More and more malware is now attacking virtual infrastructure

Data Breach
(Image credit: Shutterstock)

More cybercriminals are customizing their malware to attack virtual machines and other virtualized resources, new research has found.

The Cybersecurity Threatscape Q1 2021 report from Positive Technologies revealed that the number of cyberattacks increased by 17% compared to Q1 2020.

Interestingly, it added that 77% of the total incidents in Q1 2021 were targeted attacks and involved malware geared for attacking virtual infrastructure.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and you can also choose to enter the prize draw to win a $100 Amazon voucher or one of five 1-year ExpressVPN subscriptions.

>> Click here to start the survey in a new window <<

“Attackers carefully monitor information about new vulnerabilities and try to find a use for these in their attacks as soon as possible. In early 2021, Positive Technologies researchers helped eliminate several critical vulnerabilities in VMware products, including in vCenter Server, which allowed remote code execution,” said Dmitry Serebryannikov, Director of Security Analysis, Positive Technologies.

Serebryannikov adds that even after the vulnerability was patched, security researchers noticed threat actors were continuing to scan the Internet for vulnerable hosts. 

The rise of ransomware

Perhaps unsurprisingly, ransomware emerged as the malware that is most often used by attackers, accounting for nearly two-thirds (63%) of all malware attacks.

The report notes that in addition to demanding “astronomical” ransoms in Q1 2021, the ransomware operators also refined the tools in their arsenal, most notably coding in new ways to veil them from security tools.

The number of attacks towards IT companies remained consistently high for the second quarter in a row, the report finds, in order to steal customer data or launch further attacks on their customers.

However, it was Governmental institutions that once again topped the rankings for being the most popular target.

The widely reported ProxyLogin vulnerabilities in Microsoft Exchange emerged as the most popular vulnerability this quarter. Also noteworthy was the use of a zero-day vulnerability in SonicWall’s VPN solutions that threat actors used not just to break into the company, but also to launch attacks on its customers. 

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
Fraud
Hackers are tricking victims into scam-yourself attacks with fake tutorials, CAPTCHAs, and updates
A person holding out their hand with a digital AI symbol.
This ransomware gang is using SSH tunnels to target VMware appliances
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Samuel and Romy standing very close together in A24&#039;s Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
Seth Milchick and Kier Eagan&#039;s animatronic speaking in Severance season 2 episode 10
Apple TV+ announces Severance has been renewed for season 3 after that devastating finale