{"id":2999,"date":"2023-02-23T09:02:00","date_gmt":"2023-02-23T17:02:00","guid":{"rendered":"https:\/\/www.malwarebytes.com\/press\/?p=2999"},"modified":"2023-09-21T13:36:47","modified_gmt":"2023-09-21T13:36:47","slug":"research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat","status":"publish","type":"post","link":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat","title":{"rendered":"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat"},"content":{"rendered":"\n<p><em>Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments<\/em><\/p>\n\n\n\n<p><strong>Santa Clara, Calif. \u2013 February 23, 2023 \u2013<\/strong> <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malwarebytes<\/a><sup>TM<\/sup>, a global leader in real-time cyber protection, announced the release of its annual cybersecurity trend and threat intelligence report: <a href=\"https:\/\/try.malwarebytes.com\/2023-state-of-malware\/?utm_source=press_release&amp;utm_medium=inproduct&amp;utm_campaign=b2b_ws_global_som_167578574700\" target=\"_blank\" rel=\"noreferrer noopener\">2023 State of Malware<\/a>. The report shares key cybersecurity developments of 2022 and explains why organizations that protect against the five most dangerous cyberthreat archetypes \u00a0today will be better secured this year.<\/p>\n\n\n\n<p>\u201cIn today\u2019s rapid fire threat landscape, under-resourced organizations often struggle with where to focus their time, attention, and resources,\u201d said Mark Stockley, Cybersecurity Evangelist, Malwarebytes. \u201cThis report acts as a guide to those organizations by focusing their limited time on a small number of critical threats across Windows, Mac, and Android. If organizations can understand what it takes to prevent these threats, they are well placed to stop a huge number of other attacks as well.\u201d<\/p>\n\n\n\n<p><strong>Key findings from the report include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LockBit: The Most Dominant Ransomware <\/strong>\u2013 LockBit rose to dominance in 2022 and accounted for about one-third of all known ransomware as-a-service (RaaS) attacks, more than three times as many known attacks as the next most active ransomware, ALPHV.<\/li>\n\n\n\n<li><strong>SocGholish: Simple but Effective <\/strong>\u2013 Using websites to spread, rather than attachments, software vulnerabilities, or brute force attacks, the threat comes disguised as a critical browser update. Malwarebytes found that SocGholish performs eligibility checks to ensure it is only triggered by legitimate targets and using lures and malware meant to attract individual targets.<\/li>\n\n\n\n<li><strong>Android Droppers: Businesses\u2019 Biggest Threat <\/strong>\u2013 Droppers, trojan horses that disguise themselves as innocent apps, can be used to deliver pernicious threats like HiddenAds that bombard users with aggressive ads, banking trojans like ShareBot, and spy malware to harvest passwords, geo location, record audio, and even take pictures. In 2022, droppers accounted for 14% of detections on Android.<\/li>\n\n\n\n<li><strong>Genio: The Mac Menace <\/strong>\u2013 Malwarebytes tracks tens of millions of detection events for Mac adware and potentially unwanted programs (PUPs), but the worst is OSX.Genio. In 2022, it was the second most common detection on Macs, appearing on 10 percent of all machines that triggered a detection event.<\/li>\n<\/ul>\n\n\n\n<p><strong>Learn more about the report and how businesses can protect themselves:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.linkedin.com\/events\/7034169494495207424\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>LinkedIn Live<\/strong><\/a><strong> on February 23 at 11am PT <\/strong>\u2013 Join Cybersecurity Evangelist, Mark Stockley, as he breaks down the five most dangerous threats facing businesses this year \u2013 including LockBit and SocGholish. Stockley will dissect how the threats are delivered, where they spread, what they destroy, and the best practices to protect against them.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/go.malwarebytes.com\/Mar_Global_ThreatDown_SOM_01.LP.html?utm_source=press_rele%5b\u2026%5dutm_campaign=b2b_wb_global_threatdown_som_2023_167717017245\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatDown Webinar <\/a>on March 15<\/strong> \u2013 J\u00e9r\u00f4me Segura, Senior Director of Threat Intelligence, and Cybersecurity Evangelist, Mark Stockley, provide a breakdown of the top five cyberthreat archetypes to stop this year and share guidance on how to catch the emerging, hard-to-detect attacks that don\u2019t rely on malware.<\/li>\n<\/ul>\n\n\n\n<p>To read more about the latest threats and cyber protection strategies, visit our <a href=\"https:\/\/press.malwarebytes.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsroom<\/a>, or follow us on <a href=\"https:\/\/www.facebook.com\/Malwarebytes\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/malwarebytesofficial\/?hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a>, <a href=\"https:\/\/www.linkedin.com\/company\/malwarebytes\/mycompany\/?viewAsMember=true\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, <a href=\"https:\/\/www.tiktok.com\/@malwarebytesofficial?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\">TikTok<\/a> and <a href=\"https:\/\/twitter.com\/Malwarebytes\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>.