\n20<\/td>\n | Trojan.OSX.Agent.gen<\/td>\n | 1.88<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n * Unique users who encountered this malware as a percentage of all users of Kaspersky security products for macOS who were attacked.<\/em><\/p>\nAdware remained the most widespread threat to macOS users. In addition to that, we frequently came across all kinds of system “cleaners” and “optimizers”, many of these containing highly annoying ads or classic scams, where users were offered to buy solutions to problems that did not exist.<\/p>\n Geography of threats for macOS<\/h3>\n\u0422\u041e\u0420 10 countries\/territories by share of attacked users<\/strong><\/p>\n\n\n\n<\/td>\n | Country\/territory*<\/strong><\/td>\n%**<\/strong><\/td>\n<\/tr>\n\n1<\/td>\n | Italy<\/td>\n | 1.43<\/td>\n<\/tr>\n | \n2<\/td>\n | Spain<\/td>\n | 1.39<\/td>\n<\/tr>\n | \n3<\/td>\n | France<\/td>\n | 1.37<\/td>\n<\/tr>\n | \n4<\/td>\n | Russian Federation<\/td>\n | 1.29<\/td>\n<\/tr>\n | \n5<\/td>\n | Mexico<\/td>\n | 1.20<\/td>\n<\/tr>\n | \n6<\/td>\n | Canada<\/td>\n | 1.18<\/td>\n<\/tr>\n | \n7<\/td>\n | United States<\/td>\n | 1.16<\/td>\n<\/tr>\n | \n8<\/td>\n | United Kingdom<\/td>\n | 0.98<\/td>\n<\/tr>\n | \n9<\/td>\n | Australia<\/td>\n | 0.87<\/td>\n<\/tr>\n | \n10<\/td>\n | Brazil<\/td>\n | 0.81<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n * Excluded from the rankings are countries\/territories with relatively few users of Kaspersky security solutions for macOS (under 10,000).<\/em> \n** Unique attacked users as a percentage of all users of Kaspersky macOS security products in the country\/territory.<\/em><\/p>\nItaly (1.43%) and Spain (1.39%) became the leaders by number of attacked users, as France (1.37%), Russia (1.29%) and Canada (1.18%) lost a few percentage points. Overall, the percentage of attacked users in the TOP 10 countries did not change much.<\/p>\n IoT attacks<\/h2>\nIoT threat statistics<\/h3>\nIn Q3\u00a02023, a majority of the devices that attacked Kaspersky honeypots still used the Telnet protocol, but its popularity decreased somewhat from the previous quarter.<\/p>\n \n\n\nTelnet<\/td>\n | 69.2%<\/td>\n<\/tr>\n | \nSSH<\/td>\n | 30.8%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n Distribution of attacked services by number of unique IP addresses of attacking devices, Q1 2023<\/em><\/p>\nIn terms of session numbers, Telnet accounted for the absolute majority.<\/p>\n \n\n\nTelnet<\/td>\n | 97.8%<\/td>\n<\/tr>\n | \nSSH<\/td>\n | 2.2%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n Distribution of cybercriminal working sessions with Kaspersky traps, Q1 2023<\/em><\/p>\nTOP 10 countries\/territories as sources of SSH attacks<\/strong><\/p>\n\n\n\nCountry\/territory<\/strong><\/td>\n%* (Q4 2022)<\/strong><\/td>\n%* (Q1 2023)<\/strong><\/td>\n<\/tr>\n\nTaiwan<\/td>\n | 1.60<\/td>\n | 12.13<\/td>\n<\/tr>\n | \nUnited States<\/td>\n | 19.11<\/td>\n | 12.05<\/td>\n<\/tr>\n | \nSouth Korea<\/td>\n | 3.32<\/td>\n | 7.64<\/td>\n<\/tr>\n | \nMainland China<\/td>\n | 8.45<\/td>\n | 6.80<\/td>\n<\/tr>\n | \nBrazil<\/td>\n | 5.10<\/td>\n | 5.08<\/td>\n<\/tr>\n | \nIndia<\/td>\n | 6.26<\/td>\n | 4.45<\/td>\n<\/tr>\n | \nGermany<\/td>\n | 6.20<\/td>\n | 4.00<\/td>\n<\/tr>\n | \nVietnam<\/td>\n | 2.18<\/td>\n | 3.95<\/td>\n<\/tr>\n | \nSingapore<\/td>\n | 6.63<\/td>\n | 3.63<\/td>\n<\/tr>\n | \nRussian Federation<\/td>\n | 3.33<\/td>\n | 3.36<\/td>\n<\/tr>\n | \nOther<\/td>\n | 37.81<\/td>\n | 36.91<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n * Unique IP addresses located in a country\/territory as a percentage of all unique IP addresses where SSH attacks on Kaspersky honeypots originated.