Sextortion, digital usury and SQL brute-force

ESET Analysis

Closing intrusion vectors power cybercriminals to revisit outdated assault avenues, but additionally to search for new methods to assault their victims

Sextortion emails and different text-based threats have been on a large enhance in H1 2023 and the query stays why. Are criminals simply lazy? Are they making an attempt to earn simple cash throughout their days off? Or is that this part of one thing greater, probably involving generative AI?

And that’s simply scratching the floor of the traits noticed within the newest ESET Risk Report, the main focus of this episode. One other intrusion vector that has seen elevated consideration from cybercriminals was MS SQL servers that needed to face up to a renewed enhance in brute power assaults.

Oh, and let’s not overlook the prison follow of usury, showing within the type of malicious Android apps. Attempting to find victims within the nations across the equator and within the southern hemisphere, cybercriminals attempt to strain and threaten victims into paying exorbitant rates of interest on short-term loans – which generally, they don’t even present.

But, it wasn’t all unhealthy in H1 2023. One piece of fine information was that infamous Emotet botnet confirmed little exercise, operating just a few minor and surprisingly ineffective spam campaigns in March. After these had been over, it went silent. What caught the eye of researchers was a brand new performance resembling a debugging output. This feeds into the rumors that Emotet has been – a minimum of partially – offered to a different risk group that’s uncertain of how issues work.

One other constructive story got here relating to Redline stealer. This infamous malware-as-a-service (MaaS) utilized by criminals to steal sufferer’s data and ship different malware has been disrupted by ESET researchers and their buddies at Flare programs. The disruption took down a series of GitHub repositories essential to run RedLine management panels for the associates. As there was no backup channel, operators behind the MaaS must discover a totally different path to run their “service”.

For all these matters and extra from ESET Risk Report, hearken to the newest episode of ESET Analysis podcast, hosted by Aryeh Goretsky. This time, he directed his inquiries to one of many authors of the report, Safety Consciousness Specialist Ondrej Kubovič.

For the complete report from H1 2023, together with different matters akin to modifications in cryptocurrency threats, malicious OneNote recordsdata, the primary double supply-chain assault – courtesy of Lazarus group – or the newest developments within the ransomware scene, click here.


  • Sextortion and text-based threats 1:46
  • Brute power assaults on MS SQL servers 7:10
  • Usury on Android apps 9:20
  • Emotet exercise 13:25
  • RedLine Stealer disruption 16:45