Internet Security Report q4 2024
Internet Security Report q4 2024
Quarter 4, 2022
CONTENTS
The Firebox Feed™ provides quantifiable data and trends
about hackers’ latest attacks, and understanding these trends
can help us improve our defenses.
03 Introduction
04 Executive Summary
47 About WatchGuard
07
face morph as rapidly as the technologies we adopt. Much like Network-based malware trends:
a skilled sailor must continuously adjust their sails to navigate WatchGuard Fireboxes offer multiple malware detection engines.
the capricious winds at sea, organizations must remain vigilant Our products use everything from signature-based malware
and responsive to the shifting tides of cyber threats. The threat detection engines to full-on behavioral code analysis to find
landscape is not static; it is a dynamic arena where threat actors both old malware and sophisticated, new, and unique threats.
innovate their tactics, techniques, and procedures (TTPs), requiring This section of our report highlights the most prominent and
us to adapt our defenses or risk being swept away by unforeseen widespread malware seen during Q4. We analyze the top
challenges. threats by volume, by most Fireboxes affected, and by region.
We also cover the differences in malware seen over encrypted
According to author William S. Burroughs, “When you stop growing,
connections and how much malware bypasses signature-based
you start dying.” This sentiment rings especially true in the field
detection. Network malware detections almost doubled in Q4,
of cybersecurity. By diligently observing and analyzing the latest
and zero-day malware detections increased significantly as well.
malware variants, network attacks, and malicious domains – from
Top malware included the return of coinminers, Linux-based
both a network and endpoint perspective – we can develop malware in our top 20, and email-based script malware (VBA/
the insights necessary to learn how to fortify our defenses. Our PowerShell) that installed spyware and info stealers.
quarterly Internet Security Report (ISR) encapsulates these critical
20
creators. Additionally, we highlight the top network security attacks Top malicious domains:
or exploits detected by our network Intrusion Prevention Service Using data from our DNSWatch service, we share trends about
(IPS) – each revelation acting as a beacon that guides us away from the malicious web links your users click. We prevent your users
danger. By sharing these insights, we empower security teams to from reaching these domains, thus protecting your organization.
not only respond to current threats but to anticipate future ones, In Q2, we saw malicious cryptocurrency-related domains, once
allowing for a proactive rather than reactive stance. associated with cryptomining and one with Etherhiding, as well
Our commitment to producing this report stems from the urgent as a continuation of threat actors leveraging vanity domains for
legit services like XXX.sharepoint.com.
need for organizations to understand the dangers they face in a
23
digital realm, where adversaries are more tenacious and resourceful
Endpoint malware trends:
than ever. As we venture into 2025, it is our hope that this report
We also track the malware trends we see at the endpoint from
serves as a guiding star, enabling all of us to reinforce our cyber our WatchGuard EPDR and AD360 products. Often, the malware
defenses and ensure our organizational resilience amidst the we see on endpoints differs greatly from what network security
tempest of continual change. devices see. Endpoint-based malware detections decreased
Let this report be not just a retrospective glance at past challenges, significantly both quarterly and for the year. However, we did see
but a forward-looking analysis that inspires adaptive strategies malicious coinminers increase, and browser exploits became the
in the face of persistent evolution. Together, we can navigate this second most common vector for malware delivery for the first
complex cybersecurity terrain, always ready to adjust our sails in time in years.
46
response to the winds of change.
The latest defense tips:
We break our report into the sections you see to the right. Though this report details and analyzes attack trends, the true
point of the report is both to show you what your network,
endpoint, and identity security controls are blocking, and to learn
from changes in the threat landscape so we can all fine-tune our
defenses to prevent the latest attacks. Throughout the report, and
at the end of various sections, we will share many defense tips
you can use to continue to protect your organizations from the
latest threat actor tactics and techniques.
• Total network-based malware detections almost doubled, • We extrapolate that if all the estimated currently active (licensed)
increasing 94%. We saw this increase across all of our malware Fireboxes enabled all malware detection security services and
detection services, but the largest increases came from our more were reporting to us, we would have had 600,127,343 malware
proactive services like IntelligentAV (increased 315%) and APT detections during Q4 2024.
Blocker (increased 74%).
• More than half (53%) of malware detected evaded signature-
• Strangely, endpoint unique malware detection shows a based methods. We call this zero-day malware, as it requires
completely different picture, decreasing about 91% QoQ, and more proactive techniques (IAV/APT) to catch this never-before-
showing the lowest volume of unique detections we have seen seen malware. In general, zero-day malware has been on a
this year. While we saw a huge spike in unique endpoint detected declining trend over the past year or so, compared to old highs
malware during Q2, even if we consider that as an outlier, this that almost always accounted for more than half and sometimes
quarter’s malware still would have decreased ~65% compared to even three-fourths of detected malware in the past. This quarter is
the rest of the year. one of the first where we have seen it return to a significant level.