<\/p>\n\n\n\n<p><strong>About Malwarebytes<\/strong><br>Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes\u2019 award-winning endpoint protection, privacy and threat prevention solutions and its world-class team of threat researchers protect millions of individuals and thousands of businesses across the globe. The effectiveness and ease-of-use of Malwarebytes solutions are consistently recognized by independent third parties including <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/04\/malwarebytes-evaluation-of-the-mitre-engenuity-attck-round-4-emulations\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE Engenuity<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/12\/malwarebytes-outperforms-competition-in-latest-mrg-ettifas-assessment\" target=\"_blank\" rel=\"noreferrer noopener\">MRG Effitas<\/a>, <a href=\"https:\/\/avlab.pl\/en\/security-test-of-400-malicious-samples-in-the-wild\/\" target=\"_blank\" rel=\"noreferrer noopener\">AVLAB<\/a>, AV-TEST (<a href=\"https:\/\/www.av-test.org\/en\/antivirus\/home-windows\/windows-10\/june-2022\/malwarebytes-premium-4.5.8--4.5-221311\/\" target=\"_blank\" rel=\"noreferrer noopener\">consumer<\/a> and <a href=\"https:\/\/www.av-test.org\/en\/antivirus\/business-windows-client\/windows-10\/june-2022\/malwarebytes-endpoint-protection-1.2-222316\/\" target=\"_blank\" rel=\"noreferrer noopener\">business<\/a>), <a href=\"https:\/\/go.malwarebytes.com\/VoC-Report_Gartner_01.LP.html\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Peer Insights<\/a>, <a href=\"https:\/\/www.g2.com\/categories\/endpoint-protection-suites\" target=\"_blank\" rel=\"noreferrer noopener\">G2 Crowd<\/a> and <a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/best-antivirus\/\" target=\"_blank\" rel=\"noreferrer noopener\">CNET<\/a>. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit <a href=\"https:\/\/www.malwarebytes.com\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.malwarebytes.com<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments <\/p>\n","protected":false},"author":121,"featured_media":2815,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[12],"tags":[14,17,103,270,586],"blog_type":[],"class_list":["post-2999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-releases","tag-malwarebytes","tag-news","tag-report","tag-state-of-malware","tag-threat-intel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malwarebytes Press Center - News &amp; Events | Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat<\/title>\n<meta name=\"description\" content=\"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat\" \/>\n<meta property=\"og:description\" content=\"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\" \/>\n<meta property=\"og:site_name\" content=\"Malwarebytes Press Center - News &amp; Events\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T17:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T13:36:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2535\" \/>\n\t<meta property=\"og:image:height\" content=\"2235\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julianne Cavanaugh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat\" \/>\n<meta name=\"twitter:description\" content=\"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julianne Cavanaugh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\"},\"author\":{\"name\":\"Julianne Cavanaugh\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/#\\\/schema\\\/person\\\/4e911a56fb51eaf916b7528200e89f4b\"},\"headline\":\"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat\",\"datePublished\":\"2023-02-23T17:02:00+00:00\",\"dateModified\":\"2023-09-21T13:36:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\"},\"wordCount\":615,\"image\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/12\\\/MWB_TM_Logo_RGB_Stacked-3.jpg\",\"keywords\":[\"Malwarebytes\",\"news\",\"report\",\"State of Malware\",\"threat intel\"],\"articleSection\":[\"Press Releases\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\",\"url\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\",\"name\":\"Malwarebytes Press Center - News &amp; Events | Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/12\\\/MWB_TM_Logo_RGB_Stacked-3.jpg\",\"datePublished\":\"2023-02-23T17:02:00+00:00\",\"dateModified\":\"2023-09-21T13:36:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/#\\\/schema\\\/person\\\/4e911a56fb51eaf916b7528200e89f4b\"},\"description\":\"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage\",\"url\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/12\\\/MWB_TM_Logo_RGB_Stacked-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/12\\\/MWB_TM_Logo_RGB_Stacked-3.jpg\",\"width\":2535,\"height\":2235},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/2023\\\/02\\\/23\\\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/#website\",\"url\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/\",\"name\":\"Malwarebytes Press Center - News & Events\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.malwarebytes.com\\\/press\\\/#\\\/schema\\\/person\\\/4e911a56fb51eaf916b7528200e89f4b\",\"name\":\"Julianne Cavanaugh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/79a5c16154d067551bd06325a2846ff91c4194f47b4e8801cef6a8a1313bb5e2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/79a5c16154d067551bd06325a2846ff91c4194f47b4e8801cef6a8a1313bb5e2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/79a5c16154d067551bd06325a2846ff91c4194f47b4e8801cef6a8a1313bb5e2?s=96&d=mm&r=g\",\"caption\":\"Julianne Cavanaugh\"}}]}<\/script>\n<meta name=\"googlebot\" content=\"index, follow\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malwarebytes Press Center - News &amp; Events | Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat","description":"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat","og_locale":"en_US","og_type":"article","og_title":"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat","og_description":"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments","og_url":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat","og_site_name":"Malwarebytes Press Center - News &amp; Events","article_published_time":"2023-02-23T17:02:00+00:00","article_modified_time":"2023-09-21T13:36:47+00:00","og_image":[{"width":2535,"height":2235,"url":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","type":"image\/jpeg"}],"author":"Julianne