Summary of malware activity: January - March 2023

Endpoint malware

A majority of endpoint malware reports was concentrated in a small number of Autonomous Systems (hosting networks).

Over 1,100 ASNs had IP addresses reported for hosting endpoint malware. Of the nearly 53,000 endpoint malware reports, 33% were reported to CHINA UNICOM China169 Backbone (AS4837) and 20% were reported to QUANTILE NETWORKS INC (AS 54994).

Unique domains reported for hosting malware decreased 38%

COM, CN, and ORG had the most unique domains reported for hosting endpoint malware.

Alibaba Cloud Computing Co., Ltd. and eName Technology Co., Ltd. were the top gTLD registrars identified as having malware domains under management,

The vast majority of malware that we process associate malware with IPv4 addresses. Of the unique domains that were reported for hosting malware, we determined that 30% were maliciously registered.

For the period, the Gozi and Quackbot infostealers and the Gafgyt
backdoor were the most frequently reported endpoint malware.

Mozi malware accounted for 88% of IoT Malware reported.

IoT Malware

Malicious Traffic Sources

Reports of attackware and traffic injectors for the current period decreased 30% from the prior period.

Traffic injectors represented 60% of malicious traffic sources reported:

  • nearly one-half of these reports identified PHP Forum spammers, and

  • 12% identified HTTP spammers.

Of the attackware reported,

  • 55% of the reports identified vulnerability scanners, and

  • 30% identified SSH scanners.

82% of the IoT malware reported during this period were associated with IPv4 addresses from four Asia-Pacific ASNs:

  1. CHINA UNICOM China169 Backbone (AS4837),

  2. Bharat Sanchar Nigam Ltd. (AS9829), and

  3. Asia Pacific Network Information Centre (AS4134)

  4. China Unicom IP network China169 Guangdong province (AS 17816)