<\/em><\/p>\nThe APAC countries\/territories and the U.S. remained the main sources of SSH attacks in Q1 2023.<\/p>\n TOP 10 countries\/territories as sources of Telnet attacks<\/strong><\/p>\n\n\n\nCountry\/territory<\/strong><\/td>\n%* (Q4 2022)<\/strong><\/td>\n%* (Q1 2023)<\/strong><\/td>\n<\/tr>\n\nMainland China<\/td>\n | 46.90<\/td>\n | 39.92<\/td>\n<\/tr>\n | \nIndia<\/td>\n | 6.61<\/td>\n | 12.06<\/td>\n<\/tr>\n | \nTaiwan<\/td>\n | 6.37<\/td>\n | 7.51<\/td>\n<\/tr>\n | \nBrazil<\/td>\n | 3.31<\/td>\n | 4.92<\/td>\n<\/tr>\n | \nRussian Federation<\/td>\n | 4.53<\/td>\n | 4.82<\/td>\n<\/tr>\n | \nUnited States<\/td>\n | 4.33<\/td>\n | 4.30<\/td>\n<\/tr>\n | \nSouth Korea<\/td>\n | 7.39<\/td>\n | 2.59<\/td>\n<\/tr>\n | \nIran<\/td>\n | 1.05<\/td>\n | 1.50<\/td>\n<\/tr>\n | \nPakistan<\/td>\n | 1.40<\/td>\n | 1.41<\/td>\n<\/tr>\n | \nKenya<\/td>\n | 0.06<\/td>\n | 1.39<\/td>\n<\/tr>\n | \nOther<\/td>\n | 18.04<\/td>\n | 19.58<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n * Unique IP addresses located in a country\/territory as a percentage of all unique IP addresses where Telnet attacks on Kaspersky honeypots originated.<\/em><\/p>\nMainland China (39.92%) remained the largest source of Telnet attacks, with India’s (12.06%) and Kenya’s (1.39%) contributions increasing significantly. The share of attacks that originated in South Korea (2.59%) decreased.<\/p>\n TOP 10 threats delivered to IoT devices via Telnet<\/strong><\/p>\n\n\n\n<\/td>\n | Verdict<\/strong><\/td>\n%*<\/strong><\/td>\n<\/tr>\n\n1<\/td>\n | Trojan-Downloader.Linux.NyaDrop.b<\/td>\n | 41.39%<\/td>\n<\/tr>\n | \n2<\/td>\n | Backdoor.Linux.Mirai.b<\/td>\n | 18.82%<\/td>\n<\/tr>\n | \n3<\/td>\n | Backdoor.Linux.Mirai.cw<\/td>\n | 9.63%<\/td>\n<\/tr>\n | \n4<\/td>\n | Backdoor.Linux.Mirai.ba<\/td>\n | 6.18%<\/td>\n<\/tr>\n | \n5<\/td>\n | Backdoor.Linux.Gafgyt.a<\/td>\n | 2.64%<\/td>\n<\/tr>\n | \n6<\/td>\n | Backdoor.Linux.Mirai.fg<\/td>\n | 2.25%<\/td>\n<\/tr>\n | \n7<\/td>\n | Backdoor.Linux.Mirai.ew<\/td>\n | 1.89%<\/td>\n<\/tr>\n | \n8<\/td>\n | Trojan-Downloader.Shell.Agent.p<\/td>\n | 1.77%<\/td>\n<\/tr>\n | \n9<\/td>\n | Backdoor.Linux.Gafgyt.bj<\/td>\n | 1.24%<\/td>\n<\/tr>\n | \n10<\/td>\n | Trojan-Downloader.Linux.Mirai.d<\/td>\n | 1.23%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n * Share of each threat delivered to infected devices as a result of a successful Telnet attack out of the total number of delivered threats.<\/em><\/p>\nAttacks via web resources<\/h2>\nThe statistics in this section are based on Web Anti-Virus, which protects users when malicious objects are downloaded from malicious\/infected web pages. Cybercriminals create these sites on purpose; they can infect hacked legitimate resources as well as web resources with user-created content, such as forums.<\/em><\/p>\nCountries\/territories that serve as sources of web-based attacks: TOP 10<\/h3>\nThe following statistics show the distribution by country\/territory of the sources of internet attacks blocked by Kaspersky products on user computers (web pages with redirects to exploits, sites hosting malicious programs, botnet C&C centers, etc.). Any unique host could be the source of one or more web-based attacks.<\/em><\/p>\nTo determine the geographic source of web attacks, the GeoIP technique was used to match the domain name to the real IP address at which the domain is hosted.<\/em><\/p>\nIn Q1 2023, Kaspersky solutions blocked 865,071,227 attacks launched from online resources across the globe. A total of 246,912,694 unique URLs were detected as malicious by Web Anti-Virus.<\/p>\n | | | | | | | | | | | | | | | | |