and ProxyLogon in Exchange, alongside newer flaws like HAProxy. Security professionals should advocate for rigorous
update schedules across servers and endpoints, coupled with audits of web servers and CMS platforms to eliminate
misconfigurations. This shrinks the attack surface against persistent exploits like SQL injection and directory traversal still
thriving a decade on, ensuring organizations don’t fall prey to adversaries banking on outdated systems.

Q4 2024 Internet Security Report 22


ENDPOINT
THREAT
TRENDS
Q4 2024 Internet Security Report 23
WatchGuard Endpoint Protection, Detection and Response (EPDR) If you have read the Internet Security Report before, you are
combines both Endpoint Protection (EPP) and Endpoint Detection familiar with our due diligence in trying to expand the endpoint
and Response (EDR) into one comprehensive solution. Users can data set and improving readability. Whether that is in the form of
expect moment-in-time protection from malware and non- changing the way a graph looks, altering data types, or drilling
intrusive response to suspicious threats across all protected down into a subsection to augment understanding. This quarter is
endpoints. Advanced EPDR users receive additional threat hunting no exception to this tradition. In fact, we have made more changes
service granularity and more telemetry, all in one central location. this quarter than ever before. Not only that, but it is the last quarter
Of these users, some opt to send WatchGuard anonymous data, of the year and we include data that only appears in Q4. We will
which we aggregate into this report; specifically, the Endpoint summarize the changes and then notify you again when we get to
section herein. The more data we get, the more we can share in this the appropriate subsections.
report!
The first major change for this quarter is the alteration of raw
WatchGuard EPDR data is not the only inclusion in this section. numbers into composition percentages. When we present a table
We also use the Ransomware Tracker data, which includes double or graph with various large numbers, the human mind instinctively
extortion victim summations and active and inactive group attempts to determine the ratio of a data point with respect to the
coverage. We then sprinkle in notable breaches from these groups entire data set. For example, if there is a table with five data points,
and other ransomware-related events to help decision-makers one has 100,000 and the other four have 50,000. We instinctively try
to know which industries and organization types are targeted by to determine how much 100,000 is with respect to the sum of all
these groups. Couple that data with specific endpoint telemetry data points (e.g., 100,000/(100,000+50,000*4) -> 100,000/300,000
from WatchGuard EPDR and we believe this report better enables = 33.33%). This change is present in the Number of Machines
MSPs and businesses to prioritize where to focus their time. Affected, Alerts by Technology, Alerts by Exploit Type, and Attack
Here is this quarter’s coverage: Vectors subsections.

• Total malware threats Other sections had other subtle changes such as adding a table
column to discern the quarter-over-quarter differences. For
• New malware threats per 100k active machines example, in the Alerts by Exploit Type subsection, we altered the
• The number of alerts by the number of machines affected raw data to alert composition, as described above, and then added
(Revised!) a column that calculates the alert composition difference from the
quarter prior. Other subsections with these minor changes include
• The number of alerts by which WatchGuard technology
the Top 30 Countries, Top 10 Threat Hunting Rule Invocations, and
invoked the alert (Revised!)
the Threat Hunting MITRE ATT&CK matrix alert subsections.
• Alerts by exploit type (Revised and Enhanced!)
The most notable change this quarter is the Attack Vectors
• Attack vectors (Revised and Enhanced!) subsection, which has evolved more than any other subsection.
• Top 30 affected countries each quarter (Enhanced!) Years ago, we tracked five or six data points for Attack Vectors
and included a summation pie graph to visualize a threat actor’s
• Cryptominer detections
manner of infection. Then, we drilled down into each data point to
• Top 10 most-prevalent malware provide more granular attack vectors. Now, as of this quarter, we
• Top 10 most-prevalent potentially unwanted programs have added more data points and are now providing this granular
(PUPs) data for every data point. The increase in data we ingest allows us
to relay that information to readers. We will expand on these data
• Top 10 threat hunting rule invocations (Enhanced!) points when we get to the Attack Vectors subsection.
• Threat hunting MITRE ATT&CK tactics and techniques The final changes made to the Endpoint section primarily pertain
(Enhanced!) to it being the last quarter of the year, but we also enhanced the
• Ransomware detections (WatchGuard) notable ransomware breaches subsection. That subsection now
includes notable ransomware events including law enforcement
• Ransomware double extortion landscape
actions and modifications to the inner workings of ransomware
• Notable ransomware events (Revised!) groups. We differentiate breaches and events using the Notable
Ransomware Events and Notable Breaches labels. The Alerts by
Number of Machines Affected, Alerts by Technology, and Ran-
somware Landscape subsections include annual changes only
appearing for those in the fourth quarter.
That is enough staging for now. Let us begin with Malware
Frequency as is customary for the Endpoint section.

Q4 2024 Internet Security Report Endpoint Threat Trends 24


MALWARE FREQUENCY New Threats Blocked per
We discussed at length the changes throughout this report, but 100k Active Machines 8
the Malware Frequency subsection had absolutely no alterations
except for the data itself. We define Malware Frequency in two Figure 23: Q4 2024 New Malware Threats (Previously Unknown)
ways. The first is the total number of malware threats, which is the
number of unique malware hashes observed in the quarter. Thus,
we do not count multiple instances of the same malware hash. 140

Right out of the gate, total unique malware threats are significantly
down for the quarter, showing historically low rates. Considering
Q3 had uncharacteristic high malware threats, combined with Q4’s
88
atypically low levels, the quarter-over-quarter reduction is also a
historic 91.14% decrease. If we assume the third quarter was an
outlier, the change from Q2 to Q4 is still abnormal with a 64.51%
decrease. Therefore, we have observed never-before-seen low rates 36

of unique malware threats this quarter, however you put it.


8

2024 Q1 2024 Q2 2024 Q3 2024 Q4


Total Malware Threats 37,250 Figure 24. Q4 2024 QoQ New Malware Threats Per 100k
Active Machines
Figure 21. Q4 2024 QoQ Total Malware Threats
Alerts by Number of Machines Affected
The next few subsections, including this one, take the malware
threats from the previous Malware Frequency subsection and
420,304
expands on it. It attempts to better understand why the Malware
Frequency numbers the way they are. Alerts by Number of
Machines Affected helps explain threats that are isolated or are
more widespread. Malware appearing on only one machine is more
targeted or isolated. Whereas malware appearing on more than
173,751
one hundred machines, for example, are usually spam attacks or
widespread botnet campaigns targeting whichever users click on a
phish or accidentally navigate to infected websites. We define the
104,951
schema for how we tally data points from this subsection below.
37,250
• 1 – Exactly one machine alerted on this file/process.
2024 Q1 2024 Q2 2024 Q3 2024 Q4
• >=2 & < 5 – Between two and five machines alerted on this
file/process.
Figure 22. Q4 2024 QoQ Total Malware Threats
• >=5 & < 10 – Between five and ten machines alerted on this
The second way we determine malware frequency is all the newly file/process.
observed malware threats previously unseen and unclassified • >=10 & < 50 – Between ten and fifty machines alerted on
by WatchGuard. We then set this to a ratio of “per 100k active this file/process.
machines” to simulate a moderate-sized organization, meaning we
• >=50 & < 100 – Between fifty and 100 machines alerted on
skew the number of alerts for every 100k active EPDR-protected
this file/process.
systems. If the total malware threats were historically low, it is
almost a certainty that we will not see a bunch of new malware, • >=100 – More than 100 machines alerted on this file/
and that is the case here. We tallied only eight new threats per process.
100k active machines this quarter, which again is historically low. By no surprise, the composition of alerts skews towards malware
Last quarter we observed 36 per 100k active machines even with on one machine with 87.80% of all alerts. However, considering
an outlying high number of total malware threats. This equals most alerts are for those appearing on only one machine, a 9.64%
a 77.78% reduction from last quarter. We use other subsections decrease from the quarter prior is a significant drop. This is in line
below to try and better understand what constituted this reduc- with the massive decrease in total malware threats earlier in the
tion, and if we are lucky, what caused it. section. The reduction in Malware Frequency is due to a decrease
in targeted or one-off attacks described by this data. In its place,
malware appearing on between two and five machines saw the
increase this quarter – 6.99%. The others saw minor increases that
are almost negligible to the overall count.

Q4 2024 Internet Security Report Endpoint Threat Trends 25


Alerts

90% 92% 94% 96% 98% 100%

Alerts
1 423034
>= 2 & < 5 7769
>= 5 & < 10 1924
>= 10 & < 50 1202
>= 50 & < 100 121
>=100 104

1 >= 2 & < 5 >= 5 & < 10 >= 10 & < 50 >= 50 & < 100 >=100

Figure 25. Q4 2024 Alerts by Number of Machines Affected

For this quarter only, we have included another graph that shows the alert composition totals for each schema. The x-axis defines the four
quarters, left to right. The y-axis is the alert composition total, beginning at 80%. The colors are the different schemas. The graph shows a similar
sharp increase like malware frequency’s Total Malware Threats that correlates to malware on only one machine. This supports the theory that
isolated malware was the cause of the atypical increase in total malware threats for last quarter.

100%

98%

96%

94%

92%

90%

88%

86%

84%

82%

80%
Q1 Alert Comp. Q2 Alert Comp. Q3 Alert Comp. Q4 Alert Comp.

1 >= 2 & < 5 >= 5 & < 10 >= 10 & < 50 >= 50 & < 100 >=100

Figure 26. Q4 2024 Alerts by Number of Machines Affected

Defense in Depth
Defense in depth gets its name from the idea that multiple technologies layered on top of one another provide a stepping-stone defensive
posture that attacks must try and navigate through. Thus, bypassing only one technology will not necessarily result in a block attack. Threat
actors must successfully bypass all technologies. This is why defense in depth is the recommended approach for both networks and endpoints.
In fact, network solutions combined with endpoint solutions in and of itself is defense in depth, but if these measures exist across the network
and all endpoints, the defense in depth compounds. For WatchGuard EPDR-protected endpoints, we employ the following six technologies to
thwart attacks.

