Remote code execution (RCE) is a favorite tool of cyber criminals because it allows them to gain access to a user’s data without needing physical access to the network. This means the adversary can steal data, cause service disruption, deploy ransomware and move laterally to other areas in the network.
Notable RCE vulnerabilities announced in Q4 include:
Microsoft Exchange, ConnectWise, Microsoft Windows and Microsoft SPNEGO
Hover over tiles to learn more
October through December
Total Events
Unique Variants
Total Activity
Across Nuspire managed and monitored devices, there was a decrease of 34.56% in total malware activity compared to Q3 2022.
How to Combat
To strengthen your defenses against malware activity, you’ll need to adopt a multiprong approach including endpoint protection platforms and cyber awareness training.
We observed a decrease in malware activity when compared to the previous quarter, most likely due to the continuing effects of Microsoft’s decision to block Visual Basic for Applications (VBA) macros by default for Office files.
It’s important to note that year-over-year, malware usage is still high, increasing 6.85% in 2022. Phishing is far and away the most popular delivery method for malware, and in Q4, we saw threat actors shift to using Excel add-in (.XLL) files and JavaScript variants.
Total Events
Unique Variants
Total Activity
Botnet activity plunged 66.35%
How to Combat
Step up your efforts to stop botnet activity, which is usually detected post-infection. We recommend detecting malicious activity and quarantining devices to minimize botnet spread throughout the network.
Botnet activity in Q4 dropped significantly; however, overall activity for 2022 jumped over 30% when compared to 2021.
Torpig Mebroot is a repeat offender on Nuspire’s Quarterly Threat Reports and has appeared once again in the top position in Q4. Even with a substantial decrease in activity (60.34%), Torpig Mebroot still captured just shy of 60% of all witnessed botnet activity during Q4.
Total Events
Unique Variants
Total Activity
Exploits more than doubled in Q4
How to Combat
Stop exploits before they do harm by patching systems and security monitoring to thwart attackers and decrease risk.
Nuspire witnessed a surge in brute forcing in Q4, with activity increasing by a whopping 400% over Q3. In a distant second place, we saw continued exploitation of Apache’s Log4j vulnerability – a vulnerability that shook the industry to its core in December 2021 and continues to wreak havoc today.
Our analysis also uncovered that the Hikvision security camera vulnerability announced in October 2021 saw a resurgence in exploit attempts in Q4. Our experts predict we’ll see more of these IoT attacks throughout 2023.