{"id":77354,"date":"2024-04-17T12:10:36","date_gmt":"2024-04-17T04:10:36","guid":{"rendered":"https:\/\/version-2.com\/?p=77354"},"modified":"2024-04-16T12:12:00","modified_gmt":"2024-04-16T04:12:00","slug":"malware-threat-research-2020-2023","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/04\/malware-threat-research-2020-2023\/","title":{"rendered":"Malware Threat Research 2020-2023"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77354\" class=\"elementor elementor-77354\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"nord-col md:col-11 lg:col-7\"><div><div class=\"my-3 PostContent_excerpt__wB2qU\"><p class=\"nord-text text-lead font-medium leading-normal text-black\"><span style=\"color: #000000;\">If you ask Google or AI what malware is, they&#8217;ll likely break it down as software meant to disrupt your systems, networks, or devices \u2014 but this description alone might not convince you of its significant threat.<\/span><\/p><\/div><div class=\"mb-12 mt-6 md:mt-12\"><p class=\"mb-6 text-base text-black font-medium\">Contents<!-- -->:<\/p><ul class=\"leading-loose List_list__BljM0 List_noStyle__kj8bR\"><li class=\"ListItem_item__ZgGQo list-item mt-4\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base font-medium\" href=\"#key-findings-from-the-research\" data-link=\"NordUIlink\">Key findings from the research<\/a><br \/><ul class=\"leading-loose mt-4 ml-8 List_list__BljM0 List_noStyle__kj8bR\"><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#1-with-nearly-3-million-attacks-in-2023-malware-has-spread-like-a-biological-virus\" data-link=\"NordUIlink\">1. With nearly 3 million attacks in 2023, malware has spread like a biological virus <\/a><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#2-brazil-the-usa-and-india-have-the-most-malware-affected-users\" data-link=\"NordUIlink\">2. Brazil, the USA, and India have the most malware-affected users<\/a><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#3-redline-is-the-most-common-type-of-malware\" data-link=\"NordUIlink\">3. RedLine is the most common type of malware<\/a><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#4-tens-of-millions-of-credential-records-were-stolen-from-social-media-and-entertainment-platforms\" data-link=\"NordUIlink\">4. Tens of millions of credential records were stolen from social media and entertainment platforms<\/a><\/li><\/ul><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base font-medium\" href=\"#what-you-can-do-to-protect-yourself-from-malware-threats\" data-link=\"NordUIlink\">What you can do to protect yourself from malware threats <\/a><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base font-medium\" href=\"#how-nordpass-can-help-protect-your-sensitive-data-and-account-access\" data-link=\"NordUIlink\">How NordPass can help protect your sensitive data and account access <\/a><\/li><\/ul><\/div><div class=\"PostContent_content__eM_tn text-black break-words\" data-content-type-blog=\"true\"><section class=\"my-3\"><div class=\"Article_wrapper__8_7eU\"><div class=\"richtext\"><p class=\"nord-text text-base leading-normal text-black\">Your perspective on malware is likely to change when you engage with someone who has suffered greatly because of it or once you delve into the latest facts on cyber attacks. It&#8217;s in these moments that you truly grasp the reality of malware as a legitimate and substantial threat.<\/p><p class=\"nord-text text-base leading-normal text-black\">In collaboration with independent third-party researchers, <b>we analyzed cybersecurity incident data from January 2020 to September 2023<\/b> to assess and show you how big of a threat malware is today.<\/p><p class=\"nord-text text-base leading-normal text-black\">Here\u2019s what we discovered\u2026<\/p><h2 id=\"key-findings-from-the-research\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Key findings from the research<\/h2><h3 id=\"1-with-nearly-3-million-attacks-in-2023-malware-has-spread-like-a-biological-virus\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">1. With nearly 3 million attacks in 2023, malware has spread like a biological virus<\/h3><p class=\"nord-text text-base leading-normal text-black\">While you may not find it surprising that the number of malware attacks has increased over the last few years, the speed at which this issue has been escalating might catch you off guard.<\/p><p class=\"nord-text text-base leading-normal text-black\">In 2020, approximately 614,144 malware-related incidents were reported. However, this number surged to 2,898,142 in 2021 and nearly doubled again in 2022, reaching 4,858,963. As you can see, these are not minor differences but massive leaps highlighting a <b>substantial increase in the scale of the problem<\/b>.