Q4 2024 Internet Security Report Endpoint Threat Trends 26


Endpoint Technologies • Manual Attestation – Manual Attestation is a fancy way of
saying that a human analyst scrutinizes the file. If the file
• Endpoint Detection – The typical legacy endpoint antivirus makes it past all other technologies and still looks suspi-
solution, Endpoint Detection displays the number of hashes cious, one of WatchGuard’s attestation analysts performs
invoking an alert located in our known-malicious hash data- the analysis and determines a classification. Once a file
base. This is commonly called a signature-based detection reaches this stage, a classification, whether goodware, PUP,
antivirus solution. or malware, is always determined.
• Behavioral/Machine Learning – Behavioral/Machine Learn- • Defined Rules – The final technology, Defined Rules, are
ing is a step above signature-based detections because predefined behaviors that, if a file were to perform, we
it analyzes the file’s actions upon executing in a sandbox. would determine are malware. Most people associate
We create rules based on these behaviors and determine defined rules with threat hunting, but these rules can also
whether they are malware. apply to endpoint detections.
• Cloud – Alerts in the Cloud category are files sent to Total malware threats, never-before-seen malware, and malware
WatchGuard’s Cloud servers for further analysis beyond appearing on one machine all saw drastic reductions from last
signature-based detections and behavior/machine learning. quarter. So, which technology compliments this reduction? The
Malicious files iterate the counter here. only technology with a decreasing quarter-over-quarter alert com-
• Digital Signature – Digital Signatures are methods of position was AD360 Endpoint Detection, which is traditionally the
determining the authenticity and legitimacy of the sending first line of defense for EPDR. AD360 Endpoint Detection functions
user and ensuring it hasn’t been tampered with (integrity). as an antivirus that detects malware by signatures. Interestingly,
We determine malware based on these digital signatures. a sharp decrease in all these numbers was akin to quarter two of
If an attacker altered it in transit, it is a digital signature this year, which showed the same behaviors. Therefore, it’s easy to
from a known malicious user, or if we know the signature is surmise that easy-to-detect malware threats appearing on only one
compromised, we make a further decision. machine comprise most of the malware landscape, and these are
subsequently blocked immediately upon arriving on a protected
endpoint.

AD360 Endpoint Detection 16.26%

Defined Rules 1.90%

Digital Signature 17.74%

Behavioral/Machine Learning 14.74%

Cloud 31.91%

Manual Attestation 17.45%

Figure 27. Q4 2024 Alerts by Number of Machines Affected

As promised, we have included annual data for this section since it is the last quarter of 2024. This year we observed a zigzag malware land-
scape where quarters one was similar to Q3, and Q2 was similar to Q4. There was no consistency throughout the year, which is a nightmare for
decision-makers. We can also conclude that neither of these quarters are true outliers because any given quarter had a different complimentary
quarter in terms of the data. Q1 and Q3 were driven by AD360 Endpoint Detections. Whereas Q2 and Q4 were more balanced, but spearheaded
by Cloud detections. This quarter was the most balanced of them all, with all technologies receiving a similar number of alerts, except for
Defined Rules.

Q4 2024 Internet Security Report Endpoint Threat Trends 27


100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%
Q1 Alert Comp. Q2 Alert Comp. Q3 Alert Comp. Q4 Alert Comp.

AD360 Endpoint Detection Defined Rules Digital Signature Behavioral/Machine Learning Cloud Manual Attestation

Figure 28. Q4 2024 Alerts by Number of Machines Affected


Alerts by Exploit Type
As opposed to Alerts by Number of Machines Affected and Defense in Depth, the data in this subsection begins to describe which behaviors
resulted in a blocked detection. Alerts by Exploit Type are exactly what it sounds like; these are alerts invoked via common exploit behaviors. For
example, if malware attempts to hollow out a process and inject itself into it, we define that in our RunPE exploit label, and each block from that
technique tallies there. You can review more about the definitions of each exploit on WatchGuard’s Knowledge Base article located here.
The only exploit behavior with a drastic increase in occurrences was PsReflectiveLoader1, which describes malware that locally leverages Power-
Shell to inject payloads in its own memory. An example of this is Mimikatz. On the other hand, the exploit with the sharpest decrease from last
quarter was the second most alerted exploit – RemoteAPCInjection. The description of this exploit is quite literal. RemoteAPCInjection is when
malware uses Asynchronous Procedure Calls (APCs) to inject code remotely. As for the rest of the exploits, the results were a mixed bag, and we
will let the data on the table (and the Knowledge Base article) do the talking.

Raw Difference Percentage Difference


Technology Q3 Alerts Q4 Alerts
from Q3 from Q3

PsReflectiveLoader1 7,087 94,583 +87496 61.21%

RemoteAPCInjection 7,407 15,698 +8291 10.16%


NetReflectiveLoader 2,155 14,731 +12576 9.53%
ShellcodeBehavior 757 11,352 +10595 7.35%
RunPE 2,836 8,111 +5275 5.25%
WinlogonInjection 1,031 4,236 +3205 2.74%
APC_Exec 35 2,811 +2776 1.82%
DumpLsass 1,295 1,286 -9 0.83%
AmsiBypass 1,813 835 -978 0.54%
ThreadHijacking 430 385 -45 0.25%
ROP1 2,004 173 -1831 0.11%
PsReflectiveLoader2 2 131 +129 0.08%
IE_GodMode 132 120 -12 0.08%
ReflectiveLoader 29 37 +8 0.02%
DynamicExec 20 19 -1 0.01%
HookBypass 24 15 -9 0.01%

Figure 29. Q4 2024 Alerts by Number of Machines Affected

Q4 2024 Internet Security Report Endpoint Threat Trends 28


Alerts by Top 30 Countries Affected Country Alert Coefficient
Order Difference
from Q2
This subsection shows where the alerts came from no matter
Laos 0.51 +5
what technology blocked it, how many machines it was on, or
what behavior invoked it. Naturally, the countries with more EPDR Morocco 0.38 +1
licenses will have the most alerts. To combat this, we have created
Armenia 0.28 +1
a simple ratio formula to even the playing field. We take the alerts
for a given country and divide it by the active machines (machines Cuba 0.14 -3
with active EPDR licenses). It is important to remind you that this China 0.11 NEW
only pertains to the EPDR-protected systems that have also opted India 0.09 NEW
in to share anonymous data.
Norfolk Island 0.06 +10
The simple Alert Coefficient (AC) equation is below. Bolivia 0.06 +1
In the introduction to this section, we touched on how this was Pakistan 0.06 -7
one of the enhanced subsections where we added an additional
Zimbabwe 0.06 NEW
column to provide more insight. The column we added is “AC
Diff from Q3,” which takes the difference of the Alert Coefficient Bangladesh 0.06 +2
from the quarter prior. We placed it between the Alert Coefficient Vietnam 0.06 +4
(AC) column and the Order Diff from Q3 column. Of course, if the Tajikistan 0.05 +8
country was not on the list in the quarter prior, we would simply Nigeria 0.05 +11
label both columns as NEW.
Turkey 0.04 -
Laos saw the largest increase from Q3, which made it into the top
Luxembourg 0.04 NEW
country affected this quarter based on AC. Other countries with Indonesia 0.04 -3
AC increases were Armenia, Tajikistan, and Nigeria. There were a
Macedonia 0.03 NEW
myriad of new countries that did not appear in Q3: China, India,
Zimbabwe, Luxembourg, Macedonia, Singapore, Mozambique, Singapore 0.03 NEW
Dominican Republic, Angola, Ghana, and Ecuador. Surprisingly, Trinidad and Tobago 0.03 +8
three countries had the exact same AC as the quarter prior: Norfolk Malaysia 0.03 -2
Island, Vietnam, and Trinidad and Tobago. The rest of the countries
Mozambique 0.03 NEW
in the list saw slight-to-moderate AC decreases, expect for Cuba,
which was the top country for last quarter and had a significant Andorra 0.03 -3
decrease of -0.92. Dominican Republic 0.03 NEW
Guatemala 0.02 -14
Angola 0.02 NEW
Thailand 0.02 -3
Paraguay 0.02 -6
Ghana 0.02 NEW
Ecuador 0.02 NEW

Figure 30. Q4 2024 Alerts by Top 30 Countries Affected

Figure 31. Q4 2024 Alerts by Top 30 Countries Affected

Q4 2024 Internet Security Report Endpoint Threat Trends 29


TOP MALWARE AND PUPS Top 10 Most Prevalent Malware
The top 10 malware and PUPs for each quarter are a favorite for As we just touched on, five of the top 10 malware were ransom-
many readers because it does not describe arbitrary aggregated ware related. However, only three of these were ransomware
data. It defines and describes specific malware families and encryptor payloads. There were two Black Basta payloads and one
software that is attempting to intrude on systems. The theme for Play encryptor. The other two ransomware-related files were a
this quarter appears to be record-shattering, because the top 10 Black Basta loader and an OpenSSL DLL used by the group.
malware for this quarter was also historic. The top five from the list The other five files were mostly information stealers or had infor-
are all related to ransomware, which foreshadows the ransomware mation-stealing capabilities. A malicious coinminer steals computer
landscape section later in this section (hint: the ransomware resources to mine cryptocurrency on behalf of a threat actor.
numbers are up across the board!). On the other hand, the top 10 Lumma, Conficker, and Moonlight all have information-stealing
PUPs are more of the same from last quarter. capabilities, with the latter two having worm capabilities. The other
malware in the top ten was a LNK (shortcut) file that executed a
PowerShell script. This is common for malware to use to download
additional payloads. We provide additional details about each of
these malware families below.

