Sophos Annual Threat Report appendix: Most commonly encountered malware and exploited software

This supplementary section of our Annual Threat Report presents additional data and insights into the tools utilized by hackers targeting small and medium-sized enterprises (SMEs).

Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software

This supplementary section of our Annual Threat Report presents additional data and insights into the tools utilized by hackers targeting small and medium-sized enterprises (SMEs). To get a comprehensive view of the threat landscape confronting SMEs, refer to our primary report.

Appendix Details:

Most commonly-seen types of malware

SMEs encounter a wide array of data security threats, some of which could serve as precursors to ransomware assaults or lead to other compromises of confidential data. Ransomware stands out as the predominant form of malware identified in Sophos MDR and Sophos Incident Response cases dating back to 2024, with the top 10 types comprising more than 25% of all incidents recorded by MDR and IR during the year. However, these did not encompass the complete scenario, as nearly 60% of MDR incidents featured threats unrelated to ransomware.

 Other12.79% Miner 0.89% Ransomware 1.18% Web/Browser Hijack 3.60% Attack tool/Exploit/EDR Killer 7.95% RAT/Backdoor 15.52% Stealer/Spyware 18.63% Loader/Downloader/Dropper 39.74% 9.13% of all malware was malware-as-a-service

Figure 13: Breakdown of the most frequently observed malware categories in 2024, sourced from customer detection reports

Qilin (ransomware)1.05% Blacksuit (ransomware) 1.23% Faust (ransomware) 1.23% Crytox (ransomware) 1.41% Playcrypt (ransomware) 1.58% Black Basta (ransomware) 1.93% RansomHub (ransomware) 2.28% Gootloader (malware loader/dropper) 2.64% ChromeLoader (malware loader/dropper) 3.51% Fog (ransomware) 3.51% LockBit (ransomware) 4.39% Lumma Stealer (information stealer) 4.57% Akira (ransomware) 4.92% Cobalt Strike (C2 tool) 8.08% Web shell (C2) 9.84%
Figure 14: Compilation of the top 15 malware and attack tools detected in MDR and IR incidents

Tools such as command-and-control systems, malware loaders, remote administration software, and information-stealing malware constitute the majority of the malevolent programs aimed at small businesses (apart from ransomware). These tools, some of which do not fall under the strict definition of malware, are employed in facilitating ransomware and other cybercriminal assaults.

Among the top 10 tools and malware identified in Sophos MDR and IR incidents, only one does not align with this trend: XMRig. This cryptocurrency-mining malware is commonly utilized to passively generate profits prior to its access being sold or exploited by a ransomware perpetrator.

Figure 20: Noteworthy information-stealing malware detections reported by endpoint protection customers
ExMatter (data exfiltration)0.56% Backstab (EDR killer) 0.56% Parcel RAT 0.56% DataGrabber (data exfiltration) 0.56% AsyncRAT 0.56% Sliver attack tool 0.56% Pikabot backdoor 0.56% Brute Ratel C4 0.56% Metasploit exploit framework 1.11% Grixba network scanning tool 1.11% SystemBC proxy/RAT 1.67% XMRIG miner malware 2.22% Web shell 7.22% Cobalt Strike attack tool 10.56%
Figure 16: Prominent non-ransomware malware and tools discovered in Sophos MDR and Sophos Incident Response cases, particularly in incidents related to ransomware

Multipurpose tools

A consistent trend from earlier years is the widespread adoption of commercially available, freeware, and open-source software by hackers to execute ransomware attacks and other illicit activities. In Sophos MDR, these tools are termed as “multipurpose tools,” as they could legitimately exist on networks but are frequently abused by cybercriminals for nefarious ends.

These multipurpose tools differ from “living-off-the-land binaries” (LOLBins) by virtue of being complete applications that are deployed and leveraged as intended by cyber malefactors, as opposed to system-supplied components and scripting engines. Among the tools falling into this category, some are explicitly designed for security testing and are part of red teaming activities—Impacket and Mimikatz being open-source tools created specifically for security researchers. Others, like SoftPerfect Network Scanner and Advanced IP Scanner, are crafted as utilities for network administrators but are misused by cybercriminals for identifying networked devices and open network ports.

Advanced Port Scanner (network discovery)4.92% FileZilla (file exfiltration) 5.10% Rclone (file exfiltration) 7.38% 7-Zip (file archiving/encryption) 7.38% PuTTy (remote command execution) 7.73% ScreenConnect (remote desktop access) 9.14% WinRAR (file archiving/encryption) 9.31% Sophos Uninstall (security tool removal) 9.49% Advanced IP Scanner (network discovery) 10.72% Mimikatz (credential dumping) 11.60% RDPclip (remote/local shared clipboard) 16.70% Impacket (network protocol exploitation) 17.05% AnyDesk (remote desktop access) 17.40% PsExec (remote command execution) 18.28%