• Not only were endpoint unique malware detections down, but • Furthermore, zero-day malware accounts for 78% of malware
new malware threats also hit an all-time low of only 8 new detected over encrypted connections. This suggests that threat
threats per 100,000 malware detections. In general, we saw actors combine evasion techniques, both using encryption to
less targeted malware that only affected one or a few machines, avoid some security scans and then leveraging malware evasive
and rather generic, sometimes-old malware that affected many techniques more often for these more advanced threats. If you
machines aren’t already decrypting and scanning TLS web traffic, you really
should.
• 60% of malware spread over encrypted connections (TLS)
during Q4, which is an 8pt increase from last quarter, and a • Unlike network malware, network attacks decreased 27% during
continued increase for the year. Q4 2024, with only 92 software exploits per Firebox caught by IPS
signatures. That said, we did see a slight increase in the number of
• Our “per Firebox” malware results for various network malware
unique exploits attackers tried, with unique IPS signature hits up
detection services:
13%.
• Average total malware detections per Firebox: 1,553
• Coinminer malware and malicious cryptocurrency mining are on
(~94% increase)
the rise again. Though we have seen many quarters of coinmining
• Average malware detections by GAV per Firebox: 543 malware decreasing, during Q4 we saw it has returned. A
(6% increase) malicious coinminer made the second spot on our network
• Average malware detections by IAV per Firebox: 883 malware top ten, it increased 141% QoQ in endpoint detections,
(315% increase) and some of the top malicious domains we blocked involved
malicious cryptocurrency mining.
• Average malware detections by APT Blocker per Firebox:
127 (74% increase)
This is just a preview of the insights we found from our product threat intelligence during Q4 2024. If you need more help sailing the rough
threat landscape, you can find more details about our findings, as well as what you can do about them, in the meat of this report.
127 hits across various security services and their changes since the
previous quarter. Total malware detections average 1,553 per Fire-
box, up 94%, reflecting a steady rise in threats. Gateway AntiVirus
APT blocker increased
(GAV) logs 543 detections, with a modest 6% increase, while APT
74%
Blocker sees 127 detections, up 74%. IntelligentAV (IAV) stands out
with 883 detections, surging 315%, indicating its growing role in
IntelligentAV (IAV) catching sophisticated malware.
883 When inspecting TLS traffic, GAV hits rose to 663 – up 21%, and
evasive malware over TLS, averaging 153 hits per Firebox, increased
by 363%. This aligns with TLS malware’s share jumping to 60%, an
jumped a whole 315% 8-point rise, highlighting encrypted channels as a favored attack
vector. These evasive threats, often never seen before or polymor-
phic (where the malware changes itself ), evade signature-based
GAV with TLS detection, driving the higher APT and IAV numbers.
663
TLS detections by GAV
The table paints a dual picture: basic malware persists, but
advanced, encrypted threats are accelerating. The significant
upticks in IAV and TLS evasive hits suggest attackers are leaning
harder into obfuscation and encryption, challenging traditional
increased 21%
defenses. Fireboxes equipped to decrypt and analyze TLS traffic are
increasingly vital, as the 8-point TLS malware surge underscores
APT Blocker with TLS a critical need for enhanced visibility and adaptive protection
153
strategies.
TLS malware
60% We not only use the Firebox Feed data to build this report,
but also to identify areas where we can improve our
Malware over an
WatchGuard products’ security. If you would like to help with
encrypted connection
these improvements, please enable WatchGuard Device
increased 8 points
Feedback on your device.
Leading the list is Heur.BZC.PZQ.Pantera.157, a Windows code injection malware with 240,669 detections. This batch script harbors suspicious
commands, executing stealthy injections over encrypted channels. Next, Application.Agent.IIQ, a dropper with 88,777 detections, delivers
payloads discreetly. Office exploits follow, with VBA.Heur2.ObfDldr.9.63A9E772.Gen (18,135 detections) and Exploit.CVE-2017-0199.Gen (9,148
detections) leveraging encrypted traffic to target vulnerabilities.
Variant.MSILHeracles.156368, a code injection threat with 11,188 detections contains an “activator” or keygen to bypass software licensing. We
find it often bundled with malware like Remcos or Formbook, amplifying its risk. See our 2023 Q3 report for more on Remcos.
Detecting these threats requires decrypting TLS traffic, a critical step given their reliance on encryption to evade traditional scans. Only 20% of
Fireboxes configured to inspect this traffic, the majority miss these concealed dangers. Enabling TLS inspection is vital to unmasking scripts like
Heur.BZC.PZQ and tainted tools like MSILHeracles, ensuring robust defense against encrypted threats.
Topping the list are familiar names from the previous quarter: Exploit.CVE-2017-0199.04.Gen, a Microsoft Office exploit, hits Greece (20.94%),
Turkey (20.42%), and Cyprus (20%), with EMEA at 11.25%. Trojan.Zmutzy.834 and Trojan.Zmutzy.1305 also reappear, targeting Greece (22.38%)
and Cyprus (15.38%) heavily, alongside Hong Kong. Exploit.RTF-ObfsObjDat.Gen, another holdover, dominates Greece (23.83%) and Turkey
(16.25%), with EMEA at 10.03%. Rounding out the table is Trojan.HTML.Phishing.CHJ, led by Hong Kong (15.62%).