MD5 Signature Alerts Classification Attestation

Malicious OpenSSL DLL


0CC6739009F44EEC91FAED0A63F9CC81 Trj/Agent.OOX 464
(Black Basta)
EAE2C3ED7CE3E11A0668304B21077320 Trj/Agent.OOX 456 Black Basta Ransomware
C6D541E4D782D8EE8967EC8DFF0E886B Trj/Agent.OOX 452 Black Basta Loader
8018A731E57DA5E697C96E21632D4476 Trj/Agent.OOX 450 Black Basta Ransomware
C2945F7ACA2C017D6E4D35C5EA41255D Trj/GdSda.A 250 Play Ransomware
1F5FFF9F9E92965F29BFA92B60BFC0FF Trj/Agent.AEZG 239 Malicious Coin Miner
9B20069911C33DBB8DC65640CF193731 Trj/LnkRun.B 108 LNK that executes PS1
6AE17B0BDDDA685EAA622CEF4BA2E805 Trj/CI.A 103 Lumma Stealer
7D9542EF7C46ED5E80C23153DD5319F2 W32/Conficker.C.worm 100 Conficker Worm
D60361B58C0CAABA002CD9427A8DE32D W32/Moonlight.A.worm 100 Moonlight Worm
Figure 32. Q4 2024 Top 10 Most Prevalent Malware

Black Basta Play


Black Basta is both the name of the ransomware group and the Play is a ransomware group with several connections to the old
name of the group’s encryption software. They first appeared Conti ransomware group and Quantum, which was an offshoot
around February 2022 and is widely believed to be composed of operation with former Conti members. The Play group operators
former Conti and Revil members, another two ransomware groups. primarily use phishing email attachments and software exploits
Black Basta is also a ransomware-as-a-service (RaaS) that allows to infiltrate systems. They have been known to exploit a known
affiliates and other users to use their encryption software and FortiGate exploit to begin their infection chain. From there they
infrastructure for a small cut of the financial gains. Most splits are use common hacker tools and living-off-the-land binaries to
90/10 and 80/20. Later in 2022, the group upgraded their encryptor perform continued attacks on systems rresulting in encryption via
to Black Basta v2. The first version used a combination of Cha- their encryptor. The encryptor utilizes AES to encrypt files and RSA
Cha20 and RSA-4096 and their second version leveraged a hybrid to encrypt the AES symmetric key.
encryption scheme of XChaCha20 and the NIST P-521 elliptical Read more about Play on the Ransomware Tracker.
curve algorithm. Using these encryptors, the group has coerced
hundreds of victims, only a fraction of which are ever published. Malicious Coinminer
Coinminer is short for cryptocurrency miner and is inherently
Read more about Black Basta and Black Basta v2 on the non-malicious. Cryptocurrency mining is a natural process for
Ransomware Tracker. acquiring cryptocurrency on some blockchains, the most obvious
being bitcoin. What makes a coinminer malicious is the context
and telemetry of the file in question. An example of a malicious
coinmining is executing software that installs a coinminer without
the user’s knowledge or consent or is dropped from an information
stealer.

Q4 2024 Internet Security Report Endpoint Threat Trends 30


Malicious LNK-PS1 Moonlight
A LNK file (.lnk) is a Windows shortcut file that points to another Moonlight is a worm that spreads in multiple ways. Once on a
file location on the system. These commonly exist on the desktop system, it harvests information like an information stealer and then
where users can double-click them and run an executable in duplicates itself to several locations for persistence. It then uses
another location on the computer. Threat actors leverage LNK files stolen emails and sends phishing attacks to these users to spread
to execute scripts without the user’s knowledge. The path location further. It also attempts to spread to network share drives disguised
is actually a small script that loads additional malware. as legitimate files. What makes Moonlight even more unique is
its polymorphic nature that, in addition to propagation, makes
Lumma Stealer
it difficult to detect with basic antivirus products. A more robust
Lumma Stealer is a malware-as-a-service information stealer
solution is necessary to fully disinfect.
that has existed since late 2022. It targets the usual information
on victim machines such as browser extensions, passwords, and
cryptocurrency wallets. It also has capabilities as a loader to install
Top 10 Most-Prevalent PUPs
additional payloads and exfiltrates stolen data using HTTP POST The top 10 PUPs (potentially unwanted programs) were mostly
requests. uneventful. Seven of the 10 appeared in the top 10 list last quarter.
We denote repeats with a red asterisk in the table. The three new
Conficker
ones include the Browser Security application, which is a legitimate
Conficker is a worm that has been around since 2008. It is usually
application that tracks user behavior, earning it a PUP designation.
spread via USB thumb drives and attempts to self-propagate to
The second was Jdownloader 2, again, another genuine applica-
other systems and networks because it is a worm. What is unique
tion, but the installer comes bundled with adware in the form of
about Conficker is that it uses a domain-generation algorithm
toolbars. The last new addition is a Softonic installer. Softonic is also
(DGA) to connect to URLs that host additional malware or function
genuine software, but it to has an installer bundled with adware.
as a command and control server (C2). A DGA algorithm dynamical-
Noticing a theme here? If your software uses an installer bundled
ly creates a domain for the malware to connect to using a specific
with other external software, it is a PUP.
pattern. For example, a malicious file could have a DGA that
dynamically creates domains that are 16 alphanumeric characters
and end in ‘.net’ (e.g., 01234567890abdef.net).

MD5 Signature Alerts Classification Attestation

HackingTool/
2914300A6E0CDF7ED242505958AC0BB5* 752 KMS_VL_ALL_AIO
AutoKMS
FC3B93E042DE5FA569A8379D46BCE506* PUP/Hacktool 431 Mail PassView
PUP/
136C60612962C8FA36B6A46009BF8CE8 399 Browser Security
BrowserSecurity

F7191FE14D2F5E7C4939C2FCA5F828C2* PUP/Generic 371 RVEraser

HackingTool/
8D0C31D282CC9194791EA850041C6C45* 367 KMSPico
AutoKMS
HackingTool/
CFE1C391464C446099A5EB33276F6D57* 335 AutoPico
AutoKMS
219218AE29B2F9DFC8F6B745C004B1E3* PUP/Patcher 249 AMTLib
A9DAAD0505339EC723069CAFD14C781B PUP/Multitoolbar 198 Jdownloader 2
AC8CA19033E167CAE06E3AB4A5E242C5 PUP/Softonic 180 Softonic Installer
B4440EEA7367C3FB04A89225DF4022A6* PUP/TechUtilities 180 PDFixers

Figure 33. Q4 2024 Top 10 Most Prevalent PUPs

Q4 2024 Internet Security Report Endpoint Threat Trends 31


PUP Signature Descriptions PUP/TechUtilities
“TechUtilities” refers to software meant for computer administrators
HackingTool/AutoKMS but performs possible suspicious or unwarranted actions. An
AutoKMS is an umbrella term encompassing any cracked Microsoft example of a TechUtility PUP are PC optimization tools that mess
software that allows users to use Microsoft products without a with system settings that have not been requested by the user.
license, or it is a file that facilitates the bypass of Microsoft licensing.
PUP/Hacktool
PUP/Hacktool is a generic classification for any tool or software AT TACK VEC TORS
used for hacking purposes. Both legitimate penetration testers and In the introduction, we talked about how Attack Vectors contained
malicious threat actors use these tools. For this reason, we classify the most drastic changes for this quarter, and this will be apparent
these as PUPs because we cannot be sure whether these tools are when seeing the subheaders and corresponding graphs. For one,
malicious. However, we may classify it as malware if we capture there are more graphs, a lot of them! The section got a complete
telemetry or additional context that allows us to determine if a overhaul on how we collect the data, and we collect more of it
malicious threat actor uses a hack tool. Most open-source tools are internally, which allows us to relay that to readers. Previously,
PUPs or goodware. It is the proprietary ones that we usually label we collected data on these Attack Vectors: Acrobat, Browsers,
as malware. Office, Other, Scripts, and Windows. Now, we also have Coding
PUP/BrowserSecurity Software, Database Software, and Remote Access Software. Also,
Browser Security is a legitimate application and is not explicitly we have renamed the Office Attack Vector to Microsoft 365, which
malicious. However, most endpoint solutions consider this a encompasses all Microsoft 365 software, not just Office-related
PUP because it usually installs on users computers without their software. Additionally, we have revamped the Windows Attack
consent. These are usually always classified as PUPs, but because Vector to highlight living-off-the-land binaries. We renamed it to
Brower Security collects information about browsing activity, which Windows (LOLBAS) to reflect this change. Each attack vector now
could include sensitive data, there is no doubt it is, at minimum, a has a subsection within them (except the Other Attack Vector) to
PUP. highlight exactly what processes we are seeing throw alerts. All
Attack Vectors have more granular descriptions below.
PUP/Generic
This is arguably the most generic classification possible. The most Attack Vector Descriptions
likely scenario for a sample to earn this classification is if it did not
fit within any other signature. Another reason for a file to earn this Acrobat – Adobe Acrobat is a suite of software services provided by
classification is if the sample performed suspicious actions that Adobe, Inc. primarily used to manage and edit PDF files. PDF files’
were not exactly malicious but performed actions not commonly ubiquity and ability to bypass email and file transfer filters make
associated with legitimate behaviors. Many of these behaviors Acrobat services ripe for malicious use.
consider the sample’s context and telemetry. Browsers – Internet browsers are familiar products for all mod-
PUP/Patcher ern-day computer users that allow access to the World Wide
Patchers are files that either patch (modify) additional files for Web (WWW). Common browsers include Chrome, Firefox, Safari,
whatever reason or patch themselves again for some arbitrary and Edge, among many others. Current browsers store personal
reason. information – if you allow them – including passwords, cookies,
cryptocurrency private keys, and even credit cards, making them
PUP/Multitoolbar common targets for information-stealing malware.
This signature defines software that installs multiple toolbars or
extensions on a system, usually without the user’s explicit consent. Coding Software – Attack Vectors here are from software used
These are commonly bundled in installers where a good portion of for coding (i.e., software engineering). If an Attack Vector is both
users click the button that will progress them through the instal- coding software and a scripting tool, we determine the purpose of
lation the fastest, not knowing these toolbars are bundled in; they the processed invoked and increment there. Therefore, if there is a
are checked by default and must be disabled during installation. Python executable and a Python-related DLL, the Python execut-
Many of them come with additional adware too. able is a Script – it is used to run a Python script – and we count the
DLL as Coding Software.
PUP/Softonic
Softonic is a legitimate file download service used by numerous Database Software – Database Software is an Attack Vector
applications. It is almost always classified as a PUP because the describing software used to manage and operate databases.
software included in their installations includes adware, toolbars, Common database software is PostgreSQL, Microsoft Access, and
or other PUPs. Endpoint solutions and analysts sometimes classify MongoDB.
these installers as PUP/BundleInstaller. Both are correct and both Microsoft 365 – This Attack Vector encompasses all applications
are PUPs by WatchGuard’s standards. under the Microsoft 365 umbrella. The complete list is located
here.

