Malware Infections

Detected infections across monitored NGOs

Organizations monitored
Infection Incidents
Affected organizations
Infected Assets

Malware Types

Affected Platform Types

Malware Names

Malware infections over time

Malware Risks

Data Exfiltration
Occurs when malware secretly copies sensitive data from an infected computer and sends it to the attacker. This can include personal files, financial records, passwords, and business documents.
Unauthorized Access
Malware can allow attackers to remotely control or access infected computers without the owner's knowledge or permission. This can be used to steal data, spread more malware, or perform other malicious actions.
Resource Abuse
Some malware uses significant processing power, memory, or network bandwidth, causing infected devices to slow down, become unresponsive, overheat, or crash.
Implies Other Infections
The presence of certain malware often indicates that other malicious software may also be present on the infected system. This can happen when malware acts as a "downloader" for other threats.

Infections Details

Help Us Strengthen Civil Societyโ€™s Cyber Defences

Have you observed a threat?

Report it to us to help improve the picture.

Report an incident