The recurrence of Zmutzy variants, CVE-2017-0199, and RTF exploits signals persistent attack vectors. EMEA’s elevated exposure underscores
regional targeting, while AMER’s lower figures suggest less widespread impact, urging tailored defenses by region.
Exploit.CVE-2017-0199.04.
Greece - 20.94% Turkey - 20.42% Cyprus - 20% 11.25% 5.67% 4.16%
Gen
Trojan.Zmutzy.834 Greece - 22.38% Cyprus - 21.54% Hong Kong - 19.53% 9.98% 9.30% 2.55%
Exploit.RTF-ObfsObjDat.
Greece - 23.83% Turkey - 16.25% Hong Kong - 14.84% 10.03% 6.75% 3.04%
Gen
Trojan.HTML.Phishing.CHJ Hong Kong - 15.62% Germany - 12.96% Indonesia - 11.39% 9.15% 5.37% 2.74%
Trojan.Zmutzy.1305 Cyprus - 15.38% Germany - 14.8% Hong Kong - 11.72% 8.94% 3.05% 1.78%
AMER leads with 54.83% per Firebox, indicating a higher malware load per device compared to EMEA at 31.29% and APAC at 13.88%. This
suggests that while AMER may see less widespread malware overall, its Fireboxes face a denser concentration of threats. EMEA follows, balancing
moderate exposure, while APAC’s lower percentage reflects fewer incidents per device.
Specific threats underscore this distribution. Trojan.Linux.Mirai.1, a botnet, heavily targeted Italy within EMEA, exploiting IoT vulnerabilities to
build attack networks. Meanwhile, Application.Agent.LGP, a hacktool, zeroed in on the United States in AMER, likely aiding reconnaissance or
lateral movement. These examples illustrate how regional targeting aligns with the normalized data, emphasizing AMER’s elevated per-device risk
and the need for region-specific defenses.
EMEA
31.9%
APAC
13.9%
RIC
AME AS
54.8%
Region % Share
EMEA 31.29%
AMER 54.83%
APAC 13.88%
Figure 8. Phishing.3.header
Figure 7. Phishing.3.human
Conclusion
Malware distribution varies by region, as seen by trends where certain families targeted areas like EMEA and AMER. Subscribing to threat feeds
provides insights into local risks, enabling organizations to adjust firewall policies and security measures accordingly. This tailored approach
ensures defenses align with the most relevant threats, boosting efficiency and resilience.
By combining advanced detection tools with regional threat intelligence, organizations can address both sophisticated and geographically
specific malware challenges. This dual strategy enhances visibility, improves response capabilities, and significantly reduces vulnerability to
cyberattacks. Adopting these practices equips businesses to stay ahead in the dynamic world of cyber threats.
1059958 Web Threats WEB Directory Traversal -27.u Windows, Linux, Others 4.56%
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4 4 4 4
5 5 5 5 5 5 5 5
6 6 6 6 6 6 6 6
7 7 7 7 7 7 7 7
8 8 8 8 8 8 8 8 8
9 9 9 9 9 9 9
10 10 10 10 10 10 10
Figure 13. New signatures this quarter among the top 50 signatures by volume.
Signature 1134359
This is an insecure deserialization vulnerability in Oracle WebLogic
Server (part of Oracle Fusion Middleware) that was patched and
disclosed in 2017. An unauthenticated attacker could exploit this
vulnerability by sending a SOAP request with a specially crafted
XML body. Deserialization vulnerabilities like this happen when
an application converts user-supplied input into a programming
object (like a function or a data variable) without sanitizing it. With
the right payload, an attacker can trick the server into executing
arbitrary code. In web servers, attackers commonly exploit
deserialization flaws to deploy web shells, giving them extended
remote shell access to the server that can even survive patching
the original vulnerability.
WEB-CLIENT Microsoft
Internet Explorer Memory France Poland
1131523 Spain 74.01 57.82 60.68 46.75
Corruption Vulnerability -2 70.99 67.05
(CVE-2015-2425)
USA Canada
1132643 WEB Cross-Site Scripting -32 Brazil 27.38 22.30 8.58 9.96
23.89 19.35
The Most-Widespread Network Attacks table remains entirely unchanged from Q3 2024, with no new additions and in fact, the exact same
rankings for each of the 5 exploits. With that said, there were some major changes in the countries that these exploit attempts most affected. For
example, Spain showed up as the top target for the #1 most-widespread threat, with 74% of all networks having at least one detection. Mean-
while, central Europe remained a popular target for the generic Web Directory Traversal detection (1059877), with Switzerland showing up as the
top victimized country.
EMEA
20.4% APAC
56.3%
RIC
AME AS
0.00%
Q4, 2023 Q1, 2024 Q2, 2024 Q3, 2024 Q4, 2024
Conclusion
Q4 2024’s network attack trends reveal a cybersecurity landscape where old habits die hard for attackers. Many of the quarter’s leading attack
vectors were familiar from past reports, a clear indication that adversaries continue to find success exploiting years-old weaknesses. As we’ve
observed before, once attackers identify an effective exploit, they will reuse it persistently rather than abandon it. This quarter was no exception;
well-known vulnerabilities in web servers (from Microsoft IIS to open-source platforms) and infrastructure software remained lucrative targets.