<\/p><p><img decoding=\"async\" class=\"mx-auto\" style=\"color: transparent;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1500x680\/db0633fdf7\/malware-research-inner-asset-01-2x.png\/m\/1200x0\/filters:quality(75)\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1500x680\/db0633fdf7\/malware-research-inner-asset-01-2x.png\/m\/640x0\/filters:quality(75) 640w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/db0633fdf7\/malware-research-inner-asset-01-2x.png\/m\/750x0\/filters:quality(75) 750w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/db0633fdf7\/malware-research-inner-asset-01-2x.png\/m\/1080x0\/filters:quality(75) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/db0633fdf7\/malware-research-inner-asset-01-2x.png\/m\/1200x0\/filters:quality(75) 1200w\" alt=\"number of malware attacks 2020-2023 graph\" width=\"1500\" height=\"680\" data-nimg=\"1\" \/><\/p><p class=\"nord-text text-base leading-normal text-black\"><b>In 2023, there were 2,678,841 malware attacks reported<\/b>. However, before you assume that this signals a gradual resolution of the problem, let us highlight some details that \u2014 unfortunately \u2014 indicate it&#8217;s not yet time to celebrate.<\/p><p class=\"nord-text text-base leading-normal text-black\">To start, the malware incident data we&#8217;ve examined covers only the first 9 months of 2023, implying that the total number of cases for the entire year will more than likely be higher.<\/p><p class=\"nord-text text-base leading-normal text-black\">Moreover, a troubling trend observed by numerous IT experts is <b>the increasing frequency of successful attacks<\/b>. This indicates that cybercriminals are employing more and more sophisticated hacking methods and focusing on more targeted approaches. Simply put, this means we&#8217;re observing fewer malware attacks overall, but more of them are accurate. This is further evidenced by the <b>continuous growth in the number of successfully executed unique email attacks<\/b>, as depicted in the graph below.<\/p><p><img decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1500x680\/c53a356b50\/malware-research-inner-asset-02-2x.png\/m\/1200x0\/filters:quality(75)\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1500x680\/c53a356b50\/malware-research-inner-asset-02-2x.png\/m\/640x0\/filters:quality(75) 640w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/c53a356b50\/malware-research-inner-asset-02-2x.png\/m\/750x0\/filters:quality(75) 750w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/c53a356b50\/malware-research-inner-asset-02-2x.png\/m\/1080x0\/filters:quality(75) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/c53a356b50\/malware-research-inner-asset-02-2x.png\/m\/1200x0\/filters:quality(75) 1200w\" alt=\"number of successful unique email attacks graph\" width=\"1500\" height=\"680\" data-nimg=\"1\" \/><\/p><p class=\"nord-text text-base leading-normal text-black\">How does malware spread? <b>Email is a common culprit,<\/b> where spam and phishing tricks convince users to click on harmful links or download infected attachments. Careless browsing, like <b>clicking on pop-ups<\/b>, can also lead to visiting malicious websites that stealthily download malware.<\/p><p class=\"nord-text text-base leading-normal text-black\">Within organizations, coworkers <b>clicking on malicious links<\/b> can spread malware through the internal network, infecting multiple devices at the same time. Another risk comes from bundled software, where malware sneaks in with seemingly trustworthy downloads, causing users to unknowingly install various harmful programs \u2014 from annoying adware to data-stealing spyware.<\/p><h3 id=\"2-brazil-the-usa-and-india-have-the-most-malware-affected-users\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">2. Brazil, the USA, and India have the most malware-affected users<\/h3><p class=\"nord-text text-base leading-normal text-black\">In the analysis of cybersecurity incidents, the focus was also on examining the global distribution of cases related to malware. Presented below are the <b>top 15 countries<\/b> with the highest number of malware-affected users (drawing from data spanning from October 2020 to November 2023):<\/p><ol class=\"leading-loose List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Brazil \u2014 9,659,846<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>USA \u2014 6,966,426<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>India \u2014 6,914,742<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Indonesia \u2014 5,354,246<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Vietnam \u2014 3,611,798<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Egypt \u2014 3,516,376<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Mexico \u2014 3,042,467<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>The Philippines \u2014 2,926,483<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Turkey \u2014 2,888,663<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Pakistan \u2014 2,849,788<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Columbia \u2014 2,655,695<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Thailand \u2014 2,523,671<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Argentina \u2014 2,300,732<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Peru \u2014 2,215,622<\/b> affected users<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>France \u2014 2,142,316<\/b> affected users<\/p><\/li><\/ol><p class=\"nord-text text-base leading-normal text-black\">Despite securing the top rank in the 2020 Global Cybersecurity Index (GCI) with a score of 100 index points, <b>the United States of America holds second place for the most users impacted by malware<\/b> \u2014 with a staggering number equivalent to the entire population of Massachusetts. Notably, five other nations in the Americas and seven in Asia are grappling with the impacts of the malware situation.