Key Q1 2024 Malware Trends: Report From ANY.RUN Sandbox
DUBAI, DUBAI, UNITED ARAB EMIRATES, July 11, 2024 /EINPresswire / -- ANY , a cybersecurity provider of interactive malware analysis sandbox and Threat Intelligence products, has released its latest malware trends analysis for the second quarter of 2024. The report, drawn from 881,466 public analysis sessions conducted by its users, provides a comprehensive overview of the most prominent malware families, types, and tactics, techniques, and procedures (TTPs) observed over the past three months.
Overall Malicious and Suspicious Activity in Q2 2024
In Q2 2024, ANY sandbox users analyzed 881,466 files and links. Of these, 18.4% (162,258) were identified as malicious, and 7.0% (61,619) as suspicious, marking a significant rise from 3.5% in Q1
As a result, users gathered a total of 351,423,662 IOCs during this period, with 73,233,314 (20.8%) unique ones.
Most Popular Malware Types in Q2 2024
The report shows that Remote Access Trojans (RATs) dominated the threat landscape in Q2 with 5,868 detections, an increase from 4,956 in Q1 2024. Loaders also saw a rise in detections from 4,770 in Q1 to 5,492 in Q2. Trojans emerged as a significant threat with 4,211 detections.
Stealers dropped from the top position in Q1 (5,799 detections) to fourth place in Q2 (3,640 detections), marking a 37.2% decrease. Ransomware detections also fell by 27.5%, from 4,065 in Q1 to 2,946 in Q2.
Most Prevalent Malware Families in Q2 2024
RedLine surged to the top with 3,411 instances, a 379% increase from Q1. Remcos, which led in Q1, fell to second place with 1,282 instances, a 29.4% decrease. NjRAT maintained its third-place position despite a slight decrease in instances.
New entrants like Qbot and Formbook climbed the ranks, indicating shifting trends in malware prevalence.
Most Common MITRE ATT & CK Techniques in Q2 2024
Email Collection (T1114.001) and Virtualization/Sandbox Evasion (T1497.003) retained their top positions. Scheduled Task/Job (T1053.005) saw a significant increase, rising from 11th to 4th place.
New techniques like Scheduled Task/Job: Cron (T1053.006) entered the top 20, suggesting a change in the tactics used by threat actors.
Report Methodology:
The report is based on data from 881,466 interactive analysis sessions contributed by researchers within the ANY community. These sessions provide valuable insights into the evolving malware landscape.
For more information, visit ANY's blog .
About ANY:
ANY supports over 400,000 cybersecurity professionals globally. The platform simplifies malware analysis for threats targeting both Windows and Linux systems. ANY's threat intelligence products, including TI Lookup, Yara Search, and Feeds, enhance the ability to identify and respond to threats efficiently.
The ANY team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
YouTube

Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- Kucoin Presents Kumining: Embodying Simple Mining, Smart Gains For Effortless Crypto Accumulation
- Japan Ultrasound Devices Market Size Worth USD 887.0 Million By 2033 CAGR Of 5.4%
- UK Cosmetics And Personal Care Market To Reach USD 23.2 Billion By 2033
- Innovation-Driven The5ers Selects Ctrader As Premier Platform For Advanced Traders
- Origin Summit Debuts In Seoul During KBW As Flagship Gathering On IP, AI, And The Next Era Of Blockchain-Enabled Real-World Assets
- Ethereum-Based Meme Project Pepeto ($PEPETO) Surges Past $6.5M In Presale
Comments
No comment