Q4 2024 Internet Security Report Endpoint Threat Trends 32


Other – The Other attack vector is “everything else.” Detections include explorer.exe, msiexec.exe, rundll32.exe, and notepad.exe.
within this category are those that did not fit any other category. Trojans commonly impersonate these files or inject malicious code
This includes AutoKMS tools, Remote Services, and third-party into them because they exist on every Windows machine out of the
applications, among many others that change every quarter. box and are inherently trusted. These are commonly called living-
off-the-land binaries (LOLBAS).
Remote Access – Attackers commonly use remote access software
to remotely control victim systems. Hence the name. These tools
are important for system admins and other IT professionals, but Attack Vectors Summation
hackers notoriously abuse them to distribute malware. Some Aside from the aforementioned changes, we also made the alter-
remote access tools include Radmin, LogMeIn, TeamViewer, and ation to track data in alert composition percentages as opposed to
Impero. raw numbers. We always calculated this data when collecting and
Scripts – Scripts, which always invoke the most detections each analyzing this data, and we instinctively use alert compositions to
quarter, are files derived from or using a scripting programming describe the data, and we figured it made sense to report it as such.
language. Malware utilizes PowerShell, Python, Bash, and AutoIT Do not worry, we calculated the alert composition for the quarter
scripts to download other malware and deliver payloads, among prior to determine the differences shown in the table below.
other things. Considering Windows is the most attacked operating Since we have three new Attack Vectors, there is no difference in
system, it is no wonder PowerShell continues to skew the results for calculation, and we made sure the table reflects this so as not to be
Windows detections. confusing. Besides that, the table is straightforward. All the attack
Windows (LOLBAS) – Under the hood, Windows-based software vectors decreased from Q3 aside from Scripts, which saw a sharp
houses the most data points of any attack vector. It contains the increase (39.48%). For this quarter, it comprises 82.94% of all attack
most detections but not in the highest quantities. The files included vectors. Now that we include graphs for each attack vector, we can
in this group ship with the Windows operating system. Examples show you just how PowerShell dominates the landscape.

Raw Difference Percentage Difference


Attack Vector Q1 Count Q2 Count
From Q1 From Q1
Acrobat 284 588 304 107.04%
Browsers 1716 6123 4,407 256.82%
Coding Software - 127 - -
Database Software - 241 - -
Microsoft 365 2058 0 -2,058 -100.00%
Other 1859 8666 6,807 366.16%
Remote Access Software - 1068 - -
Scripts 11260 125151 113,891 1011.47%
Windows 7898 4452 -3,446 -43.63%
Figure 34. Q4 2024 Attack Vectors

Acrobat 0.76%

Browsers 4.36%

Coding Software 0.08%

Database Software 0.11%

Microsoft 365 2.92%

Other 4.14%

Remote Access Software 1.10%

Scripts 82.94%

Windows 4.03%

0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% 90.00% 100.00%

Figure 35. Q4 2024 Attack Vectors


Q4 2024 Internet Security Report Endpoint Threat Trends 33
Browser Attack Vectors Database Software Attack Vectors
We have included the Browser Attack Vector subsection for a few Database Software is akin to Coding Software in that it was
quarters now. It was the first one we created in addition to the responsible for a miniscule number of alerts with respect to the
summation chart. Then we added Office (Microsoft 365) earlier this other attack vectors. Coding Software accounted for 0.08% of alerts
year. Now, with the additional data, we expanded them to all attack whereas Database Software Attack Vectors accounted for 0.11%.
vectors, except for Other. With that ingestion of additional data, we With that in mind, the database-related alerts were relatively even
caught a few more browser detections that usually do not make across the board. SQL server led the way with 40.66% of all alerts,
the list, although they have before. Those browsers are Brave and followed by Access and PostgreSQL. We had no other alerts from
Opera. The usual suspects appear too: Chrome, Edge, Firefox, and any other database software this quarter.
Internet Explorer. This quarter, Chrome led the way with 71.54% of
all detections, followed far behind by Edge, Firefox, and Internet
Explorer, respectively. There were a few detections from Brave and
Opera, who shared the spoils of last place.

Brave 0.05%

Chrome 71.54%

Edge 16.71%

Firefox 9.04%

Internet Explorer
Figure 38. Q4 2024 Database Software Detections
2.61%

Opera 0.05% Microsoft 365 Attack Vectors


This attack vector encompasses all Microsoft 365 applications. So,
0.00% 20.00% 40.00% 60.00% 80.00% 100.00%
if an application is not in the graph, it did not invoke any alerts on
Figure 36. Q4 2024 Browser Detections our endpoints. Office Misc. is a label for Office-related helper files,
such as the Office application itself. Those files alerted the most,
Coding Software Attack Vectors followed closely behind by OneDrive, Outlook, and Word. The next
tranche of alerts came from Access (which also appears in the
Coding Software is the smallest Attack Vector subsection by raw
Database Software Attack Vector), Excel, and Teams. Finally, there
numbers, and it is a two-horse race between NodeJS and Java.
were a select few applications that invoked a handful alerts here
Then a few invocations from ElectronJS. Java and NodeJS were
and there: Clipchamp, OneNote, PowerPoint, and Visio. The exact
pretty even, but we observed slightly more NodeJS than Java. Keep
ratio for each is in the bar graph.
in mind that all three of these combined equated to 0.08% of all
alerts.
Access 8.50%
Clipchamp 0.12%
Excel 9.22%

Access 29.05% Office Misc. 24.27%


OneDrive 19.66%
OneNote 1.82%
Outlook 17.84%
PostgreSQL 30.29%
PowerPoint 1.21%
Teams 8.37%
Visio 0.24%

SQL server 40.66%


Word 17.23%

0.00% 20.00% 40.00% 60.00% 80.00% 100.00%

0.00% 20.00% 40.00% 60.00% 80.00% 100.00% Figure 39. Q4 2024 Microsoft 365 Detections

Figure 37. Q4 2024 Coding Software Detections

Q4 2024 Internet Security Report Endpoint Threat Trends 34


Remote Access Attack Vectors Windows (LOLBAS) Attack Vectors
Threat Actors love remote access tools because they are trusted The Windows data points look like quarters prior. However, we
software that allows for remote control of a victim machine. If an expanded the data set and now focus on living-off-the-land bina-
attacker has remote access to your system, the possibilities are ries (LOLBAS). These are trusted Windows binaries, usually signed,
endless as to what destruction they can cause. The Remote Access that live on systems that threat actors leverage for malicious
Attack Vectors data points highlight what we observe on end- purposes. For example, cmd.exe is the Command Prompt process
points, and it gives you an idea of which ones attackers leverage commonly leveraged by threat actors to perform tasks. Those
for their ill-gotten gains. For example, we observed Imperio the accounted for 24.01% of LOLBAS alerts. Vbc.exe, the Visual Basic
most, followed closely by LogMeIn. Threat actors also commonly compiler, had the most alerts with 46.75% composition. There was
used NetOp, Radmin, and WinRM. Then, there were several that a myriad of other LOLBAS alerts that we have conveniently placed
made the cut, but just barely: Devolutions RDM, NinjaOne RMM, in a bar graph below.
Quick Assist, RustDesk, Senso, ReamViewer, and Total Commander
combined for around 5% of all remote access tool invocations. ATBroker.exe 3.11%
Cmd.Exe 24.01%
CONHOST.EXE 0.02%
CONTROL.EXE 0.06%
Devolutions RDM 0.09% csc.exe 0.02%
Impero 31.93% Excel.exe 1.20%
EXPLORER.EXE 3.26%
LogMeIn 27.62% GPSCRIPT.EXE 0.14%
NetOp 11.05% IE4UINIT.EXE 0.11%
InstallUtil.exe 0.02%
NinjaOne RMM 0.09%
mmc.exe 0.03%
Quick Assist 0.19% MpCmdRun.exe 0.03%
Radmin 16.85% MSACCESS.EXE 1.11%
MSBuild.exe 0.03%
RustDesk 0.94%
msedge.exe 6.37%
Senso 1.40% msedge_proxy.exe 0.02%
msedgewebview2.exe 2.69%
TeamViewer 2.72%
msiexec.exe 2.84%
Total Commander 0.19% OneDriveStandaloneUpdater.exe 2.17%
WinRM 6.93% POWERPNT.EXE 0.16%
procdum p.exe 0.11%
0.00% 20.00% 40.00% 60.00% 80.00% 100.00% RdrLeakDiag.exe 0.03%
RegAsm.exe 0.44%
Figure 40. Q4 2024 Remote Access Detections RegSvcs.exe 0.02%
REGSVR32.EXE 0.19%

