Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Doctor Web’s January 2024 virus activity review

March 29, 2024

An analysis of Dr.Web anti-virus detection statistics for January 2024 revealed a 95.66% increase in the total number of threats detected, compared to December 2023. At the same time, the number of unique threats increased by 2.15%. Unwanted adware software and adware trojans were most frequently detected as were malicious programs distributed with other threats to make the latter more difficult to detect. In mail traffic, malicious scripts and phishing documents were most commonly observed.

The number of user requests to decrypt files affected by encoder trojans increased by 22.84%, compared to the last month of 2023. Victims of these malicious programs again most frequently encountered Trojan.Encoder.26996, Trojan.Encoder.3953, and Trojan.Encoder.37369. Their share of the total number of incidents recorded was 17.98%, 12.72%, and 3.51%, respectively.

In January 2024, Doctor Web’s specialists discovered a new family of unwanted adware for the Android operating system. Dubbed Adware.StrawAd, it was integrated into several programs distributed via Google Play. Our malware analysts uncovered many new Android.FakeApp trojan apps on Google Play as well; cybercriminals use these apps for fraudulent purposes.

Principal trends in January

  • An increase in the total number of threats detected
  • An increase in the number of user requests to decrypt files affected by encoder trojans
  • The emergence of new threats on Google Play

According to Doctor Web’s statistics service

The most common threats in January:

Adware.Downware.20091
Adware that often serves as an intermediary installer of pirated software.
Trojan.BPlug.3814
The detection name for a malicious component of the WinSafe browser extension. This component is a JavaScript file that displays intrusive ads in browsers.
Adware.Siggen.33194
The detection name for a freeware browser that was created with an Electron framework and has a built-in adware component. This browser is distributed via various websites and loaded onto users’ computers when they try downloading torrent files.
Trojan.AutoIt.1224
The detection name for a packed version of the Trojan.AutoIt.289 malicious app, written in the AutoIt scripting language. This trojan is distributed as part of a group of several malicious applications, including a miner, a backdoor, and a self-propagating module. Trojan.AutoIt.289 performs various malicious actions that make it difficult for the main payload to be detected.
Adware.SweetLabs.5
An alternative app store and an add-on for Windows GUI (graphical user interface) from the creators of “OpenCandy” adware.

Statistics for malware discovered in email traffic

JS.Inject
A family of malicious JavaScripts that inject a malicious script into the HTML code of webpages.
Exploit.CVE-2018-0798.4
An exploit designed to take advantage of Microsoft Office software vulnerabilities and allow an attacker to run arbitrary code.
Trojan.Inject4.30867
A trojan designed to inject malicious code into the processes of other programs.
Trojan.Siggen24.7712
The detection name for malicious programs of various functionality.
LNK.Starter.56
The detection name for a shortcut that is crafted in a specific way. This shortcut is distributed through removable media, like USB flash drives. To mislead users and conceal its operation, its default icon is a disk. When launched, it executes malicious VBS scripts from a hidden directory located on the same drive as the shortcut itself.

Encryption ransomware

In January 2024, the number of requests made to decrypt files affected by encoder trojans increased by 22.84%, compared to December 2023.

The most common encoders of January:

Trojan.Encoder.26996 — 17.98%
Trojan.Encoder.3953 — 12.72%
Trojan.Encoder.37369 — 3.51%
Trojan.Encoder.35534 — 3.51%
Trojan.Encoder.30356 — 2.63%

Dangerous websites

Over the course of the first month of 2024, Doctor Web’s malware analysts discovered more fraudulent finance-themed websites. These attracted potential victims by offering them the opportunity to become investors or to make money using certain supposedly profitable platforms. Malicious actors pass off such sites as official Internet resources of famous companies, like banks and oil and gas sector firms, to name a few. For this, fraudsters copy or use similar logos, names, and color schemes.

On such sites, visitors are asked to answer several questions and then to provide their personal data (first and last name, mobile phone number, email address, etc.) to “access” the service. All this confidential information may end up in third-party hands and could subsequently be used for illegal purposes.

The screenshot below depicts an example of one such fraudulent website. It informs the visitor that every Russian citizen can allegedly make 150,000 rubles per month. To start “earning money”, the user must provide their contact details.

Next, to “access” the investing platform, supposedly created in honor of the 100th anniversary of the USSR, the user is asked to take a survey and provide their personal data again:

At the end, the website tells the victim to wait for a call from “one of its employees”:

Malicious and unwanted programs for mobile devices

According to detection statistics collected by Dr.Web for Android, in January, users were most likely to encounter Android.HiddenAds adware trojans, whose activity increased by 54.45%. The number of banking trojan attacks of various families and Android.Spy spyware trojan attacks also increased―by 17.04% and 11.16%, respectively. Meanwhile, the activity of Android.Locker ransomware trojans, on the contrary, decreased―by 0.92%.

Among the threats discovered on Google Play by Doctor Web’s malware analysts were more trojan apps from the Android.FakeApp family. In addition, our specialists detected programs containing the built-in unwanted adware module Adware.StrawAd, which belongs to a new family.

The following January events involving mobile malware are the most noteworthy:

  • An increase in the activity of Android.HiddenAds adware trojans,
  • An increase in the number of banking trojan and spyware trojan attacks,
  • A decrease in the number of ransomware malware attacks,
  • The emergence of new malware and adware on Google Play.

To find out more about the security-threat landscape for mobile devices in January, read our special overview.