High-value systems like Microsoft Exchange and popular web apps continued to be in the crosshairs too, which is unsurprising given the poten-
tial payoff of compromising email or web servers.
From a defense perspective, the quarter’s findings reinforce a two-pronged strategy: patch diligently and layer your defenses. Organizations
must ensure that critical patches are applied, especially for the vulnerabilities named in this report, to close off the well-known holes attackers
are probing. Many of these top attacks succeed due to unpatched systems or misconfiguration – issues that good security hygiene can address.
At the same time, a robust intrusion prevention service (IPS) remains vital as a safety net, blocking exploit attempts (old and new alike) in case
something slips through. In short, Q4’s network attack trends highlight the importance of staying vigilant with the basics: keep systems updated,
monitor for abnormal activity, and use layered defenses to catch the inevitable exploit attempts. By doing so, organizations can greatly mitigate
the threats exemplified this quarter and be prepared for whatever new twists future quarters may bring.
Cybercriminals continue to rely on malicious domains for malware Additionally, domains like bestsports-stream[.]com and
distribution, command and control (C2) operations, and illicit www[.]898[.]tv demonstrate how attackers use entertainment and
cryptomining. WatchGuard’s DNSWatch service actively monitors streaming-themed lures to attract unsuspecting users. Fraudulent
and blocks these domains to protect organizations from DNS- promotional emails or pop-ups often redirect victims to these
based threats. phishing pages, where they are prompted to enter personal
information or download malicious files.
In Q4 2024, the top malware domains list remained largely
unchanged from previous quarters, with one notable new entry: Despite no new domains appearing on the list, the persistence of
p2[.]feefreepool[.]net. This domain hosts a crypto mining pool, these phishing sites underscores the importance of ongoing secu-
allowing Monero cryptocurrency miners to work together and pool rity awareness training, email filtering, and DNS-layer protection.
their mining power. We added this specific mining pool domain Organizations should continue monitoring phishing trends and
to our block list in October after researchers found the Prometei reinforcing best practices, such as verifying URLs before entering
botnet heavily using it in cryptomining attacks. Prometei is a credentials and enabling multi-factor authentication (MFA) to
stealthy, modular malware that spreads across networks using mitigate credential theft risks.
exploits, stolen credentials, and brute force attacks.
01
Monitor and Restrict Unusual Tools:
Users should report suspicious downloads, like keygens linked to Variant.MSILHeracles, which often bundle malware
such as Remcos or Formbook, amplifying risks. Admins must vigilantly monitor networks for unauthorized tools like
Impacket (Application.Agent.LGP), a Python-based hacktool suite used for protocol manipulation and credential theft.
By setting up alerts for unusual activity and restricting execution of unknown scripts, admins can halt reconnaissance or
lateral movement. This proactive stance prevents attackers from leveraging legitimate-looking tools to infiltrate systems
unnoticed, safeguarding critical infrastructure.
02 With droppers like Trojan.Sesfix.1 delivering coinminers and botnets like Trojan.Linux.Mirai.1 targeting Linux and IoT, layered
security is critical. The data supports hardening these systems through zero trust, strong credentials, and firmware updates
to curb malware persistence and spread. Memory-loading techniques and IoT exploitation, as seen in Xmrig infections,
highlight vulnerabilities requiring proactive measures. We recommend implementing these steps to limit resource-hijacking
and DDoS risks, addressing Q4’s diverse threat vectors effectively.
03
The report underscores that patching remains vital, with attackers exploiting old vulnerabilities like CVE-2017-0199 in Office
and ProxyLogon in Exchange, alongside newer flaws like HAProxy. Security professionals should advocate for rigorous
update schedules across servers and endpoints, coupled with audits of web servers and CMS platforms to eliminate
misconfigurations. This shrinks the attack surface against persistent exploits like SQL injection and directory traversal still
thriving a decade on, ensuring organizations don’t fall prey to adversaries banking on outdated systems.
• Total malware threats Other sections had other subtle changes such as adding a table
column to discern the quarter-over-quarter differences. For
• New malware threats per 100k active machines example, in the Alerts by Exploit Type subsection, we altered the
• The number of alerts by the number of machines affected raw data to alert composition, as described above, and then added
(Revised!) a column that calculates the alert composition difference from the
quarter prior. Other subsections with these minor changes include
• The number of alerts by which WatchGuard technology
the Top 30 Countries, Top 10 Threat Hunting Rule Invocations, and
invoked the alert (Revised!)
the Threat Hunting MITRE ATT&CK matrix alert subsections.
• Alerts by exploit type (Revised and Enhanced!)
The most notable change this quarter is the Attack Vectors
• Attack vectors (Revised and Enhanced!) subsection, which has evolved more than any other subsection.
• Top 30 affected countries each quarter (Enhanced!) Years ago, we tracked five or six data points for Attack Vectors
and included a summation pie graph to visualize a threat actor’s
• Cryptominer detections
manner of infection. Then, we drilled down into each data point to
• Top 10 most-prevalent malware provide more granular attack vectors. Now, as of this quarter, we
• Top 10 most-prevalent potentially unwanted programs have added more data points and are now providing this granular
(PUPs) data for every data point. The increase in data we ingest allows us
to relay that information to readers. We will expand on these data
• Top 10 threat hunting rule invocations (Enhanced!) points when we get to the Attack Vectors subsection.
