Kaspersky Security Bulletin

Kaspersky Security Bulletin 2021. Statistics

All statistics in this report are from the global cloud service Kaspersky Security Network (KSN), which receives information from components in our security solutions. The data was obtained from users who had given their consent to it being sent to KSN. Millions of Kaspersky users around the globe assist us in collecting information about malicious activity. The statistics in this report cover the period from November 2020 to October 2021, inclusive.

Figures of the year

  • During the year, 15.45% of internet user computers worldwide experienced at least one Malware-class attack.
  • Kaspersky solutions blocked 687,861,449 attacks launched from online resources across the globe.
  • 114,525,734 unique malicious URLs triggered Web Anti-Virus components.
  • Our Web Anti-Virus blocked 64,559,357 unique malicious objects.
  • Ransomware attacks were defeated on the computers of 366,256 unique users.
  • During the reporting period, miners attacked 1,184,986 unique users.
  • Attempted infections by malware designed to steal money via online access to bank accounts were logged on the devices of 429,354 users.

Fill the form below to download the Kaspersky Security Bulletin 2021. Statistics full report (English, PDF)

Kaspersky Security Bulletin 2021. Statistics

Your email address will not be published.

 

  1. Achim Jung

    I would like to get the report for BMW Group.

    1. Securelist

      Hi Achim!

      Please fill in the form provided in the post to get the full report.

  2. Sumadeep

    I would like to get the report for BMW Group

    1. Securelist

      Hi, Sumadeep!

      To get the report, please, fill in the form above the comment form.

  3. John

    Here for the report

    1. Securelist

      Hi John!

      If you need the full report, please fill in the form in this post. If you don’t see any form except the comment form, try to temporarily disable adblockers and content blocking settings in your browser.

  4. Muhammad Anas

    Need to know the details of virus outbreaks

    1. Securelist

      Hi Muhammad!

      To get the full report, please, fill in the form inside this post. If you can’t see any form except the comment form, try to disable adblocker or check if there are content blocking settings enabled in your browser.

  5. Amor

    Thanks

  6. vivoto

    Hi there,
    I would like to get the statistic full report.

    1. Securelist

      Hi Vivoto!

      There are two forms in this post: one comment form, and the other one you need to fill in to get the report. If you see only one form on the page, you can do the following to get the right form visible:
      – Change privacy settings in your browser to milder ones.
      – Add this page to exceptions. Here’s how you can do it in Firefox: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/25100231/Firefox-settings.png
      – If you use ad blocking extensions, add this page to their exceptions, too.
      – Try another browser.

  7. Darwin Escobar

    interestect

    1. Securelist

      Hi Darwin!

      There are two forms in this post: one comment form, and the other one you need to fill in to get the report. If you see only one form on the page, you can do the following to get the right form visible:
      – Change privacy settings in your browser to milder ones.
      – Add this page to exceptions. Here’s how you can do it in Firefox: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/25100231/Firefox-settings.png
      – If you use ad blocking extensions, add this page to their exceptions, too.
      – Try another browser.

Reports

The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’.

WinDealer dealing on the side

We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack.

APT trends report Q1 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

Subscribe to our weekly e-mails

The hottest research right in your inbox