Cavanaugh","twitter_card":"summary_large_image","twitter_title":"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat","twitter_description":"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments","twitter_image":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","twitter_misc":{"Written by":"Julianne Cavanaugh","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#article","isPartOf":{"@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat"},"author":{"name":"Julianne Cavanaugh","@id":"https:\/\/www.malwarebytes.com\/press\/#\/schema\/person\/4e911a56fb51eaf916b7528200e89f4b"},"headline":"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat","datePublished":"2023-02-23T17:02:00+00:00","dateModified":"2023-09-21T13:36:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat"},"wordCount":615,"image":{"@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage"},"thumbnailUrl":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","keywords":["Malwarebytes","news","report","State of Malware","threat intel"],"articleSection":["Press Releases"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat","url":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat","name":"Malwarebytes Press Center - News &amp; Events | Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat","isPartOf":{"@id":"https:\/\/www.malwarebytes.com\/press\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage"},"image":{"@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage"},"thumbnailUrl":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","datePublished":"2023-02-23T17:02:00+00:00","dateModified":"2023-09-21T13:36:47+00:00","author":{"@id":"https:\/\/www.malwarebytes.com\/press\/#\/schema\/person\/4e911a56fb51eaf916b7528200e89f4b"},"description":"Malwarebytes State of Malware report warns against ransomware gang behind one-third of all attacks and the trojan horse of apps lurking in IT environments","breadcrumb":{"@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#primaryimage","url":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","contentUrl":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","width":2535,"height":2235},{"@type":"BreadcrumbList","@id":"https:\/\/www.malwarebytes.com\/press\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.malwarebytes.com\/press\/"},{"@type":"ListItem","position":2,"name":"Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.malwarebytes.com\/press\/#website","url":"https:\/\/www.malwarebytes.com\/press\/","name":"Malwarebytes Press Center - News & Events","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.malwarebytes.com\/press\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.malwarebytes.com\/press\/#\/schema\/person\/4e911a56fb51eaf916b7528200e89f4b","name":"Julianne Cavanaugh","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/79a5c16154d067551bd06325a2846ff91c4194f47b4e8801cef6a8a1313bb5e2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/79a5c16154d067551bd06325a2846ff91c4194f47b4e8801cef6a8a1313bb5e2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79a5c16154d067551bd06325a2846ff91c4194f47b4e8801cef6a8a1313bb5e2?s=96&d=mm&r=g","caption":"Julianne Cavanaugh"}}]}},"acf":[],"taxonomy_info":{"category":[{"value":12,"label":"Press Releases"}],"post_tag":[{"value":14,"label":"Malwarebytes"},{"value":17,"label":"news"},{"value":103,"label":"report"},{"value":270,"label":"State of Malware"},{"value":586,"label":"threat intel"}]},"featured_image_src_large":["https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg?w=1024",1024,903,true],"author_info":{"display_name":"Julianne Cavanaugh","author_link":"https:\/\/www.malwarebytes.com\/press\/blog\/authors\/jcavanaugh"},"comment_info":0,"category_info":[{"term_id":12,"name":"Press Releases","slug":"press-releases","term_group":0,"term_taxonomy_id":12,"taxonomy":"category","description":"","parent":0,"count":220,"filter":"raw","cat_ID":12,"category_count":220,"category_description":"","cat_name":"Press Releases","category_nicename":"press-releases","category_parent":0}],"tag_info":[{"term_id":14,"name":"Malwarebytes","slug":"malwarebytes","term_group":0,"term_taxonomy_id":14,"taxonomy":"post_tag","description":"","parent":0,"count":265,"filter":"raw"},{"term_id":17,"name":"news","slug":"news","term_group":0,"term_taxonomy_id":17,"taxonomy":"post_tag","description":"","parent":0,"count":189,"filter":"raw"},{"term_id":103,"name":"report","slug":"report","term_group":0,"term_taxonomy_id":103,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":270,"name":"State of Malware","slug":"state-of-malware","term_group":0,"term_taxonomy_id":270,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":586,"name":"threat intel","slug":"threat-intel","term_group":0,"term_taxonomy_id":586,"taxonomy":"post_tag","description":"","parent":0,"count":65,"filter":"raw"}],"jetpack_featured_media_url":"https:\/\/www.malwarebytes.com\/press\/wp-content\/uploads\/sites\/3\/2021\/12\/MWB_TM_Logo_RGB_Stacked-3.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/posts\/2999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/comments?post=2999"}],"version-history":[{"count":1,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/posts\/2999\/revisions"}],"predecessor-version":[{"id":3269,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/posts\/2999\/revisions\/3269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/media\/2815"}],"wp:attachment":[{"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/media?parent=2999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/categories?post=2999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/tags?post=2999"},{"taxonomy":"blog_type","embeddable":true,"href":"https:\/\/www.malwarebytes.com\/press\/wp-json\/wp\/v2\/blog_type?post=2999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}