• Threat hunting MITRE ATT&CK tactics and techniques The final changes made to the Endpoint section primarily pertain
(Enhanced!) to it being the last quarter of the year, but we also enhanced the
• Ransomware detections (WatchGuard) notable ransomware breaches subsection. That subsection now
includes notable ransomware events including law enforcement
• Ransomware double extortion landscape
actions and modifications to the inner workings of ransomware
• Notable ransomware events (Revised!) groups. We differentiate breaches and events using the Notable
Ransomware Events and Notable Breaches labels. The Alerts by
Number of Machines Affected, Alerts by Technology, and Ran-
somware Landscape subsections include annual changes only
appearing for those in the fourth quarter.
That is enough staging for now. Let us begin with Malware
Frequency as is customary for the Endpoint section.
Right out of the gate, total unique malware threats are significantly
down for the quarter, showing historically low rates. Considering
Q3 had uncharacteristic high malware threats, combined with Q4’s
88
atypically low levels, the quarter-over-quarter reduction is also a
historic 91.14% decrease. If we assume the third quarter was an
outlier, the change from Q2 to Q4 is still abnormal with a 64.51%
decrease. Therefore, we have observed never-before-seen low rates 36
Alerts
1 423034
>= 2 & < 5 7769
>= 5 & < 10 1924
>= 10 & < 50 1202
>= 50 & < 100 121
>=100 104
1 >= 2 & < 5 >= 5 & < 10 >= 10 & < 50 >= 50 & < 100 >=100
For this quarter only, we have included another graph that shows the alert composition totals for each schema. The x-axis defines the four
quarters, left to right. The y-axis is the alert composition total, beginning at 80%. The colors are the different schemas. The graph shows a similar
sharp increase like malware frequency’s Total Malware Threats that correlates to malware on only one machine. This supports the theory that
isolated malware was the cause of the atypical increase in total malware threats for last quarter.
100%
98%
96%
94%
92%
90%
88%
86%
84%
82%
80%
Q1 Alert Comp. Q2 Alert Comp. Q3 Alert Comp. Q4 Alert Comp.
1 >= 2 & < 5 >= 5 & < 10 >= 10 & < 50 >= 50 & < 100 >=100
Defense in Depth
Defense in depth gets its name from the idea that multiple technologies layered on top of one another provide a stepping-stone defensive
posture that attacks must try and navigate through. Thus, bypassing only one technology will not necessarily result in a block attack. Threat
actors must successfully bypass all technologies. This is why defense in depth is the recommended approach for both networks and endpoints.
In fact, network solutions combined with endpoint solutions in and of itself is defense in depth, but if these measures exist across the network
and all endpoints, the defense in depth compounds. For WatchGuard EPDR-protected endpoints, we employ the following six technologies to
thwart attacks.
Cloud 31.91%
As promised, we have included annual data for this section since it is the last quarter of 2024. This year we observed a zigzag malware land-
scape where quarters one was similar to Q3, and Q2 was similar to Q4. There was no consistency throughout the year, which is a nightmare for
decision-makers. We can also conclude that neither of these quarters are true outliers because any given quarter had a different complimentary
quarter in terms of the data. Q1 and Q3 were driven by AD360 Endpoint Detections. Whereas Q2 and Q4 were more balanced, but spearheaded
by Cloud detections. This quarter was the most balanced of them all, with all technologies receiving a similar number of alerts, except for
Defined Rules.
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Q1 Alert Comp. Q2 Alert Comp. Q3 Alert Comp. Q4 Alert Comp.
AD360 Endpoint Detection Defined Rules Digital Signature Behavioral/Machine Learning Cloud Manual Attestation
HackingTool/
2914300A6E0CDF7ED242505958AC0BB5* 752 KMS_VL_ALL_AIO
AutoKMS
FC3B93E042DE5FA569A8379D46BCE506* PUP/Hacktool 431 Mail PassView
PUP/
136C60612962C8FA36B6A46009BF8CE8 399 Browser Security
BrowserSecurity
HackingTool/
8D0C31D282CC9194791EA850041C6C45* 367 KMSPico
AutoKMS
HackingTool/
CFE1C391464C446099A5EB33276F6D57* 335 AutoPico
AutoKMS
219218AE29B2F9DFC8F6B745C004B1E3* PUP/Patcher 249 AMTLib
A9DAAD0505339EC723069CAFD14C781B PUP/Multitoolbar 198 Jdownloader 2
AC8CA19033E167CAE06E3AB4A5E242C5 PUP/Softonic 180 Softonic Installer
B4440EEA7367C3FB04A89225DF4022A6* PUP/TechUtilities 180 PDFixers
Acrobat 0.76%
Browsers 4.36%
Other 4.14%
Scripts 82.94%
Windows 4.03%
0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% 90.00% 100.00%
Brave 0.05%
Chrome 71.54%
Edge 16.71%
Firefox 9.04%
Internet Explorer
Figure 38. Q4 2024 Database Software Detections
2.61%
0.00% 20.00% 40.00% 60.00% 80.00% 100.00% Figure 39. Q4 2024 Microsoft 365 Detections
Python 0.60%
350
300
100
50
0
Q1 2024 Q2 2024 Q3 2024 Q4 2024
THREAT HUNTING
The Threat Hunting subsection pertains to all EPDR users, but Advanced EPDR users receive additional non-deterministic indicators of com-
promise. All users receive these indicators mapped to the MITRE ATT&CK matrix, which is a normalized knowledge base describing tactics and
techniques of threat actors. A single attack can contain several tactics and techniques, and thus, the alerts invoked in this subsection are signifi-
cantly higher than malware threats in prior subsections. As a refresher, the tactics and technique data points for the Threat Hunting subsection
are listed below.