Script Attack Vectors


RUNDLL32.EXE 1.19%
RUNONCE.EXE 1.43%
sc.exe 0.02%
The chart for this one requires little explanation. Scripts accounted vbc.exe 46.75%
VISIO.EXE 0.03%
for nearly 83% of all attack vectors, and of that ~83%, 97.29% of WinWord.exe 2.25%
them were from PowerShell. In short, PowerShell is responsible wscript.exe 0.13%
wt.exe 0.02%
for the vast majority of threat actors’ avenue of attack. The reason 0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00%
is simple. It is on every system (unless disabled) and can perform
almost any action. Let us not discredit Python, AutoIT, and Visual Figure 42. Q4 2024 Windows (LOLBAS) Detections
Basic. These are commonly used scripting tools for malware
authors. Threat actors use AutoIT to drop or download additional Cryptominer Detections
payloads, and Python is a ubiquitous language for information Cryptominers have not appeared in every Internet Security Report.
security programmers. We removed it for a handful of quarters because the numbers
became melded with information stealers. We just simply were not
seeing enough cryptominer alerts to warrant a subsection for it.
AutoIT 0.33%
However, these numbers rose significantly in Q4. From Q3 to Q4,
cryptominer detections skyrocketed 141.06%. What is interesting is
Group Policy Scripting 0.01% that the cryptominer detections seem to rise as the price of bitcoin
goes up. At least, that is our theory.
PowerShell 97.29%

Python 0.60%

Visual Basic 2.37%

Windows Script Host 0.01%

0.00% 20.00% 40.00% 60.00% 80.00% 100.00%

Figure 41. Q4 2024 Script Detections

Q4 2024 Internet Security Report Endpoint Threat Trends 35


400 364

350

300

250 217 211


200
151
150

100

50

0
Q1 2024 Q2 2024 Q3 2024 Q4 2024

Figure 43. 2024 QoQ Cryptominer Detections

THREAT HUNTING
The Threat Hunting subsection pertains to all EPDR users, but Advanced EPDR users receive additional non-deterministic indicators of com-
promise. All users receive these indicators mapped to the MITRE ATT&CK matrix, which is a normalized knowledge base describing tactics and
techniques of threat actors. A single attack can contain several tactics and techniques, and thus, the alerts invoked in this subsection are signifi-
cantly higher than malware threats in prior subsections. As a refresher, the tactics and technique data points for the Threat Hunting subsection
are listed below.

Tactics and Techniques


MITRE Tactic – The primary tactic used. (e.g., TA0002 is Execution)
MITRE Technique – The technique used. (e.g., TA1059.001 is Command and Scripting Interpreter and PowerShell)
Tactic :: Technique :: Sub-Technique – The combined tactic, technique, and sub-technique.
Technique Count – The number of occurrences for each technique.
Tactic Sum – The sum of all technique counts for a given tactic.
To begin, we provide a table for the top 10 tactics and techniques determined by which sub-technique invoked the most alerts. For example,
TA0007 is the Discovery Tactic (ranked first this quarter) that describes behaviors to enumerate networks and systems on any given endpoint.
This does not mean the action is malicious. In fact, many discovery-related alerts are performed by users or network administrators. This supports
the importance of threat hunting analysts who know which alerts to prioritize and are anomalous to endpoint baseline behavior. WatchGuard
has such threat hunting-as-a-service for EPDR-protected systems.
Another example of an exploit in the table is TA0002::T1059.001. TA0002 describes an execution action, T2059 confirms the execution is from
a Command and Scripting Interpreter, and 001 are PowerShell scripts. Thus, TA0002::T1059.001 are for those alerts from PowerShell execution
invocations, which relates to the Script Attack Vector discussed in the prior section. That particular sub-technique ranked second this quarter.
The other eight exploit detections are in the table below.
Technique
MITRE Tactic MITRE Technique Tactic :: Technique :: Sub-Technique Rank
Count
TA0002 Execution 1,459,194 8
TA0002
T1059.001 Execution :: Command and Scripting Interpreter :: PowerShell 4,762,493 2
TA0003 Persistence 3,243,236 4
TA0003
T1543.005 Persistence :: Create or Modify System Process :: Container Service 1,018,463 9
TA0004 TA0004 Privilege Escalation 2,115,323 7
TA0005 Defense Evasion 3,257,774 3
TA0005
T1218.009 Defense Evasion :: System Binary Proxy Execution :: Rundll32 20,461 10
TA0007 TA0007 Discovery 6,152,105 1
TA0011 TA0011 Command and Control 2,170,401 6
TA0040 T1561.001 Impact :: Disk Wipe :: Disk Content Wipe 2,927,837 5
Figure 44. Q4 2024 Exploits by MITRE ATT&CK Tactic and Technique

Q4 2024 Internet Security Report Endpoint Threat Trends 36


From the top 10 Threat Hunting exploits, we zoom out to the MITRE ATT&CK Tactic summations. For these data points, we group all techniques
and sub-techniques for each tactic and record the total. In addition to the bar graph, we also have added a table to provide more insight into the
numbers and the difference from the quarter prior, like other subsections within Endpoint.
There are four major tactics alerted on EPDR-protected endpoints, in descending order: TA0005 (Defense Evasion), TA0002 (Execution), TA0007
(Discovery), and TA0003 (Persistence). Defense Evasion are actions to, you guessed it, evade defense mechanisms on endpoints, and these
alerted the most this quarter and increased almost 23% from last quarter. Execution actions are intentionally broad and define any malicious
code invocation. Actions defined by this tactic also saw a rise from the last quarter of 18.52%. Discovery tactics are when adversaries try “to figure
out your environment.” These can be as simple as a ‘whoami’ command or actions such as enumerating Active Directory (AD). Discovery-related
alerts rose 26.21% from Q3 to Q4. The final and fourth major tactic adversaries use are Persistence-related activities, which are actions to remain
on a system even after disinfection routines or computer reboots. Many of these actions relate to registry settings. Persistence alerts remained
stagnant from last quarter, decreasing by a miniscule 0.07%.

TA0001 682,590

TA0002 8,341,240

TA0003 6,901,091

TA0004 1,419,983

TA0005 9,758,049

TA0006 1,985,016

TA0007 7,764,503

TA0008 508,693

TA0009 888

TA0010 1,682

TA0011 2,705,272

TA0040 3,565,800

TA0042 1,701

0 2,000,000 4,000,000 6,000,000 8,000,000 10,000,000 12,000,000

Figure 45. Q4 2024 Exploits by MITRE ATT&CK Tactic and Technique

MITRE Tactic Q3 Tactic Sum Q4 Tactic Sum Difference % Difference

732,452 682,590 -49,862 -6.81%


TA0001
TA0002 7,037,978 +1,303,262 18.52%
6,905,976 6,901,091 -4,885 -0.07%
TA0003
TA0004 2,297,717 -877,734 -38.20%
TA0005 7,935,408 9,758,049 +1,822,641 22.97%
1,588,155 1,985,016 +396,861 24.99%
TA0006
TA0007 6,152,159 +1,612,344 26.21%
TA0008 450,625 508,693 +58,068 12.89%
TA0009 901 888 -13 -1.44%
TA0010 1,789 1,682 -107 -5.98%
TA0011 2,172,031 2,705,272 +533,241 24.55%
TA0040 3,009,864 3,565,800 +555,936 18.47%
TA0042 1,205 1,701 +496 41.16%

Figure 46. Q4 2024 Exploits by MITRE ATT&CK® Tactic

Q4 2024 Internet Security Report Endpoint Threat Trends 37


The MITRE ATT&CK techniques define more in-depth actions from each tactic. For example, TA0004 is Privilege Escalation and T1543, Create or
Modify System Process, describes the technique within that tactic. Thus, the process creation or modification was to escalate privileges. However,
some techniques are generic detections denoted with a ‘0’. This is evident in the bar graph and table below. These describe behaviors that do
not fit within a specific technique, but we still count them. TA0007, Discovery, led the charge with the most technique (tactic) alerts, followed by
TA0002:T1059.001, PowerShell executions. The rest were all relatively similar in terms of the numbers.

Top Threat Hunting Rule Invocations


The final Threat Hunting subsection before the Ransomware Landscape section covers the top 10 rules invoked on protected endpoints. These
are different than the MITRE ATT&CK matrix invocations because they are internally created rules as opposed to mapping alerts to the matrix. In
essence, these rules are mapped to the MITRE ATT&CK matrix but are more granular in their definitions. For example, the top ranking rule this
quarter is PowershellCommandDiscoveryRule. If we were to map this to the MITRE ATT&CK matrix, this would be TA0002::T1059.001, which is
Execution::Command and Scripting Interpreter.PowerShell. This would also map to TA0007, which is Discovery. However, within one rule we can
determine that an alert triggered from this rule is a PowerShell script meant for system and network discovery. It’s a two-for-one.
Aside from the PowerShell rule invocation discussed in the previous paragraph, all other rules saw reductions in alerts for this quarter. The only
exception is the new rule appearing in the top 10, LolBasRule, which describes threat hunting alerts from living-off-the-land binaries. These
are subject to several false positives because these binaries are already inherently trusted on the endpoint. So, it’s important to hunt for alerts
from this rule that are abnormal. For example, if explorer.exe connects to the Internet on an arbitrary port, this is highly suspicious and cause for
further investigation.