<\/p><p class=\"nord-text text-base leading-normal text-black\">The study also reveals that <b>France takes the lead for the highest number of users affected by malware in Europe<\/b>. This may be attributed to several factors, such as the country&#8217;s substantial internet usage (82% of the population) and the increased likelihood of economically and politically charged cyberattacks against French users.<\/p><h3 id=\"3-redline-is-the-most-common-type-of-malware\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">3. RedLine is the most common type of malware<\/h3><p class=\"nord-text text-base leading-normal text-black\">Malware comes in various types and forms like <b>adware, spyware, ransomware, trojan horses, and keyloggers<\/b>. Each one possesses specific functionalities that can compromise one\u2019s digital security. However, certain types of malware are more popular than others.<\/p><p class=\"nord-text text-base leading-normal text-black\">According to the research, the most prevalent types of malware in the last four years have been:<\/p><ol class=\"leading-loose List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>RedLine <\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">RedLine is a type of malware designed to collect data from web browsers, applications, email and messaging apps, and cryptocurrency wallets. In simple terms, it functions as a remote access trojan, enabling cybercriminals to steal and transfer sensitive user data, which is later sold on the dark web. The research reveals that <b>RedLine attacks constitute 59% of the total records collected<\/b> \u2014 surpassing the runner-up Vidar by 3.2 times.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Vidar<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Vidar is malicious software designed to steal sensitive information, including login credentials, credit card details, cryptocurrency wallets, and browser history, from infected systems. The stolen data can be used for identity theft or financial fraud \u2014 or it can be sold on the dark web. As previously noted, RedLine constituted nearly two-thirds of all the analyzed attacks. However, <b>Vidar remains a considerable threat, comprising 18% of the total number of attacks<\/b>.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Raccoon <\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Raccoon, also known as Raccoon Stealer, is a type of information-stealing malware designed to extract sensitive data from the computers of its victims. This includes, but is not limited to, login credentials and credit card information. <br \/>Raccoon Stealer typically spreads through malicious websites, phishing emails, or other deceptive methods. Once it infects a system, it can covertly send the stolen information to a server operated by cybercriminals. <br \/>Raccoon cases account for <b>12% (21% between July 2022 and April 2023) of malware attacks<\/b> analyzed for this research.<\/p><\/li><\/ol><p class=\"nord-text text-base leading-normal text-black\">Other common types of malware include AZORult, CryptBot, Taurus, and Meta.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1500x680\/7573943458\/malware-research-inner-asset-03-2x.png\/m\/1200x0\/filters:quality(75)\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1500x680\/7573943458\/malware-research-inner-asset-03-2x.png\/m\/640x0\/filters:quality(75) 640w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/7573943458\/malware-research-inner-asset-03-2x.png\/m\/750x0\/filters:quality(75) 750w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/7573943458\/malware-research-inner-asset-03-2x.png\/m\/1080x0\/filters:quality(75) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1500x680\/7573943458\/malware-research-inner-asset-03-2x.png\/m\/1200x0\/filters:quality(75) 1200w\" alt=\"incidents by malware type graph\" width=\"1500\" height=\"680\" data-nimg=\"1\" \/><\/p><p class=\"nord-text text-base leading-normal text-black\">Why have these malware types become more widespread? One reason might be that they are easier to create and deploy. Furthermore, using these types of malicious software may offer greater financial rewards for cybercriminals compared to other methods. The popularity of specific malware is also influenced by the constantly evolving landscape of cyber threats, technological vulnerabilities, and shifts in the digital environment.