TA0001 682,590
TA0002 8,341,240
TA0003 6,901,091
TA0004 1,419,983
TA0005 9,758,049
TA0006 1,985,016
TA0007 7,764,503
TA0008 508,693
TA0009 888
TA0010 1,682
TA0011 2,705,272
TA0040 3,565,800
TA0042 1,701
PowershellCommandDiscoveryRule 5,475,657 1
DisableSecurityProtectionsRule 4,597,263 2
DeleteFilesOrPartitionsRule 3,476,121 3
PowershellCommandsDecodedDesofusRule 3,384,206 4
HijackExecutionFlow 3,178,869 5
PersistenceServicesBinPath 2,248,371 6
RemoteFileCopyRule 2,191,057 7
PowershellDangerousCommandLinesRule 2,014,471 8
NetAdminAddRule 1,361,029 9
LolBasRule 1,313,884 10
1,400
1,259 Anubis BlackByte
1,200
Apos Security Chort
1,000
Argonauts Group dAn0n
800
Bluebox 1.0 DarkVault
600
Chort Dispossessor
400
259 233
173 CyberVolk Donut Leaks
200
FunkSec HelloGookie
0
Q1 2024 Q2 2024 Q3 2024 Q4 2024
HELLCAT IRLeaks
Figure 48. 2024 QoQ Ransomware Detections by Quarter
INTERLOCK Kill Security
Extortion Groups Kairos MADDLL32
All the data from here on out does not apply to EPDR-protected Kill Security 3.0 Mallox
endpoints. It is auxiliary data aimed at supplementing the ransom-
LEAKEDDATA PlayBoy
ware detections from the WatchGuard ransomware detections,
and the numbers support the quarter-over-quarter increase seen LockBit 4.0 RA Group
on these endpoints. While these endpoints saw a catastrophic
Morpheus Ransomcortex
increase of 627.75% from Q3, the number of extortion victims did
not increase nearly as much. However, they did increase much Nitrogen SenSayQ
more than normal, rising 40.92%, which again, is historically high
PlayBoy Valencia
according to our numbers. Keep in mind that double extortions
have only existed for around six years with the first true double SafePay Vanir Leaks
extortion being attributed to the Maze group in late 2019. So, SKIRA TEAM Werewolves
our data is limited because the data itself is limited. Yet, based on
this limited data, we rarely, if ever, see around 40% increases from Termite
quarter to quarter. Weyhro
2000 1863
WikiLeaksV2
1800
1600
1400 1322
Figure 50. Q4 Newly Active and Inactive Ransomware Groups
1290
1200 1121
1000
800
600
400
200
0
Q1 2024 Q2 2024 Q3 2024 Q4 2024
8BASE 11
A BY S S 9
AKIRA 138
ANUBIS 4
APT73 (BASHE) 50
ARCUS MEDIA 22
ARGONAUTS GROUP 11
BIANLIAN 33
BL00DY 2
B L A C K B A S TA 36
BLACKSUIT 42
B LU E B O X 1 . 0 3
BRAIN CIPHER 13
CACTUS 29
CHORT 7
CICADA3301 11
CIPHBIT 4
CL0P 7
C LO A K 28
CYBERVOLK 12
DAIXIN 2
D A R K VA U LT 6
DISPOSSESSOR 4
DONUT LEAKS 4
DRAGONFORCE 19
EL DORADO/BL ACKLOCK 56
EMBARGO 6
EVEREST 27
EVILMOROCCO 15
FLOCKER/F-SOCIETY 7
FOG 67
FUNKSEC 84
HANDALA 14
HEAD MARE 6
H E L LC AT 7
HELLDOWN 12
H U N T E R S I N T E R N AT I O N A L 62
INC RANSOM 37
INTERLOCK 13
KAIROS 14
KILL SECURITY 23
KILL SECURITY 3.0 86
L E A K E D D ATA 34
LOCKBIT 3.0 12
LY N X 52
MADDLL32 1
MEDUSA BLOG 50
MEOW LEAKS 40
MONEY MESSAGE 3
MONTI 8
MORPHEUS 2
NITROGEN 19
ORCA 1
P L AY 95
P L AY B O Y 1
QILIN 55
RA GROUP 30
RANSOMHOUSE 8
RANSOMHUB 245
RHYSIDA 18
S A F E PAY 46
SARCOMA 36
SKIRA TEAM 1
S PA C E B E A R S 10
STORMOUS 8
TERMITE 9
THREEAM 11
T R I N I T Y LO C K 2
UNDERGROUND 2
WEYHRO 1
WIKILEAKSV2 20
0 50 100 150 200 250 300
0mega 1
8base 147
Abyss 42
Akira 302
AlphaLocker 15
Anubis 4
Apos Security 4
APT73 (Bashe) 65
Arcus Media 56
Argonauts Group 13
BianLian 168
Bl00dy 4
Black Basta 168
BlackByte 4
BlackCat (ALPHV) 56
BlackSuit 147
Bluebox 1.0 3
Brain Cipher 26
Cactus 141
Chort 7
Cicada3301 42
CiphBit 14
CL0P 27
Cloak 63
Cuba 2
CyberVolk 17
Cyclops/Knight 8
DAIXIN 5
dAn0n 19
DarkVault 52
Dispossessor 51
DoNex 5
Donut Leaks 16