Rule Name Alerts Rank

PowershellCommandDiscoveryRule 5,475,657 1

DisableSecurityProtectionsRule 4,597,263 2
DeleteFilesOrPartitionsRule 3,476,121 3
PowershellCommandsDecodedDesofusRule 3,384,206 4
HijackExecutionFlow 3,178,869 5
PersistenceServicesBinPath 2,248,371 6
RemoteFileCopyRule 2,191,057 7
PowershellDangerousCommandLinesRule 2,014,471 8
NetAdminAddRule 1,361,029 9
LolBasRule 1,313,884 10

Figure 47. Q4 2024 Threat Hunting Invocations Top 10

Q4 2024 Internet Security Report Endpoint Threat Trends 38


RANSOMWARE LANDSCAPE We almost seem like a broken record at this point, as there were
an abnormally high number of newly active and inactive groups
Only one data point in the Ransomware Landscape section is from this quarter. We began tracking 21 new ransomware groups and
EPDR-protected endpoints, and that is the number of ransomware removed 18 ransomware groups that recently became inactive or
detections. The other subsequent data within is from our Ransom- dormant. Two of the new ransomware groups were rebrands or
ware Tracker data collection efforts, specifically of double extortion evolutionary changes – Kill Security announced a rebrand to Kill
groups. This duo of data provides both an internal and external Security 3.0 and LockBit announced a new dark web domain with
point of view of the breadth of ransomware attacks. This quarter, the next evolution of their locker, LockBit 4.0, also called LockBit
both of those numbers are moderately to sharply up. Green. WikiLeaks v2 appears to be the second iteration of WikiLeaks
Because of Black Basta and Play appearing on the Top 10 Most operated by Julian Assange. However, researchers have uncovered
Prevalent Malware lists, the WatchGuard ransomware blocks for a link between this data leak site and the Qilin ransomware group.
this quarter are way up. Keeping with the theme of this quarter, the It’s possible the group runs the site or has direct connections to
quarterly increase from Q3 to Q4 is also historic, rising 627.75%. their operators.
Around 90% of these detections were from Black Basta and
Play alone. If we negate those detections, the overall numbers
decreased substantially from last quarter. New Groups Inactive Groups

1,400
1,259 Anubis BlackByte
1,200
Apos Security Chort
1,000
Argonauts Group dAn0n
800
Bluebox 1.0 DarkVault
600
Chort Dispossessor
400
259 233
173 CyberVolk Donut Leaks
200
FunkSec HelloGookie
0
Q1 2024 Q2 2024 Q3 2024 Q4 2024
HELLCAT IRLeaks
Figure 48. 2024 QoQ Ransomware Detections by Quarter
INTERLOCK Kill Security
Extortion Groups Kairos MADDLL32
All the data from here on out does not apply to EPDR-protected Kill Security 3.0 Mallox
endpoints. It is auxiliary data aimed at supplementing the ransom-
LEAKEDDATA PlayBoy
ware detections from the WatchGuard ransomware detections,
and the numbers support the quarter-over-quarter increase seen LockBit 4.0 RA Group
on these endpoints. While these endpoints saw a catastrophic
Morpheus Ransomcortex
increase of 627.75% from Q3, the number of extortion victims did
not increase nearly as much. However, they did increase much Nitrogen SenSayQ
more than normal, rising 40.92%, which again, is historically high
PlayBoy Valencia
according to our numbers. Keep in mind that double extortions
have only existed for around six years with the first true double SafePay Vanir Leaks
extortion being attributed to the Maze group in late 2019. So, SKIRA TEAM Werewolves
our data is limited because the data itself is limited. Yet, based on
this limited data, we rarely, if ever, see around 40% increases from Termite
quarter to quarter. Weyhro

2000 1863
WikiLeaksV2
1800

1600

1400 1322
Figure 50. Q4 Newly Active and Inactive Ransomware Groups
1290

1200 1121

1000

800

600

400

200

0
Q1 2024 Q2 2024 Q3 2024 Q4 2024

Figure 49. 2024 QoQ Public Extortions by Group

Q4 2024 Internet Security Report Endpoint Threat Trends 39


The next few graphs and tables show our overall numbers we tracked for this quarter and throughout 2024, including the quarter-over-quarter
bar graph that we only produce for Q4. The first of which is what we call “The Big Red Graph” that simply shows the numbers for the quarter in
an easy-to-read format. We then include two tables, one that displays the numbers from the previous quarter and from this quarter, with the
corresponding differences, and then the other is a descending chart, which is basically a filter on which groups had more extortions from the
quarter prior. Finally, we include another large bar graph that is The Big Red Graph delimited over each quarter.

8BASE 11
A BY S S 9
AKIRA 138
ANUBIS 4
APT73 (BASHE) 50
ARCUS MEDIA 22
ARGONAUTS GROUP 11
BIANLIAN 33
BL00DY 2
B L A C K B A S TA 36
BLACKSUIT 42
B LU E B O X 1 . 0 3
BRAIN CIPHER 13
CACTUS 29
CHORT 7
CICADA3301 11
CIPHBIT 4
CL0P 7
C LO A K 28
CYBERVOLK 12
DAIXIN 2
D A R K VA U LT 6
DISPOSSESSOR 4
DONUT LEAKS 4
DRAGONFORCE 19
EL DORADO/BL ACKLOCK 56
EMBARGO 6
EVEREST 27
EVILMOROCCO 15
FLOCKER/F-SOCIETY 7
FOG 67
FUNKSEC 84
HANDALA 14
HEAD MARE 6
H E L LC AT 7
HELLDOWN 12
H U N T E R S I N T E R N AT I O N A L 62
INC RANSOM 37
INTERLOCK 13
KAIROS 14
KILL SECURITY 23
KILL SECURITY 3.0 86
L E A K E D D ATA 34
LOCKBIT 3.0 12
LY N X 52
MADDLL32 1
MEDUSA BLOG 50
MEOW LEAKS 40
MONEY MESSAGE 3
MONTI 8
MORPHEUS 2
NITROGEN 19
ORCA 1
P L AY 95
P L AY B O Y 1
QILIN 55
RA GROUP 30
RANSOMHOUSE 8
RANSOMHUB 245
RHYSIDA 18
S A F E PAY 46
SARCOMA 36
SKIRA TEAM 1
S PA C E B E A R S 10
STORMOUS 8
TERMITE 9
THREEAM 11
T R I N I T Y LO C K 2
UNDERGROUND 2
WEYHRO 1
WIKILEAKSV2 20
0 50 100 150 200 250 300

Figure 51. Q4 2024 Public Extortions by Group

Q4 2024 Internet Security Report Endpoint Threat Trends 40


Name Q3 Q4 Difference INC Ransom 30 37 +7
8base 13 11 -2 INTERLOCK - 13 NEW
Abyss 13 9 -4 IRLeaks 12 0 -12
Akira 48 138 +90 Kairos - 14 NEW
AlphaLocker 2 0 -2 Kill Security 32 23 -9
Anubis - 4 NEW Kill Security 3.0 - 86 NEW
APT73 (Bashe) 3 50 +47 LEAKEDDATA - 34 NEW
Arcus Media 10 22 +12 LockBit 3.0 85 12 -73
Argonauts Lynx 30 52 +22
2 11 +9
Group MADDLL32 13 1 -12
BianLian 43 33 -10 Mallox 2 0 -2
Bl00dy 0 2 +2 Medusa Blog 43 50 +7
Black Basta 7 36 +29 Meow Leaks 76 40 -36
BlackByte 2 0 -2 Metaencryptor 4 0 -4
BlackSuit 37 42 +5 Money Message 0 3 +3
Bluebox 1.0 - 3 NEW Monti 14 8 -6
Brain Cipher 12 13 +1 Morpheus - 2 NEW
Cactus 27 29 +2 Nitrogen - 19 NEW
Chort - 7 NEW Orca 2 1 -1
Cicada3301 27 11 -16 Play 90 95 +5
CiphBit 4 4 0 PlayBoy - 1 NEW
CL0P 2 7 +5 Pryx 3 0 -3
Cloak 17 28 +11 Qilin 48 55 +7
CyberVolk 5 12 +7 RA Group 6 30 +24
DAIXIN 1 2 +1 Ransomcortex 4 0 -4
dAn0n 4 0 -4 RansomHouse 14 8 -6
DarkVault 15 6 -9 RansomExx2 7 0 -7
Dispossessor 16 4 -12 RansomHub 195 245 +50
Donut Leaks 7 4 -3 Rhysida 38 18 -20
DragonForce 32 19 -13 SafePay - 46 NEW
DungHill Leak 1 0 -1 Sarcoma 23 36 +13
El Dorado/Black- SKIRA TEAM - 1 NEW
14 56 +42
Lock
Space Bears 14 10 -4
EMBARGO 5 6 +1
Stormous 9 8 -1
Everest 10 27 +17
Termite - 9 NEW
EvilMorocco 6 15 +9
ThreeAM 7 11 +4
Flocker/
6 7 +1 TrinityLock 5 2 -3
F-SOCIETY
Underground 2 2 0
FOG 18 67 +49
Valencia 5 0 -5
FunkSec - 84 NEW
Vanir Group 3 0 -3
Handala 16 14 -2
Weyhro - 1 NEW
Head Mare 1 6 +5
WikiLeaksV2 2 20 +18
HELLCAT - 7 NEW
Total 1322 1863 +541
Helldown 21 12 -9
Hunters Figure 52. Q3-Q4 2024 Ransomware Extortion Differences
57 62 +5
International

Q4 2024 Internet Security Report Endpoint Threat Trends 41


Name Name

Akira +90 DungHill Leak -1

RansomHub +50 Orca -1


FOG +49 Stormous -1
APT73 (Bashe) +47 8base -2
El Dorado/Black-
+42 AlphaLocker -2
Lock
Black Basta +29 BlackByte -2
RA Group +24 Handala -2
Lynx +22 Mallox -2
WikiLeaksV2 +18 Donut Leaks -3
Everest +17 Pryx -3
Sarcoma +13 TrinityLock -3
Arcus Media +12 Vanir Group -3
Cloak +11 Abyss -4
Argonauts
+9 dAn0n -4
Group
EvilMorocco +9 Metaencryptor -4
CyberVolk +7 Ransomcortex -4
INC Ransom +7 Space Bears -4
Medusa Blog +7 Valencia -5
Qilin +7 Monti -6
BlackSuit +5 RansomHouse -6
CL0P +5 RansomExx2 -7
Head Mare +5 DarkVault -9
Hunters Interna-
+5 Helldown -9
tional
Play +5 Kill Security -9
ThreeAM +4 BianLian -10
CiphBit 0 Dispossessor -12
Underground 0 IRLeaks -12
MADDLL32 -12
DragonForce -13
Cicada3301 -16
Rhysida -20
Meow Leaks -36
LockBit 3.0 -73
Figure 53. Q3-Q4 2024 Ransomware Extortion
Differences Descending