<\/p><h3 id=\"4-tens-of-millions-of-credential-records-were-stolen-from-social-media-and-entertainment-platforms\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">4. Tens of millions of credential records were stolen from social media and entertainment platforms<\/h3><p class=\"nord-text text-base leading-normal text-black\">Given the widespread practice of storing sensitive data on cloud servers, email accounts, and social media, it comes as no surprise that these platforms are prime targets for cybercriminals. However, the actual numbers will raise a few eyebrows.<\/p><p class=\"nord-text text-base leading-normal text-black\">So brace yourself for some eye-opening statistics as we explore the top domains associated with the biggest number of data theft incidents caused by malware and unveil the staggering number of records that fell into the wrong hands.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>Most targeted domains*: <\/b><\/p><ol class=\"leading-loose List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">accounts.google.com \u2013 8.2 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">facebook.com \u2013 5.9 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">login.live.com \u2013 5.6 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">m.facebook.com \u2013 3.2 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Instagram.com \u2014 3.1 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">discord.com \u2013 3.1 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">netflix.com \u2013 3 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">roblox.com \u2013 2.8 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">com.facebook.katana \u2013 2.5 million of stolen<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">records amazon.com \u2013 2.4 million of stolen<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">records paypal.com \u2013 2.3 million of stolen records<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">twitter.com \u2013 2.3 million of stolen records<\/p><\/li><\/ol><p class=\"nord-text text-base leading-normal text-black\">The information above indicates a consistent trend of cybercriminals stealing data from widely used digital platforms. This highlights the necessity for enhanced cybersecurity measures to ensure secure data storage and access.<\/p><p class=\"nord-text text-base leading-normal text-black\">However, it is ultimately up to the user to take proactive steps to actively educate themselves on protecting their credentials and take appropriate follow-up measures.<\/p><p class=\"nord-text text-base leading-normal text-black\"><i>*NordPass is not endorsed by, maintained, sponsored by, affiliated, or in any way associated with the owners of the mentioned domains. Domains are listed solely for the purpose of accurately reporting information related to cybersecurity incident data. <\/i><\/p><div id=\"Inner content blog banner - Premium\"><section class=\"overflow-hidden relative\"><div class=\"rounded-3 bg-custom-grey-light pt-8 px-4 pb-6 md:px-6 md:py-6\"><div class=\"nord-row row justify-start items-center\"><div class=\"nord-col self-center md:col-3 mb-6 md:mb-0\"><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto md:hidden\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 640w, https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 750w, https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 1080w, https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 1200w\" alt=\"lock icon\" width=\"120\" height=\"120\" data-nimg=\"1\" \/><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto hidden md:block\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 640w, https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 750w, https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 1080w, https:\/\/a.storyblok.com\/f\/157611\/149x137\/ce37df0602\/banner-visual-lock.svg 1200w\" alt=\"lock icon\" width=\"160\" height=\"160\" data-nimg=\"1\" \/><\/div><div class=\"nord-col md:col-9 text-center md:text-left\"><h2 class=\"nord-text text-h4 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Level up your online security<\/h2><div class=\"w-full mb-3\">\u00a0<\/div><p class=\"nord-text text-base leading-normal text-black\">Store and manage your digital valuables safely<\/p><div class=\"w-full mb-4 md:mb-6\">\u00a0<\/div><p><a class=\"nord-button focus:outline-none font-medium align-bottom rounded-1 select-none transition-colors ease-out duration-250 cursor-pointer nord-button--medium border text-white nord-button--v-contained nord-button--c-teal bg-teal border-teal font-medium inline-block relative text-center w-full md:w-auto Button_rounded___wTqY\" style=\"min-width: 180px;\" href=\"\/plans\/\">Start Free Trial<\/a><\/p><\/div><\/div><\/div><\/section><\/div><h2 id=\"what-you-can-do-to-protect-yourself-from-malware-threats\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What you can do to protect yourself from malware threats<\/h2><p class=\"nord-text text-base leading-normal text-black\">First and foremost, protection against malware \u2013 whether for individual users or entire organizations \u2013 relies on awareness and a sense of responsibility for implementing appropriate security measures for systems, platforms, and data in use. Therefore, everyone needs to take proactive steps in this regard, as without such engagement, achieving adequate protection becomes challenging.