Cybercrime Threat Landscape February 2023
[et_pb_section fb_built=”1″ _builder_version=”4.19.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.19.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.19.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” text_font_size=”13px” custom_margin=”||-1px|||” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of February 2023.
This threat landscape analysis will particularily concentrate on :
– Fake claim of global payment services leader #Ingenico by #Snatch
– Massive campaign to encrypt vulnerable #VMWare machines
– Establishment of a cybercriminal cartel, “Ares Project”
– Analysis of the Amadey loader, efficient and increasingly popular
– The trends highlight the resumption of a high level of claims of #ransomware attacks (+65%) whose activity traditionally decreases in January, #LockBit 3.0 in the lead
[/et_pb_text][et_pb_button button_url="https://www.intrinsec.com/wp-content/uploads/2023/03/23-02-Tendances_CTI.pdf" button_text="Access the report" _builder_version="4.20.4" _module_preset="default" global_colors_info="{}"][/et_pb_button][/et_pb_column][et_pb_column type="1_2" _builder_version="4.19.4" _module_preset="default" global_colors_info="{}"][et_pb_image src="https://www.intrinsec.com/wp-content/uploads/2023/03/23-02-Tendances_CTI.png" alt="Threat_Landcape_CTI_2022" title_text="23-02-Tendances_CTI" force_fullwidth="on" _builder_version="4.20.4" _module_preset="default" custom_padding="|||0px||" global_colors_info="{}"][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version="4.19.4" _module_preset="default" global_colors_info="{}"][et_pb_column type="4_4" _builder_version="4.19.4" _module_preset="default" global_colors_info="{}"][/et_pb_column][/et_pb_row][/et_pb_section]