ESET Services

Optimize your ESET experience with expert support.

MSP & Partnerships

Become an ESET managed service provider.

ESET Resource Center

ESET Threat Report T2 2022

October 2022

ESET Threat Report T2 2022

In T2 2022, ESET researchers saw the continuation of the sharp decline of Remote Desktop Protocol (RDP) attacks, which likely continued to lose their steam due to the Russia-Ukraine war, along with the post-COVID-19 return to offices and overall improved security of corporate environments.

Apart from that, ESET’s research team also uncovered a previously unknown macOS backdoor and later attributed it to ScarCruft, discovered an updated version of the Sandworm APT group’s ArguePatch malware loader, uncovered Lazarus payloads in trojanized apps, and analyzed an instance of the Lazarus Operation In(ter)ception campaign targeting macOS devices while spearphishing in crypto-waters.

In terms of threats mostly impacting home users, a sixfold increase in detections of shipping-themed phishing lures has been observed, most of the time presenting the victims with fake DHL and USPS requests to verify shipping addresses. These are just a sneak peak of what the ESET Threat Report T2 2022 can offer in terms of the latest expert insights from the field of contemporary cybersecurity.

Don't miss out

PREMIUM CONTENT

WHITE PAPERS


Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense

Explore the current challenges of prevention, how closely is prevention intertwined with CTI, and what new features are part of the ESET Threat Intelligence. Read for free!

PREMIUM CONTENT

WHITE PAPERS


Cybersecurity in an AI-turbocharged Era

AI can be used for both good and evil. Find out how it transforms the world of digital security, how cybercriminals use it, and how ESET leverages the technology to keep you secured.

PREMIUM CONTENT

HANDBOOKS


Prevention first: Minimizing the Attack Surface and Closing Compliance Gaps

Prevention is key when protecting your company against threats. Learn about mobile protection, cloud protection, and the benefits of managing them from one console.
 

Ready for next step?

Enter the world of enterprise protection