ESET Resource Center

ESET Threat Report T1 2022

June 2022

ESET Threat Report T1 2022

Inspect the T1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts. First of all, several interesting observations occur when speaking about the unprovoked war against Slovakia’s eastern neighbor. Ukraine is resisting attacks not only in the physical world but also in cyberspace.

Shortly before the Russian invasion, ESET telemetry recorded one of two sharp drops in RDP attacks. The decline in these attacks might have a connection to the war in Ukraine. However, even with this reduction, almost 60% of the incoming RDP attacks seen in T1 2022 came from Russia. At the same time, according to our telemetry, Russia has become the top targeted country. Unsurprisingly, the war has also been noticeably exploited by spam and phishing threats. Immediately after the invasion on February 24, scammers started to take advantage of people trying to support Ukraine by using fictitious charities and fundraisers as lures.

Apart from that, ESET’s researchers also observed the return of the infamous malware called Emotet that had been previously seemingly taken down. The past months were also full of interesting research findings. Our researchers uncovered – among other things – the abuse of kernel driver vulnerabilities; high‑impact UEFI vulnerabilities; cryptocurrency malware targeting Android and iOS devices; and the campaigns of Mustang Panda, Donot Team, Winnti Group, and the TA410 APT group. Explore much more insights in the ESET Threat Report T1 2022 to see the full picture.

Don't miss out

PREMIUM CONTENT

WHITE PAPERS


Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense

Explore the current challenges of prevention, how closely is prevention intertwined with CTI, and what new features are part of the ESET Threat Intelligence. Read for free!

PREMIUM CONTENT

WHITE PAPERS


Cybersecurity in an AI-turbocharged Era

AI can be used for both good and evil. Find out how it transforms the world of digital security, how cybercriminals use it, and how ESET leverages the technology to keep you secured.

PREMIUM CONTENT

HANDBOOKS


Prevention first: Minimizing the Attack Surface and Closing Compliance Gaps

Prevention is key when protecting your company against threats. Learn about mobile protection, cloud protection, and the benefits of managing them from one console.
 

Ready for next step?

Enter the world of enterprise protection