DragonForce 95
DungHill Leak 3
El Dorado/BlackLock 84
EMBARGO 18
Everest 53
Evi lMorocco 29
Flocker/F-SOCIETY 19
FOG 87
FunkSec 84
Handala 84
Head Mare 15
HELLCAT 7
Helldown 33
HelloGookie 3
Hunters International 227
INC Ransom 159
INTERLOCK 13
IRLeaks 14
Kairos 14
Kill Security 61
Kill Security 3.0 86
LEAKEDDATA 34
LockBit 3.0 515
LockBit 4.0 0
Lynx 82
MADDLL32 14
Malek Team 3
Mallox 10
Medusa Blog 207
MedusaLocker 2
Meow Leaks 128
Metaencryptor 11
Money Message 6
Monti 33
Morpheus 2
Nitrogen 19
Orca 3
Play 347
PlayBoy 1
Pryx 4
Qilin 180
Qiulong 8
RA Group 67
Ransomcortex 4
RansomHouse 51
RansomExx2 14
RansomHub 537
Red 16
Rhysida 85
Saf ePay 46
Sarcoma 59
SenSayQ 2
SKIRA TEAM 1
Slug 1
Snatch 15
Space Bears 44
Stormous 42
Termite 9
ThreeAM 30
Trigona 19
TrinityLock 10
Trisec 3
Underground 15
Valenci a 5
Vanir Group 3
Werewolves 3
Wey hro 1
WikiLeaksV2
Zero Tolerance
Q1 Q2 Q3 Q4
others, including his brother Sergei. According to the Justice Brain Cipher
Department, Ryzhenkov began deploying BitPaymer in 2017 with Deloitte – There is a chance that Deloitte is familiar to you. So, we
his conspirators. Law enforcement published all the details on the will not explain their background, but they are one of the “Big 4”
seized LockBit data leak site under Operation Cronos and included audit firms in the world along with Ernst & Young (EY), Klynveld
Peat Marwick Goerdeler (KPMG) and PricewaterhouseCoopers
further details about arrests including an admin of Bulletproof, a
(PwC). These four companies perform a large share of the world’s
hosting provider, and two other affiliates. accounting audits. Therefore, the data they possess and manage is
The Justice Department released an image of Evil Corp members vast and sensitive, and any breach of this data is costly. Brain Cipher
and affiliates where Aleksandr Ryzhenkov is at the bottom right: claims to have exfiltrated about one terabyte of their data from
Deloitte UK. The company claims otherwise.
Cactus
Housing Authority of the City of Los Angeles (HACLA) –
Ransomware groups have posted the HACLA on at least three
occasions, of which we are aware. In late 2022, LockBit posted the
HACLA on their data leak site claiming to have 15 terabytes of data,
and then again three months later with an updated data log. Then,
the Dispossessor group, which is known to publish leaks of other
groups and claim it as their own, published the same exact post
of the second LockBit post – all but confirming this was a re-leak.
Now, Cactus is the latest to post a successful breach and claims to
have 861 gigabytes of data. This is notable because the HACLA is
one of the largest housing authorities in the United States.
Cl0p
Cleo Managed File Transfer (MFT) – In October 2024, Cleo divulged
a vulnerability tracked as CVE-2024-50623 that permitted
unrestricted file uploads and downloads. A second vulnerability
was discovered in December 2024 (tracked as CVE-2024-55956).
Cl0p exploited these two vulnerabilities to perform data supply
chain exfiltration attacks against many of the users of Cleo’s
software, which they are still posting as of this writing. They have
published hundreds of alleged victims on their data leak site
and point to these recent zero-day vulnerabilities as the avenue
of attack. On December 15, 2024, the ransomware group finally
claimed responsibility for the recent spate of data theft attacks
that targeted organizations using Cleo-managed file transfer (MFT)
software solutions. Expect Cl0p’s numbers to be much higher for
Q1 of 2025 than they were all of 2024.
