Lessons learned from 2022
#1
Information 
Quote:
[Image: Logo_VT_Horizontal.png]



One of our goals is sharing with the security community as much as we learn from VirusTotal’s data to help stop, monitor and mitigate malicious activity. When looking back to 2022 we observe different interesting trends; we decided to go deeper into the three most interesting ones: evolution of distribution vectors, trending malware artifacts and toolsets, and threat landscape evolution.

Distribution vector evolution

During 2022 we detected changes in the way malware is distributed. First, the number of URLs used in phishing attacks has doubled since 2021, and the number of emails distributing any kind of malware increased from 11.4% in 2021 to 26.5% in 2022, that is a 132% increase.

This seems to correlate with the huge increase (almost doubled compared to 2021) of malicious PDF files hosted in phishing URLs. Probably this combination was one of the main distribution vectors of fraudulent content in 2022.

[Image: NyRtapHq1WJ9x3zVla4S9Foh_JZdQ43ensH-5rZU...chw=s16000]
At the same time, the number of emails attaching malware files increased, mostly due to spam campaigns distributing common malware (like lovgate and noon).

We observed a high peak of formbook and AgentTesla samples in January 2022:

[Image: rohOeHD7Af0HalP2Y6FkEtp8U5PDeHI8wVP5a7fh...-6M=s16000]

Additionally, the adoption of exploits keeps its growing trend for the last five years, however at a lower rate than it did in 2021. Indeed, in 2021 we observed a peak in the number of different CVEs exploited by new malware samples.

 [Image: iTE1DiVtm5cXu86rkdyRrQ8BB8NzLVzzBclVbzXw...h2w=s16000]Total of

CVEs exploited by new samples per year Overall, the count of new malware samples exploiting CVEs hasn't changed much during the last three years. Only 5% of the CVEs tagged in 2022 were related to vulnerabilities published the same year, compared to a 7.8% in 2021. The following graph shows the 2022's top ten exploited CVEs by number of samples.

 [Image: XiXrVp99L89aq18Uqksuluduzj0Ys-QIFzQpkSjL...U9E=s16000]

CVE-2022-30190 (aka Follina) was the most exploited CVE in 2022. This vulnerability affects the Microsoft Windows Support Tool and allows attackers to remotely execute code in the compromised machine. We wrote about this vulnerability some months ago in our blog.

Additionally, we observed an increase in the number of email, android, javascript and xml file types exploiting vulnerabilities. Some of the most popular CVEs for these file types in 2022 were CVE-2017-11882 (20 year old MS Office vulnerability patched in 2017), CVE-2017-0199 (MS Office/WordPad RCE vulnerability) and the most recent CVE-2022-30190 (aka Follina). This might indicate the adoption of Follina into kits used to weaponize attachments that would still keep the old exploits.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
QOwnNotes 19.1.6
25.5.9   The p...Kool — 15:38
XYplorer
What's new in Rele...Kool — 15:30
FastestVPN PRO Lifetime Plan 15 Logins +...
Link: https://fastes...siriyax320 — 10:40
F-Secure 25.5
Version 25.5 ​R...harlan4096 — 09:31
uBOLite_2025.601.2131
uBOLite_2025.601.2...harlan4096 — 08:54

[-]
Birthdays
Today's Birthdays
avatar (50)nteriageda
Upcoming Birthdays
avatar (47)BrantgoG
avatar (41)tapedDow
avatar (49)eapedDow
avatar (46)Carlosskake
avatar (48)rapedDow
avatar (43)Johnsonsyday
avatar (48)Groktus
avatar (40)efodo
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (50)smudloquask
avatar (45)benchJem
avatar (38)biobdam
avatar (41)zacforat
avatar (46)NemrokReks
avatar (49)Jasoncedia
avatar (37)Barrackleve
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (47)vadimTob
avatar (37)leannauu4
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>