<\/p><p class=\"nord-text text-base leading-normal text-black\">Here are four actions you can take to enhance your protection against malware:<\/p><ol class=\"leading-loose List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Raise awareness:<\/b> By learning about different types of malware and sharing this knowledge with others, you can effectively reduce the risk of being targeted. Awareness campaigns, for example, play a crucial role in helping people identify suspicious activities like phishing emails or dubious website links.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Use antivirus software:<\/b> Using antivirus software is essential for detecting and removing malware from your devices. A good antivirus constantly scans your system for known malware signatures and behaviors, offering a vital layer of defense against various threats.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Update your systems regularly: <\/b>Regularly updating your operating system, applications, and firmware is vital as it addresses known security vulnerabilities frequently targeted by malware. These updates typically include security patches and bug fixes, bolstering your system&#8217;s defenses against potential cyber threats.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Use a password manager:<\/b> Using a password manager allows you to create and store unique, complex passwords for each of your accounts, lowering the risk of unauthorized access. By securely storing your credentials, password managers help prevent malware from stealing your login information and accessing sensitive accounts.<\/p><\/li><\/ol><h2 id=\"how-nordpass-can-help-protect-your-sensitive-data-and-account-access\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How NordPass can help protect your sensitive data and account access<\/h2><p class=\"nord-text text-base leading-normal text-black\">NordPass is a cybersecurity solution designed to help businesses and individuals protect their data and minimize the threat of malware attacks. How so?<\/p><p class=\"nord-text text-base leading-normal text-black\">First, NordPass is an end-to-end encrypted credentials manager. This means you can use it to securely generate, store, manage, and share passwords, passkeys, credit card information, and personal data \u2014 and do so knowing that they are all protected by advanced encryption algorithms.<\/p><p class=\"nord-text text-base leading-normal text-black\">Second, NordPass facilitates the implementation of single sign-on (SSO) and multi-factor authentication (MFA). You can use it to present employees with a convenient yet highly secure method of logging in to the company accounts.<\/p><p class=\"nord-text text-base leading-normal text-black\">Third, organizations can use NordPass as an identity and access management (IAM) tool to control and monitor access to company resources in real time. In other words, with NordPass, a company can see exactly who accessed what and when and manage access privileges with ease.<\/p><p class=\"nord-text text-base leading-normal text-black\">In addition, NordPass goes the extra mile by utilizing a <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/support.nordpass.com\/hc\/en-us\/articles\/360002378458-What-is-a-Master-Password-and-why-it-s-important-#:~:text=The%20Master%20Password%20is%20the,vault%20with%20your%20Master%20Password.\" data-link=\"NordUIlink\">Master Password<\/a>. Most browser password managers lack this feature, making them more susceptible to malware attacks.<\/p><p class=\"nord-text text-base leading-normal text-black\">Naturally, our product is equipped with many other features like <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/features\/autofill-autosave\/\" data-link=\"NordUIlink\">Autofill<\/a>, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/have-i-been-hacked\/\" data-link=\"NordUIlink\">Data Breach Scanner<\/a>, and <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/features\/password-health-report\/\">Password Health<\/a>, all designed to enhance your cybersecurity and help defend against malware-related attacks. If you&#8217;re interested in exploring these features and gaining a comprehensive understanding of our platform, we invite you to visit our <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/\" data-link=\"NordUIlink\">website<\/a>.