Q4 2024 Internet Security Report Endpoint Threat Trends 42


0 100 200 300 400 500 600

0mega 1
8base 147
Abyss 42
Akira 302
AlphaLocker 15
Anubis 4
Apos Security 4
APT73 (Bashe) 65
Arcus Media 56
Argonauts Group 13
BianLian 168
Bl00dy 4
Black Basta 168
BlackByte 4
BlackCat (ALPHV) 56
BlackSuit 147
Bluebox 1.0 3
Brain Cipher 26
Cactus 141
Chort 7
Cicada3301 42
CiphBit 14
CL0P 27
Cloak 63
Cuba 2
CyberVolk 17
Cyclops/Knight 8
DAIXIN 5
dAn0n 19
DarkVault 52
Dispossessor 51
DoNex 5
Donut Leaks 16
DragonForce 95
DungHill Leak 3
El Dorado/BlackLock 84
EMBARGO 18
Everest 53
Evi lMorocco 29
Flocker/F-SOCIETY 19
FOG 87
FunkSec 84
Handala 84
Head Mare 15
HELLCAT 7
Helldown 33
HelloGookie 3
Hunters International 227
INC Ransom 159
INTERLOCK 13
IRLeaks 14
Kairos 14
Kill Security 61
Kill Security 3.0 86
LEAKEDDATA 34
LockBit 3.0 515
LockBit 4.0 0
Lynx 82
MADDLL32 14
Malek Team 3
Mallox 10
Medusa Blog 207
MedusaLocker 2
Meow Leaks 128
Metaencryptor 11
Money Message 6
Monti 33
Morpheus 2
Nitrogen 19
Orca 3
Play 347
PlayBoy 1
Pryx 4
Qilin 180
Qiulong 8
RA Group 67
Ransomcortex 4
RansomHouse 51
RansomExx2 14
RansomHub 537
Red 16
Rhysida 85
Saf ePay 46
Sarcoma 59
SenSayQ 2
SKIRA TEAM 1
Slug 1
Snatch 15
Space Bears 44
Stormous 42
Termite 9
ThreeAM 30
Trigona 19
TrinityLock 10
Trisec 3
Underground 15
Valenci a 5
Vanir Group 3
Werewolves 3
Wey hro 1
WikiLeaksV2
Zero Tolerance
Q1 Q2 Q3 Q4

Figure 54. 2024 QoQ Public Extortions by Group

Q4 2024 Internet Security Report Endpoint Threat Trends 43


Notable Ransomware Events Black Basta
BT Group – BT Group, formally known as British
Law Enforcement Actions Telecommunications or British Telecom, is one of Europe’s leading
BitPaymer & LockBit – On October 1, the very first day of Q4, the telecommunications services. So, it is no wonder that we have
included this as a notable breach. The Black Basta group claims to
United States Justice Department announced tri-lateral action with
have exfiltrated around half a terabyte of data, including NDAs, and
the United Kingdom and Australia against Aleksandr Viktorovich user, financial, and other organizational data. We do not know what
Ryzhenkov (Александр Викторович Рыженков), a member of Evil exact data was exfiltrated, but it could include phone and text logs,
Corp and a BitPaymer ransomware affiliate commonly referred to geolocation, personal financial data, and so on. What we do know
as Beverley, and other ransomware-enabling individuals. Aleksandr is that 500 gigabytes of data is a lot. There is a good chance that if
is an Evil Corp developer and support administrator with several the data is legit, it is notable and concerning for their users.

others, including his brother Sergei. According to the Justice Brain Cipher
Department, Ryzhenkov began deploying BitPaymer in 2017 with Deloitte – There is a chance that Deloitte is familiar to you. So, we
his conspirators. Law enforcement published all the details on the will not explain their background, but they are one of the “Big 4”
seized LockBit data leak site under Operation Cronos and included audit firms in the world along with Ernst & Young (EY), Klynveld
Peat Marwick Goerdeler (KPMG) and PricewaterhouseCoopers
further details about arrests including an admin of Bulletproof, a
(PwC). These four companies perform a large share of the world’s
hosting provider, and two other affiliates. accounting audits. Therefore, the data they possess and manage is
The Justice Department released an image of Evil Corp members vast and sensitive, and any breach of this data is costly. Brain Cipher
and affiliates where Aleksandr Ryzhenkov is at the bottom right: claims to have exfiltrated about one terabyte of their data from
Deloitte UK. The company claims otherwise.

Cactus
Housing Authority of the City of Los Angeles (HACLA) –
Ransomware groups have posted the HACLA on at least three
occasions, of which we are aware. In late 2022, LockBit posted the
HACLA on their data leak site claiming to have 15 terabytes of data,
and then again three months later with an updated data log. Then,
the Dispossessor group, which is known to publish leaks of other
groups and claim it as their own, published the same exact post
of the second LockBit post – all but confirming this was a re-leak.
Now, Cactus is the latest to post a successful breach and claims to
have 861 gigabytes of data. This is notable because the HACLA is
one of the largest housing authorities in the United States.

Cl0p
Cleo Managed File Transfer (MFT) – In October 2024, Cleo divulged
a vulnerability tracked as CVE-2024-50623 that permitted
unrestricted file uploads and downloads. A second vulnerability
was discovered in December 2024 (tracked as CVE-2024-55956).
Cl0p exploited these two vulnerabilities to perform data supply
chain exfiltration attacks against many of the users of Cleo’s
software, which they are still posting as of this writing. They have
published hundreds of alleged victims on their data leak site
and point to these recent zero-day vulnerabilities as the avenue
of attack. On December 15, 2024, the ransomware group finally
claimed responsibility for the recent spate of data theft attacks
that targeted organizations using Cleo-managed file transfer (MFT)
software solutions. Expect Cl0p’s numbers to be much higher for
Q1 of 2025 than they were all of 2024.
Figure 55. US Treasury Evil Corp Organizational Chart

Q4 2024 Internet Security Report Endpoint Threat Trends 44


Embargo there was a cyberattack, and it affected not only their hospital,
American Associated Pharmacies (AAP) – This breach appears on but also Liverpool Heart and Chest Hospital and a small amount
the notable breach list because of the way the Embargo operators of data from Royal Liverpool University Hospital. Services at all
have allegedly extorted American Associated Pharmacies. three hospitals were unaffected, but the data released is notable,
Before that, a disruption to pharmacies could have literal deadly considering that one of the hospitals is meant for children. So, yet
consequences, and a successful breach could hinder their ability again, we have another ransomware group attacking children’s
to administer life-saving medication. The group claims in their hospitals and similar critical services.
dark web data leak site to have around 1.5 terabytes of data, to
which the AAP paid a $1.3 million ransom for decryption. However, RansomHub
Embargo claims they owe another $1.3 million (known as double Bologna Football Club – Bologna FC published an official statement
extortion) for the deletion of the data. Considering this is likely a lie, on November 29 discussing their awareness of a ransomware
and that data is considered forever exposed, it is doubtful that AAP attack and that data from the club would appear online. They also
would pay an additional amount, if they paid any in the first place. left a concise statement warning individuals that possession of this
data is a crime. Less than two weeks prior, RansomHub published
HellCat this club on their dark web data leak site with claims of having a
Schneider Electric – This breach is notable for two reasons. The large amount of data. They claim to have:
first is that Schneider Electric is large organization out of France
• All sponsorship contracts and documents.
focused on automation and electric energy. Hence the name. They
have acquired numerous companies in the same sector to expand • All Financial data spanning the club’s entire history.
their offerings. They have a significant presence in industrial • All personal and confidential data of players, academy
manufacturing and automation, and in energy management, players, fans, and employees.
which is their big money maker. Thus, a breach or any disruption
• All transfer strategy documentation.
in operations could have a downspout effect. Luckily, that was not
the case here. The second notable aspect of this breach is that the • All medical records of players and staff.
group, HellCat, demanded $125,000 in baguettes – a derogatory • All confidential data related to different structures and
stereotype of the organization being headquartered in France. stadiums.
Based on the ransom demand, it is logical to assume that the
extortion demand is a dead end. • All commercial strategies and business plans.
• Documents that could potentially violate FIFA and UEFA
regulations, including financial fair play.

The disclosure of these types of documents could have ripple


effects on players, staff, fans, and football teams globally.

Conclusion
In conclusion, this quarter was historic and record-breaking in
multiple ways. We observed significantly fewer new malware
threats and a record-breaking reduction in total malware threats,
decreasing 91.14% from last quarter. We also blocked an abnormal-
ly high number of ransomware attacks on WatchGuard endpoints,
particularly from the Black Basta and Play ransomware groups. Both
groups appeared in the Top 10 Most Prevalent Malware list for this
quarter, as did some of their helper malware files. This was coupled
Figure 56. HellCat – Schneider Electric Double Extortion
with a sharp increase in ransomware extortions throughout the
ransomware landscape. We also made a myriad of changes to
INC Ransom the Attack Vectors subsection, where the Scripts attack vector
Liverpool’s Alder Hey Children’s Hospital, Liverpool Heart and Chest increased over ten-fold, spearheaded by PowerShell invocations.
Hospital, and Royal Liverpool University Hospital – On November
28, the INC Ransom group published what appeared to be valid All in all, total threats across the board decreased significantly, but
stolen data from “NHS Alder Hey,” certainly alluding to Liverpool’s of those detections, many of them were ultra-destructive ransom-
Alder Hey Children’s Hospital in England. The group claimed to ware attacks. This is a wake-up call to understand that just because
have stolen a large swathe of data, including patient records, there were fewer threats, does not mean that the threats that
donor reports, and procurement data, all from 2018 to 2024. The do attempt to slip through defenses will be simple attacks. Most
same day, the hospital released an official statement saying they threat actors are opportunists, and some are more patient than
are aware of the published data on INC Ransom’s dark web data others. Therefore, it’s paramount to not overlook not overlooked
leak site and are investigating its authenticity. A week later, on small alerts . One small alert could lead to widespread attacks if not
December 4, they released an updated statement confirming that tended to quickly and diligently. Let this quarter be a lesson in that.