Figure 18: Top 9 “multi-use” assault tools in Sophos endpoint detections 

Commercial network access tools are commonly utilized dual-purpose tools encountered in MDR and IR cases:
TypeFrequency LevelRMM (remote machine management) 0.70% RemCom (remote command execution) 0.70% MobaXterm (remote shell) 0.88% VNC (remote desktop) 1.58% NetSupport (remote machine management) 1.76% Cloudflared (Cloudflare network tunneling client) 1.76% Ngrok (web application tunneling) 2.11% WinRM (remote machine management) 2.28% Splashtop (remote desktop) 2.99% TeamViewer (remote desktop) 3.16% Atera (remote machine management) 3.51% OpenSSH (remote shell) 4.04% PuTTy (remote shell) 7.73% ScreenConnect (remote desktop) 9.14% AnyDesk (remote desktop) 17.40% PSExec (remote command execution) 18.28%
Figure 19: Top 15 dual-purpose tools observed in Sophos MDR and Incident Response cases, by frequency
When employing commercial network access tools, assailants commonly misuse trial account licenses or employ pirated licenses for the versions they install on targeted systems. Frequently, this occurs subsequent to initial exploitation through malware droppers, web shells, or other command and control utilities. Sometimes, it is initiated through social manipulation—convincing a specific individual to download and install the tool themselves, as observed in recent Teams “vishing” attacks.
The use of legitimate remote machine management utilities, particularly by ransomware culprits, has been increasing, although commercial IT support tools AnyDesk and ScreenConnect continue to be the most commonly utilized ones observed in Sophos MDR and IR cases. Additionally, the most prevalent tool remains PSExec, a Microsoft “lightweight Telnet substitute” employed for remote command execution and command shell session creation.
Sophos patrons can control their usage via Sophos Central using application control policies—and should restrict any tools not utilized for valid IT support purposes.

Aggression utilities

Aggression utilities such as Cobalt Strike, Sliver, Metasploit, and Brute Ratel are penetration testing tools and not legally malware. Nevertheless, they are frequently utilized to transport malware and control malware attacks. Possessing a well-documented, commercially supported post-exploitation tool like these can greatly benefit cybercriminals who would otherwise need to fashion their own utilities to expand their reach within a targeted entity.
Cobalt Strike remains the most extensively used among these assault tools, detected in eight percent of all incidents and almost 11 percent of ransomware-related occurrences. This represents a notable reduction from 2023, when Cobalt Strike was the third most frequently observed commercial tool utilized in MDR cases, trailing only the AnyDesk and PSExec remote access tools. Sliver and Metasploit-based tools, available as open-source, are encountered even less frequently, and Brute Ratel usage by cybercriminals remains extremely scarce.

Data pilferers

Figure 20: Top data-stealing malicious software detections reported by endpoint protection clients
Stealing data malicious software frequently serves as the initial phase in the access…

The playbook of a middleman, providing keys, biscuits, and other details that can be utilized for financial deceit, corporate email manipulation, and malware assaults, amid alternative strategies.

Lumma Stealer, traded on Russian-speaking channels as a Malware-as-a-Service (MaaS), emerged as the most prevalent information snatcher in MDR occurrences and second in comprehensive endpoint detection notifications. A significant Lumma Stealer campaign that commenced in October resulted in it becoming the most documented snatcher in the final quarter of 2024, surpassing last year’s MaaS snatcher champion RaccoonStealer (which unveiled a fresh edition in 2024 post its framework disturbance) and overshadowing Strela Stealer by the conclusion of the year (which skyrocketed through the ranks in 2023; hitting its peak early in 2024 but waning in the latter part of the year). No MDR incidents monitored in 2024 involved Strela Stealer.

A chart showing a histogram of Lumma Stealer detections, with a majority of detections occurring in October and November of 2024.

Figure 21: Lumma Stealer behavior in 2024 as seen in client endpoint identifications

A histogram showing a peak of Lumma Stealer events in November
Figure 22: Lumma Stealer connected MDR occurrences in 2024
A histogram showing spikes of Strela Stealer detections in February, March and July of 2024.
Figure 23: Strela Stealer behavior in 2024 as perceived in client endpoint identifications

Initially traced in August 2022, Lumma Stealer is speculated to be a descendant of Mars Stealer, another data snatcher allegedly of Russian lineage. This snatcher predominantly aims at cryptocurrency wallets, browser session biscuits, browser dual-factor authentication extensions, stored File Transfer Protocol server addresses and credentials, alongside additional user and system details.

Similar to some other data snatchers (such as Raccoon Stealer), Lumma Stealer can also be employed to distribute additional malware—either through initiating executables or PowerShell scripts, or by loading malevolent DLLs from its particular process. Typically, Lumma Stealer is dispensed from a  compromised website (frequently a counterfeit CAPTCHA web page) as a download that victims are redirected to via malvertising.

Lumma Stealer is usually related to broader cybercriminal actions. Another MaaS snatcher retailed on Russian-language forums, StealC, displayed a significantly higher correlation to ransomware occurrences. Launched in January 2023, it has been tagged by investigators as a RaccoonStealer and Vidar replica.