Figure 55. US Treasury Evil Corp Organizational Chart
Conclusion
In conclusion, this quarter was historic and record-breaking in
multiple ways. We observed significantly fewer new malware
threats and a record-breaking reduction in total malware threats,
decreasing 91.14% from last quarter. We also blocked an abnormal-
ly high number of ransomware attacks on WatchGuard endpoints,
particularly from the Black Basta and Play ransomware groups. Both
groups appeared in the Top 10 Most Prevalent Malware list for this
quarter, as did some of their helper malware files. This was coupled
Figure 56. HellCat – Schneider Electric Double Extortion
with a sharp increase in ransomware extortions throughout the
ransomware landscape. We also made a myriad of changes to
INC Ransom the Attack Vectors subsection, where the Scripts attack vector
Liverpool’s Alder Hey Children’s Hospital, Liverpool Heart and Chest increased over ten-fold, spearheaded by PowerShell invocations.
Hospital, and Royal Liverpool University Hospital – On November
28, the INC Ransom group published what appeared to be valid All in all, total threats across the board decreased significantly, but
stolen data from “NHS Alder Hey,” certainly alluding to Liverpool’s of those detections, many of them were ultra-destructive ransom-
Alder Hey Children’s Hospital in England. The group claimed to ware attacks. This is a wake-up call to understand that just because
have stolen a large swathe of data, including patient records, there were fewer threats, does not mean that the threats that
donor reports, and procurement data, all from 2018 to 2024. The do attempt to slip through defenses will be simple attacks. Most
same day, the hospital released an official statement saying they threat actors are opportunists, and some are more patient than
are aware of the published data on INC Ransom’s dark web data others. Therefore, it’s paramount to not overlook not overlooked
leak site and are investigating its authenticity. A week later, on small alerts . One small alert could lead to widespread attacks if not
December 4, they released an updated statement confirming that tended to quickly and diligently. Let this quarter be a lesson in that.
If you can’t patch perfectly, patch Implement a structured patching policy with clearly defined SLAs
that prioritize critical vulnerabilities. If you can’t address every
programmatically. patch, ensure that you focus on the important ones first. While
In every quarterly security report we’ve ever released, we consis- this concept is foundational, lacking a formal patch policy with
tently find that threat actors primarily exploit old vulnerabilities SLAs and severity definitions, tailored to your organization’s risk
‒ often fixed months, if not years, prior. The prevalence of zero-day assessments, necessitates immediate action.
exploits pales in comparison to these well-known, outdated vul- At a high level, prioritize swift patch SLAs for software flaws with
nerabilities. This reality underscores our repeated advice: regularly the highest criticalities. For instance, address high and critical
and swiftly patch your software to yield significant returns on your patches within 30 days, while allowing 90 to 180 days for medium
security work investment. You already know this. and low severity. Consider exposure as a key factor; if a software
However, real-world business constraints can hinder organizations service is exposed externally, your patch SLA should be much
from keeping up with patches. For example, some may need to faster, whereas internal low-risk vulnerabilities might warrant a
rely on outdated applications that function only on end-of-life longer wait.
operating systems. While this isn’t ideal, finding a replacement may In conclusion, strive to patch everything possible as quickly as you
take time. Similarly, small teams may struggle to manage extensive can. If that’s unachievable, take the time to develop a risk-based
infrastructures. Regardless of the challenge, it’s crucial to prioritize policy. Employ automated patching and monitoring tools to ensure
quickly patching the most critical vulnerabilities. you meet your SLAs effectively.
What should you do if perfect patching isn’t feasible?
MARC LALIBERTE
Director of Security Operations
Specializing in network security technologies, Marc’s industry experience allows him to conduct meaningful information security research and educate
audiences on the latest cybersecurity trends and best practices. With speaking appearances at IT conferences and regular contributions to online IT and
security publications, Marc is a security expert who enjoys providing unique insights and guidance to all levels of IT personnel.
TREVOR COLLINS
Information Security Analyst
Trevor Collins is a information security analyst at WatchGuard Technologies, specializing in network and wireless security. Trevor earned his security know-
how and several certifications through his past military experience in the United States Air Force. Trevor is a regular contributor to Secplicity.org where
he provides easily understood data analysis and commentary to IT professionals. Trevor’s experience with a wide range of network security vendors and
technologies allows him to provide unique perspectives to the industry.
RYAN ESTES
Intrusion Analyst
Ryan is an intrusion analyst at WatchGuard Technologies operating primarily within DNSWatch, WatchGuard’s DNS filtering and security service. For DNSWatch,
Ryan helps customers better understand potential threats to their organization using tailored domain analysis and threat intelligence. Outside of DNSWatch,
his research interests include web application security, Wi-Fi communications, and malware analysis. Ryan embraces a ‘never stop learning’ lifestyle allowing
him to stay on top of the latest cybersecurity and malware trends. In turn, Ryan passes this knowledge on to our customers and even shares certain topics on
his personal blog.
For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuard, on Facebook, and on the LinkedIn Company page. Also, visit our InfoSec blog, Secplicity, for
real-time information about the latest threats and how to cope with them at www.secplicity.org.
©2025 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Firebox, Fireware, IntelligentAV, DNSWatch, and Unified Security Platform are trademarks or registered trademarks
of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE67791_040925