Financial cyberthreats in 2023

Financial cyberthreats in 2023

Money is what always attracts cybercriminals. A significant share of scam, phishing and malware attacks is about money. With trillions of dollars of digital payments made every year, it is no wonder that attackers target electronic wallets, online shopping accounts and other financial assets, inventing new techniques and reusing good old ones. Amid the current threat landscape, Kaspersky has conducted a comprehensive analysis of the financial risks, pinpointing key trends and providing recommendations to effectively mitigate risks and enhance security posture.


Methodology


In this report, we present an analysis of financial cyberthreats in 2023, focusing on banking Trojans and phishing pages that target online banking, shopping accounts, cryptocurrency wallets and other financial assets. To gain an understanding of the financial threat landscape, we analyzed anonymized data on malicious activities detected on the devices of Kaspersky security product users and consensually provided to us through the Kaspersky Security Network (KSN).


Key findings


Phishing


Financial phishing accounted for 27.32% of all phishing attacks on corporate users and 30.68% of phishing attacks on home users.
Online shopping brands were the most popular lure, accounting for 41.65% of financial phishing attempts.
PayPal phishing accounted for 54.78% of pages targeting electronic payment system users.
Cryptocurrency phishing saw a 16% year-on-year increase in 2023, with 5.84 million detections compared to 5.04 million in 2022.

PC malware


The number of users affected by financial malware for PCs dropped by 11% from 2022.
Ramnit and Zbot were the prevalent malware families, together targeting over 50% of affected users.
Consumers remained the primary target of financial cyberthreats, accounting for 61.2% of attacks.

Mobile malware


The number of Android users attacked by banking malware increased by 32% compared to the previous year.
Agent ..

Support the originator by clicking the read the rest link below.