<\/p><p class=\"nord-text text-base leading-normal text-black\">Stay safe!<\/p><\/div><div class=\"h-full flex flex-col\"><div class=\"mb-3\"><div class=\"w-full mb-6\">\u00a0<\/div><\/div><div class=\"mb-3\"><h4 class=\"nord-text text-h5 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Methodology<\/h4><\/div><div class=\"\"><p class=\"nord-text text-small leading-normal text-black\">NordPass, in partnership with third-party researchers, analyzed various sets of credentials sourced from a 6.6TB database. The study involved examining the source website and the type of malware used to steal the data (such as Redline, Vidar, Taurus, Raccoon, Azorult, and Cryptbot). No personal data was acquired or purchased by NordPass to conduct this study.<\/p><\/div><\/div><\/div><\/section><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>If you ask Google or AI what malware is, they&#8217;ll  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[1131,1272,974],"class_list":["post-77354","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-nordpass","tag-1272","tag-nord-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware Threat Research 2020-2023 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/malware-threat-research\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Threat Research 2020-2023 - Version 2\" \/>\n<meta property=\"og:description\" content=\"If you ask Google or AI what malware is, they&#8217;ll [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/malware-threat-research\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-17T04:10:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/malware-threat-research-2020-2023\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Malware Threat Research 2020-2023\",\"datePublished\":\"2024-04-17T04:10:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/malware-threat-research-2020-2023\\\/\"},\"wordCount\":1902,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/40a3c43f58\\\/malware-research-and-trend-1062x597-2x.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"NordPass\",\"2024\",\"Nord Security\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/malware-threat-research-2020-2023\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/\",\"name\":\"Malware Threat Research 2020-2023 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/40a3c43f58\\\/malware-research-and-trend-1062x597-2x.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-04-17T04:10:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/40a3c43f58\\\/malware-research-and-trend-1062x597-2x.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/40a3c43f58\\\/malware-research-and-trend-1062x597-2x.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/malware-threat-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Threat Research 2020-2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Threat Research 2020-2023 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/malware-threat-research\/","og_locale":"zh_HK","og_type":"article","og_title":"Malware Threat Research 2020-2023 - Version 2","og_description":"If you ask Google or AI what malware is, they&#8217;ll [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/malware-threat-research\/","og_site_name":"Version 2","article_published_time":"2024-04-17T04:10:36+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"11 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/04\/malware-threat-research-2020-2023\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Malware Threat Research 2020-2023","datePublished":"2024-04-17T04:10:36+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/04\/malware-threat-research-2020-2023\/"},"wordCount":1902,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)","keywords":["NordPass","2024","Nord Security"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/04\/malware-threat-research-2020-2023\/","url":"https:\/\/nordpass.com\/blog\/malware-threat-research\/","name":"Malware Threat Research 2020-2023 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-04-17T04:10:36+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/malware-threat-research\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/40a3c43f58\/malware-research-and-trend-1062x597-2x.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/malware-threat-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Malware Threat Research 2020-2023"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-k7E","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/77354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=77354"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/77354\/revisions"}],"predecessor-version":[{"id":77358,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/77354\/revisions\/77358"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=77354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=77354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=77354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}