OpenText Report Shines Spotlight on Malware Infection Rates
OpenText发布的2025网络安全威胁报告显示,商业PC恶意软件感染率为2.39%,87%为变种以规避检测,43%设备被重复感染。恶意软件多藏于AppData、Temp文件夹及下载文件夹,主要通过.zip文件经邮件附件传播,攻击者还利用QR码、电话导向及合法服务进行钓鱼攻击,勒索软件趋势转向单纯窃取数据以索取赎金,对企业构成严峻挑战。 2025-5-9 19:27:52 Author: securityboulevard.com(查看原文) 阅读量:12 收藏

A 2025 cybersecurity threat report based on analysis of data collected from tens of millions of endpoints by OpenText shows that the malware infection rate for business PCs now stands at 2.39%, with 87% of that malware being based on some type of variant that was specifically created to evade detection by cybersecurity tools.

More challenging still, 43% of the business endpoints infected were found to have been subsequently reinfected.

Tyler Moffitt, a senior security analyst at OpenText Cybersecurity, said infection rates of business PCs in regions where there is a significant amount of instability are seeing much higher infection rates due to attacks linked to cybercriminal syndicates allied with Russia.

Techstrong Gang Youtube

AWS Hub

That malware is most commonly found in AppData (27%), a Temp folder (21%) and downloads (12%). While email attachments remain a popular malware delivery method, the majority—53%—now take the form of .zip files, followed by 20% using .htm, 7.5% using .pdf, and 5.6% each for .doc/x and .rar files. Most businesses are also still running Windows 10 (65%), compared to 25% running Windows 11, the report finds

As end users become more wary of attachments, threat actors are finding more creative methods to conceal their attacks. Recent innovations include QR codes opening links to malicious websites, known as quishing; more convincing telephone-oriented attack delivery (TOAD), in which branded email messages urge the recipients to call a number regarding an overdue account or other serious matter; and the use of legitimate services to conduct phishing attacks.

This latter tactic, known as “living off the land” (LotL) phishing, has become especially popular over the last year. Cybercriminals are using the URL of a legitimate service to redirect users to a malicious site or to host the phishing payload itself. Because the service is also used for legitimate business purposes, it can’t be blocklisted.

While the 171.1 million instances of this tactic in 2024 represent a decrease of 14.3% from 2023, there have been sharp increases in the abuse of several services, including Amazon Web Services (AWS), which rose 22.5% to over 13.4 million instances. New entrants in the “Top 10 Abused Services” listed by OpenText for 2024 include List manage (Mailchimp), Canva, and Cloudflare IPFS. Google APIs took the top spot at over 75 million instances, and a separate entry for Google Docs made an appearance as well, with over two million occurrences.

In general, it’s clear that cybercriminals continue to evolve their tactics, said Moffitt. For example, there has been a general increase in the ransomware attacks that simply exfiltrate data rather than going to the trouble of encrypting it. Cybercriminals then demand a ransom payment for keeping that data confidential. An OpenText survey of 1,781 C-level executives, security professionals and security and technical directors conducted last year found that even though 97% acknowledged they can recover data, nearly half (46%) said their organization still decided to make a ransomware payment to prevent data from being exposed on the Dark Web.

The tactics and techniques employed by cybercriminals are constantly evolving. However, as these threats continue to become more sophisticated, the attacks that cybersecurity teams will be asked to thwart are steadily becoming harder to detect.

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/05/opentext-report-shines-spotlight-on-malware-infection-rates/?utm_source=rss&utm_medium=rss&utm_campaign=opentext-report-shines-spotlight-on-malware-infection-rates
如有侵权请联系:admin#unsafe.sh