您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[卡巴斯基实验室]:2025年第一季度工业自动化系统威胁态势报告 - 发现报告

2025年第一季度工业自动化系统威胁态势报告

AI智能总结
查看更多
2025年第一季度工业自动化系统威胁态势报告

Q1 2025 Q1 in numbers.......................................................................................................................................................................................................3Trends.......................................................................................................................................................................................................................4Statistics across allthreats......................................................................................................................................................................8Selected industries.......................................................................................................................................................................................10Diversity of detected malicious objects.........................................................................................................................................12Threat categories.......................................................................................................................................................................................14Malicious objects used for initial infection...............................................................................................................................14Denylisted internet resources......................................................................................................................................................14Malicious documents (MSOffice + PDF)................................................................................................................................17Malicious scripts and phishing pages (JS and HTML).................................................................................................20Next-stage malware................................................................................................................................................................................23Spyware.......................................................................................................................................................................................................23Ransomware..............................................................................................................................................................................................26Miners in the form of executable files for Windows...................................................................................................28Web miners..................................................................................................................................................................................................31Self-propagating malware. Worms and viruses.................................................................................................................33Worms...........................................................................................................................................................................................................34Viruses...........................................................................................................................................................................................................36AutoCAD malware....................................................................................................................................................................................38Main threat sources.....................................................................................................................................................................................40Internet.........................................................................................................................................................................................................42Email clients...............................................................................................................................................................................................44Removable media..................................................................................................................................................................................46Network folders......................................................................................................................................................................................48Methodology used to prepare statistics.....................................................................................................................................50 Q1in numbers Trends Relative stability from quarter to quarter.The percentage of ICS computers onwhich malicious objects were blockedremainedunchangedfromQ4 2024at21.9%.Overthe l