Conspicuous regionally is Mispadu Stealer, which persists in targeting Latin America (specifically Mexico). In the second quarter of 2024, it ranked as the second-most noticed snatcher, trailing right behind Strela Stealer, with 74% of those detections originating from Mexico.  It has been observed utilizing malicious web and search ads, predominantly masquerading as web promotions for McDonald’s.

Top encrypting threat actors

Stealc (information stealer)0.35% AsyncRAT (RAT with infostealer features) 0.53% More_eggs (RAT that can carry infostealer payload) 0.53% Brute Ratel C4 (red team C2 tool) 0.53% Metasploit (red team command and control tool) 0.70% Remcos (RAT) 0.70% FakeBat /EugenLoader (malware loader) 0.70% Sliver (red team C2 tool) 0.88% XMRIG (cryptocurrency miner) 1.05% SystemBC (proxy and RAT) 1.05% Gootloader (malware loader) 2.64% ChromeLoader (browser malware loader) 3.51% Lumma Stealer (information stealer) 4.57% Cobalt Strike (red team C2 tool with information stealing modules) 8.08% Web shell (malware deployment, command and control) 9.84%
Figure 24: Most commonly recognized ransomware groups across all Sophos endpoint clients
Cicada33011.64% Mimic 1.64% Hunters International 2.19% INC Ransomware 2.19% 8Base 2.73% Qilin 3.28% Blacksuit 3.83% Faust 3.83% Crytox 4.37% Playcrypt 4.92% Black Basta 6.01% RansomHub 7.10% Fog 10.93% LockBit 13.66% Akira 15.30%
Figure 25: The premier ransomware groups encountered in MDR and Incident Response incidents

LockBit, in a way

The most-noticed ransomware group in 2024 was LockBit, however-Due to the ransomware gang that gave rise to it. In February 2024, law enforcement authorities from the US and UK stated they had disrupted the LockBit gang by taking control of the ransomware-as-a-service gang’s servers, detaining two of its members, and bringing charges against another in an indictment. Following this disruption, several offshoots based on the exposed LockBit 3.0 code surfaced in the wild, resulting in a surge of LockBit identifications in early 2024. Nonetheless, by March, detections decreased significantly with a minor uptick in April and early May (although the LockBit syndicate may potentially resurface).

The factions employing LockBit 3.0 frequently utilized EDR terminators and other malware tactics in an effort to deactivate endpoint protection. Often, their initial entry was secured through compromised VPN accounts (partly due to vulnerabilities in the VPN devices themselves), or through the exploitation of credentials acquired from unmanaged devices for remote access.

A histogram of Lockbit variant ransomware detections with a spike in late February 2024.
Figure 26: LockBit variant detections per day, 2024

Akira and Fog

In terms of actual occurrences, the Akira ransomware-as-a-service took the lead in 2024, eventually filling the gap left by LockBit. Initially detected in 2022, Akira assaults intensified later in 2023. Throughout 2024, the group and its affiliates remained consistently operational, peaking in August when Akira represented 17% of the ransomware incidents reported by Sophos clients—doubling from its standing in the initial two quarters of the year. By the end of the year, it still made up 9% of the ransomware detection reports.

There were instances where affiliates linked to Akira were observed by Sophos also deploying other ransomware variations, such as Fog, Frag and Megazord. These attackers (like those mentioned in STAC5881) frequently concentrated on exploiting VPNs for initial access. Typically, Akira’s targets had VPNs lacking multifactor authentication, or had improperly configured VPN gateways that allowed the attackers to gain entry with pilfered credentials or brute force attacks.

While Akira continues to be active, Fog ransomware has at times been utilized as a substitute by affiliates previously associated with Akira, attributing to its position among the top three ransomware families encountered in MDR and IR incidents.

RansomHub

RansomHub emerged as another prominent player in ransomware events in 2024. Despite tying for sixth place in overall identifications, RansomHub was the fourth most frequently observed ransomware variant in actual MDR and IR incidents.

Between February and August 2024, as outlined in a StopRansomware advisory by the Cybersecurity and Infrastructure Security Agency, RansomHub had “encrypted and exfiltrated data from at least 210 victims.” A significant portion of Sophos MDR and IR cases linked to RansomHub surfaced in the latter part of the year, intensifying in November.

A majority of RansomHub attacks involved the misuse of RDP alongside other authorized remote desktop tools, such as AnyDesk. In specific reported cases, initial access was achieved through the exploitation of the seven-year-old Windows SMB Remote Code Execution Vulnerability (CVE-2017-1444), although this was not observed in the Sophos MDR and IR cases reflected in our statistics. Initial access vectors identified by Sophos X-Ops in RansomHub cases comprised of abusing externally facing Microsoft SQL Servers for command execution, exploiting open RDP and Remote Desktop Web access, and compromising unmanaged devices.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.