Q4 2024 Internet Security Report Endpoint Threat Trends 45


CONCLUSION
& DEFENSE
HIGHLIGHTS
Q4 2024 Internet Security Report 46
CONCLUSION AND
DEFENSE HIGHLIGHTS
As we navigate through the volatile seas of cybersecurity, the findings of our Q4 2024 report illuminate the adjustments organizations must
make to stay ahead. Much like skilled sailors tuning their sails to face shifting winds, cybersecurity teams must continuously adapt their defenses
to counter the evolving threat landscape. Our analysis reveals an intriguing dichotomy between the rise of network-based malware detections
and the decline in endpoint unique malware detections, underscoring the importance of a multi-layered defense strategy.
Network-based malware detections surged, highlighting a significant increase in zero-day threats, especially those leveraging encrypted
connections to evade detection. This resurgence of sophisticated threats requires organizations to proactively enhance their protective mea-
sures, ensuring their security systems are capable of decrypting and analyzing encrypted traffic. The return of coinminers and the emergence
of blockchain-related attacks like Etherhiding signal a warning that cybercriminals are innovating and leveraging new technologies to exploit
vulnerabilities.
Conversely, the decrease in unique endpoint malware detections presents an opportunity to evaluate and refine endpoint protection strategies.
While the volume of endpoint malware dropped, its generic nature indicates that well-established defenses can effectively block many of these
threats. However, the rise in browser-based malware delivery vectors calls for an enhanced focus on securing web browsers and ensuring they
are regularly updated against known vulnerabilities.
The slight decline in network attacks, albeit with a variety of new exploits surfacing, suggests that while overall attack volume decreases,
diversification and innovation by threat actors continue to develop. This necessitates organizations to not only maintain vigilance but to deepen
their understanding of evolving attack vectors and adapt their intrusion prevention systems accordingly, perhaps even adding newer network
detection and response (NDR) security controls to the mix.

If you can’t patch perfectly, patch Implement a structured patching policy with clearly defined SLAs
that prioritize critical vulnerabilities. If you can’t address every
programmatically. patch, ensure that you focus on the important ones first. While
In every quarterly security report we’ve ever released, we consis- this concept is foundational, lacking a formal patch policy with
tently find that threat actors primarily exploit old vulnerabilities SLAs and severity definitions, tailored to your organization’s risk
‒ often fixed months, if not years, prior. The prevalence of zero-day assessments, necessitates immediate action.
exploits pales in comparison to these well-known, outdated vul- At a high level, prioritize swift patch SLAs for software flaws with
nerabilities. This reality underscores our repeated advice: regularly the highest criticalities. For instance, address high and critical
and swiftly patch your software to yield significant returns on your patches within 30 days, while allowing 90 to 180 days for medium
security work investment. You already know this. and low severity. Consider exposure as a key factor; if a software
However, real-world business constraints can hinder organizations service is exposed externally, your patch SLA should be much
from keeping up with patches. For example, some may need to faster, whereas internal low-risk vulnerabilities might warrant a
rely on outdated applications that function only on end-of-life longer wait.
operating systems. While this isn’t ideal, finding a replacement may In conclusion, strive to patch everything possible as quickly as you
take time. Similarly, small teams may struggle to manage extensive can. If that’s unachievable, take the time to develop a risk-based
infrastructures. Regardless of the challenge, it’s crucial to prioritize policy. Employ automated patching and monitoring tools to ensure
quickly patching the most critical vulnerabilities. you meet your SLAs effectively.
What should you do if perfect patching isn’t feasible?

Q4 2024 Internet Security Report 47


Protect Linux computers and IoT as equally The risk of sophisticated malware capable of bypassing standard
security measures underscores the necessity of integrating various
as Windows machines. prevention techniques. For instance, while classic signature-based
Yeah. We all know that attackers, by far more often, target the antivirus solutions have been foundational in identifying known
Windows operating system (OS) with malware and attack it over threats, they often fall short against newer, more evasive malware
any other. However, just because Windows is the biggest target variants. To bolster defenses, organizations should incorporate end-
doesn’t mean attackers aren’t targeting Linux devices, and IoT, point detection and response (EDR) systems, such as WatchGuard’s
which tends to use Linux too. This quarter, we saw a rise in Top 20 EPDR, which provide advanced capabilities to detect, respond to,
malware that affected Linux machines, including coinminers, which and mitigate threats that traditional methods may overlook.
tend to prefer Linux servers. In short, your Linux server better have
Moreover, from a network security perspective, leveraging multiple
good endpoint detection and response software too, and luckily,
malware detection engines enhances the ability to identify and
WatchGuard products like EPDR work great on Windows, Mac, or
neutralize threats before they can cause harm. Employing solutions
Linux machines.
that utilize artificial intelligence and behavioral analysis, such as
However, some IoT devices do not easily allow you to install IntelligentAV and APT Blocker, allows organizations to stay ahead
endpoint security applications and may still remain vulnerable to of attackers by recognizing patterns and anomalies indicative of
malware. For IoT, we recommend you both segment them away potential breaches. This multi-faceted approach not only improves
from more trusted devices and computers, only allowing the bare the detection of both sophisticated and common malware but also
minimal access between those segments, and you can also deploy fortifies an organization’s overall security posture.
network detection and response products, like WatchGuard’s
Ultimately, the unpredictable nature of malware threats neces-
ThreatSync + NDR to monitor all the traffic going to and from an
sitates that organizations prioritize a defense-in-depth strategy.
IoT device for malicious behaviors.
By employing a comprehensive array of security controls – from
network-based protections to endpoint solutions – organizations
can ensure they effectively mitigate risks associated with diverse
Embrace a Defense-in-Depth Approach to malware vectors. As the landscape continues to shift, embracing
Combat Evolving Malware this proactive stance will empower teams to better anticipate and
respond to the challenges that lie ahead, safeguarding their assets
Today’s malware landscape is characterized by its sophistication and operations against ever-evolving cyber threats.
and constant evolution, making a defense-in-depth security strat-
egy essential for organizations aiming to protect their networks As we conclude this quarter’s report, let it serve not only as
and endpoints. We have observed fluctuations in the prevalence of a reflection of the year past but as a beacon of guidance and
network and endpoint malware; while this quarter’s findings indi- prudence. By leveraging these insights, we hope to empower orga-
cate a rise in network-based threats, endpoint malware detections nizations to grow resiliently, transforming each challenge into an
have notably decreased. This dynamic nature of threats requires opportunity to fortify defenses. Together, we can ensure a secure
a multi-layered approach to ensure comprehensive protection voyage through the unpredictable waters of cybersecurity in the
against the diverse tactics employed by cybercriminals. year ahead and beyond. Be sure to return next quarter to keep up
with the latest changes in the threat landscape. As always, leave
your comments or feedback about our report at SecurityReport@
watchguard.com, and keep frosty online!

Q4 2024 Internet Security Report 48


COREY NACHREINER
Chief Security Officer
Recognized as a thought leader in IT security, Corey spearheads WatchGuard’s security vision. Corey has operated at the frontline of cybersecurity for 22
years, evaluating and making accurate predictions about information security trends. Corey has the expertise to dissect complex security topics, making
him a sought-after speaker at forums such as Gartner, Infosec and RSA. He is also a regular contributor to leading publications including CNET, Dark Reading,
Forbes, Help Net Security, and more. Find him on www.secplicity.org.

MARC LALIBERTE
Director of Security Operations
Specializing in network security technologies, Marc’s industry experience allows him to conduct meaningful information security research and educate
audiences on the latest cybersecurity trends and best practices. With speaking appearances at IT conferences and regular contributions to online IT and
security publications, Marc is a security expert who enjoys providing unique insights and guidance to all levels of IT personnel.

TREVOR COLLINS
Information Security Analyst
Trevor Collins is a information security analyst at WatchGuard Technologies, specializing in network and wireless security. Trevor earned his security know-
how and several certifications through his past military experience in the United States Air Force. Trevor is a regular contributor to Secplicity.org where
he provides easily understood data analysis and commentary to IT professionals. Trevor’s experience with a wide range of network security vendors and
technologies allows him to provide unique perspectives to the industry.

RYAN ESTES
Intrusion Analyst
Ryan is an intrusion analyst at WatchGuard Technologies operating primarily within DNSWatch, WatchGuard’s DNS filtering and security service. For DNSWatch,
Ryan helps customers better understand potential threats to their organization using tailored domain analysis and threat intelligence. Outside of DNSWatch,
his research interests include web application security, Wi-Fi communications, and malware analysis. Ryan embraces a ‘never stop learning’ lifestyle allowing
him to stay on top of the latest cybersecurity and malware trends. In turn, Ryan passes this knowledge on to our customers and even shares certain topics on
his personal blog.

ABOUT WATCHGUARD THREAT LAB


WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to discovering and studying the latest malware and Internet attacks. The Threat Lab team analyzes data from
WatchGuard’s Firebox Feed, internal and partner threat intelligence, and a research honeynet, to provide insightful analysis about the top threats on the Internet. Their smart, practical security
advice will enable you to better protect your organization in the ever-changing threat landscape.

ABOUT WATCHGUARD TECHNOLOGIES


WatchGuard® Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security Platform® approach is uniquely designed for managed service providers to deliver world-class
security that increases their business scale and velocity while also improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect more than
250,000 customers, the company’s award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure
Wi-Fi. Together, they offer five critical elements of a security platform: comprehensive security, shared knowledge, clarity & control, operational alignment, and automation. The company is
headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuard, on Facebook, and on the LinkedIn Company page. Also, visit our InfoSec blog, Secplicity, for
real-time information about the latest threats and how to cope with them at www.secplicity.org.

©2025 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Firebox, Fireware, IntelligentAV, DNSWatch, and Unified Security Platform are trademarks or registered trademarks
of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE67791_040925

Q4 2024 Internet Security Report 49

You might also like