According to statistics collected by the Dr.Web anti-virus, the total number of threats detected in the first quarter of 2025 increased by 7.23%, compared to the fourth quarter of 2024. At the same time, the number of unique threats decreased by almost a third—27.59%. This suggests that, while increasing the intensity of their attacks, threat actors were using the same malicious and unwanted applications in them more often. Malicious scripts with different functionality, ad-displaying trojans, and adware apps were the most widespread threats.
In email traffic, trojan droppers and downloaders, adware software, malicious scripts, and trojans designed to run various threats on attacked computers were most frequently detected.
Users whose files were affected by encoder trojans had mostly encountered
Trojan.Encoder.35534, Trojan.Encoder.35209, and Trojan.Encoder.35067.
In January, Doctor Web’s virus laboratory
uncovered
an active Monero cryptocurrency mining campaign using many different trojans. To conceal some of them, threat actors utilized steganography,
a technique that allows some data to be hidden within other data—for example, inside images.
At the same time, over the course of the first quarter, our Internet analysts detected an increase in the number of fraudulent websites aimed at stealing Telegram messenger user accounts.
In the mobile threats department, Doctor Web’s specialists observed increased activity on the part of adware trojans and some
banking trojans used to target the Android OS. In addition, they uncovered dozens of new malicious apps on Google Play.
Principal trends in Q1 2025
- Threats were detected on protected devices in increasing numbers.
- The quantity of unique threats used in attacks decreased.
- Phishing sites designed to steal Telegram accounts became more prevalent.
- Several widespread ad-displaying and banking trojan families, used to target the Android operating system, heightened their activity.
- New malware emerged on Google Play.
Network fraud
In Q1 2025, Doctor Web’s Internet analysts observed the emergence of many new phishing websites designed
to steal Telegram messenger user accounts. Among the most common variants were fake login pages and support
pages that informed users about alleged problems due to some violation of the terms of service.
Fake sites of online stores were widespread once again. On these, cybercriminals asked potential victims to log in to their accounts.
A phishing authorization form on a fake website of one Russian online store
Our specialists continued detecting fraudulent sites with all sorts of “great offers”, such as quick or easy ways to make money;
others were about receiving certain gifts, participating in promotions, etc. One of the schemes, for instance, targeted residents
of Great Britain, offering them the chance to obtain “limited edition” transportation cards, which were supposedly dedicated to the
anniversaries of various carriers and would allow them to use public transport services free of charge for a long period of time.
Fraudulent sites offering the chance to obtain “special” First Essex and Oyster transportation cards that allow public transport services to be used for free
Users had to answer several questions and then play a game by opening virtual gift boxes (the “winning” box in such scenarios is hardcoded).
After “winning”, users had to provide personal information and pay £2 to “receive” the promised card. As a result, the victims’ personal
information and money ended up in the hands of threat actors.
A potential victim has allegedly obtained a card successfully from one of the game boxes, and in order to receive it, they must provide personal data and also pay £2
A form for entering bank card details to pay for a non-existent promotional transportation card
Fraudsters continue luring potential victims with all sorts of trading platforms that have “unique” algorithms, including
ones that are supposedly based on artificial intelligence (AI) technologies. At the same time, cybercriminals exploit the
names of famous people and hide behind real companies and services, attributing to themselves a connection with them. One
popular scenario is based on claims that users can make money with the help of certain specialized services from Telegram,
WhatsApp, and other companies.
Some of these fraudulent sites were advertising various AI platforms, such as Telegram AI and WHATSAPP AI, which allegedly
could help users make at least €14,000 per month, thanks to an “automated trading system”:
Other variants exploited the theme of trading bots, which are commonly passed off as instruments created by the messengers’ owners themselves.
One website, for instance, promised that “Pavel Durov’s bot” Telegram.AI would allow users to earn €2,500+ monthly; and another one offered the
option to use the WhatsApp Bot, supposedly created by Mark Zuckerberg, to make up to €500 per day.
Another scam website offered users the option to register on a “Telegram platform” that allegedly runs directly from a smartphone browser,
automatically trades shares of global companies, and earns €10,000 per month:
One website promised “every Europe resident” an income starting at €5,000 per month with the help of certain AI-based algorithms from the WhatsApp Company:
Scam platform “The wealth formula” (“Formule Bohatstvi” in Czech), with its fake AI-based trading system, is a popular variation of this fraudulent scheme.
It supposedly makes trades in a split second by analyzing huge amounts of data. Different sites of this non-existent system invite visitors to watch an
informational video and register an account for consultations in the “anti-crisis solutions office”. The fraudsters are mainly targeting Europeans—Czech
users in particular— who are promised an income of €1,000 per day “for life”. To access the system, potential victims are required to make a minimum deposit of €250.
Other similar scenarios, such as generating income using various specialized software, also remain popular.
One such website invited Czech users to make thousands of crowns per day with “the world’s most intelligent cryptographic software”:
Another scam Internet portal promised earnings of over 4.7 million crowns monthly using certain trading software known as «10K EVERY DAY APP»:
At the same time, users continued encountering fake investment-themed websites targeting residents of different countries.
For example, for an audience from Kazakhstan, fraudsters prepared yet another platform for earning passive income through oil and gas trading:
Many other sites offered the opportunity to “earn as much as possible” by trading shares of companies in Kazakhstan, Russia, China, and other countries:
Russian and Kyrgyz residents also encountered similar websites; on these, users allegedly could make money by trading oil and gas:
And one scam Internet resource offered Romanian users the chance to join the BRUA pipeline project, promising 3,000 lei per week as passive income:
Sites that promise government support to the population in the form of benefits, social payments, etc., remain a lure for potential victims.
Threat actors, for instance, tried to bait Russian users with more fake Gosuslugi web portals. One asked them to provide personal
data—supposedly to participate in an oil and gas company payment program and also to receive bonuses from the government:
Another scam site promised every Kazakhstan resident assistance in the form of money payments. It was allegedly organized on behalf of a large bank to “avoid problems and disasters”:
Fake investing service websites, including those supposedly belonging to Russian credit organizations, are still a problem.
Many of them mimic real bank websites in order to confuse potential victims as much as possible.
Examples of fake Russian bank websites offering access to “investing services”
Find out more about Dr.Web non-recommended sites