Your IP:Unknown

·

Your Status: Unknown

Skip to main content


The usual suspects: Everyday online threats in numbers

You face cybersecurity threats every day — even if you don’t notice them. What should you be worried about in your daily online life?

hero statistick eye magnifying glass md

NordVPN’s Threat Protection Pro™ feature guards you against common online threats — but just how much danger is the average internet user exposed to everyday? Our researchers have analyzed aggregated Threat Protection Pro™ data over a prolonged period to determine the kinds of threats that you’re most likely to encounter on the internet.

trackers malware ads blocked

All data was processed in accordance with NordVPN’s Terms of Use and Privacy Policy. Our findings were derived only from aggregated Threat Protection Pro™ usage statistics.

Malware: Hiding in plain sight

malware laptop threats md

Malware refers to any kind of programming that was deliberately designed to harm you or your device. This includes malicious software like viruses, trojans, ransomware, and spyware. Malware can steal sensitive data, encrypt important files, or even take over the machine, putting the criminal in complete control.

Most common malware blocked by Threat Protection Pro™

167,671 attacks intercepted

APC

A virus that often targets system configurations and automated processes to cause disruptions.

71,716 attacks intercepted

APC.AVAHC

A variant of the APC virus known for its ability to avoid detection and persist in infected systems.

43,298 attacks intercepted

Redcap.ovgfv

A specific strain of the Redcap trojan, used for data exfiltration and system manipulation.

20,587 attacks intercepted

APC.YAV

A variant of the APC virus family that changes system files and settings.

20,095 attacks intercepted

OfferCore.Gen

Adware that generates intrusive ads and can install unwanted software on infected devices.

18,188 attacks intercepted

CoinMiner

A virus designed to hijack system resources to mine cryptocurrency without the user's consent.

9,295 attacks intercepted

AD.BitcoinMiner

Adware that also mines Bitcoin using the infected system's resources.

8,764 attacks intercepted

Redcap

A trojan that steals data and creates backdoors in infected systems.

6,531 attacks intercepted

Agent.anky

A trojan that’s used as a downloader for other malicious software.

6,393 attacks intercepted

Dropper.Gen

A trojan that installs other malicious software on the infected system.

4,696 attacks intercepted

Vuze.NB

Potentially unwanted software distributed through infected torrent downloads.

4,633 attacks intercepted

Crypt.XPACK.Gen

Ransomware that encrypts files on the victim's device, demanding payment for decryption.

4,586 attacks intercepted

KAB.Talu.2f47b9

A specific variant of the KAB trojan, known for its advanced data-stealing capabilities.

3,225 attacks intercepted

BotSand.77fce6

Botnet malware that creates a network of infected devices for coordinated attacks, like DDoS.

3,022 attacks intercepted

Dropper.MSIL.Gen

A generic name for a .NET-based dropper trojan that installs additional malware.

2,809 attacks intercepted

Phishing.AAI

Malware used in phishing attacks, tricking users into giving away sensitive information.

2,688 attacks intercepted

APC.Gendit

A variant of the APC virus, designed to disrupt processes on the infected device.

2,609 attacks intercepted

Null

Ransomware that encrypts files using the AES-256 algorithm and demands 2.2 Bitcoins in ransom.

2,485 attacks intercepted

InstallCore

A potentially unwanted program and adware that bundles software with other installations.

2,387 attacks intercepted

APC.Griffin

Malware that changes the system files and settings on your computer.

Data collected from January 1, 2024 to August 1, 2024.

How malware infects your device

Unlike zero-day exploits and bugs, malware is not present on machines from the get-go — it must be actively brought onto your device, such as by downloading an infected file. One of the most common ways to get infected with malware is through phishing attacks. Scammers use deceptive misspellings of popular brands (such as spelling “Amazon” as “Arnazon”) to trick victims into clicking phishing links and downloading infected files.

In fact, 99% of all phishing attacks use just 300 brands for deception. The brands themselves are not at fault — such fakes hurt their reputation as well, forcing companies to actively hunt them down. But high brand awareness can lull victims into a false sense of security and get them to lower their guard.

brands spreading malware
NordVPN is not endorsed by, maintained, sponsored by, affiliated, or in any way associated with the owners of the mentioned brands. Brands are indicated solely for the purpose of accurately reporting information related to brands that were most likely to be impersonated for spreading malware.

While hackers can disguise malware as any file by renaming the executable and using double extensions, a few file types are much more likely to hide malware than others. Our research shows that users should be particularly careful when downloading files with the following extensions from the internet:

files extensions malware

Malware is also not distributed equally across the internet. Some web domain categories are particularly prone to harboring malware, with over half of all malware blocked by Threat Protection Pro™ coming from pages with adult content. According to our findings, users should be particularly careful when visiting websites within the following categories:

domain categories malware

Our research shows that the risk of getting infected with malware also varies by geographic region. The differences could be attributed to the varying levels of internet connectivity, economic development, and cybersecurity awareness between countries. From aggregated Threat Protection Pro™ data, we can infer that users in the following locations are most at risk of malware:

Countries most affected by malware

countries malware africa infographic

More than a fake website: Detecting phishing and scams

Scam and phishing websites are designed to trick you into giving away your personal information, making payments for products that don’t exist, or simply downloading malware. They work by luring you in through email, social media, or banners, where they promise too-good-to-be-true deals. Once you engage, you may fall victim to identity theft, financial loss, or malware attacks.

phishing hack hooks documents password credit card md

How phishing and scam websites are identified

Young domains

Most scammers change domains really fast. Once their clients realize they were tricked, the domain starts getting bad reviews on review sites and through social media posts, so the scammers have to drop it and create a new one. If the domain’s been active for just a few months, it may be the sign of a scam.

Typosquatting

Attackers use typosquatting to create scam websites that mimic real ones by making slight changes to the domain names. They omit a letter, add extra characters, or use visually similar letters (like 'rn' to mimic 'm'). The changes are enough to register the website as new and unique, but they are also so small that users don't notice there's something wrong with them.

Suspicious user reviews

The quality and quantity of user reviews are also important when analyzing a domain for scams. Many scam websites have good reviews on their pages, while trusted reviewing platforms like Trustpilot show consistent 1-star ratings.

Aggressive advertising

Excessive pop-ups and view-obstructing banners that make it difficult to navigate through a page might signal that the website is unsafe. If it’s trying to push users to act immediately by downloading or buying something, the website’s probably a scam.

Poor security features

Websites using HTTP, self-signed SSL certificates, and outdated SSL/TLS protocols is a red flag. Scammers don't care about their clients' privacy one way or another, so they're unlikely to spend extra time on data protection mechanisms.

Poor-quality content

If the texts and images on the website are amateur, look like they've all been copied from some other brand, or created with AI tools, chances are, the website is a fake. Authentic, high-quality content is not only a sign of a credible business but also crucial for compliance with copyright laws and effective SEO.

Unbelievable deals

Scammers often use too-good-to-be-true deals to lure consumers to their websites. High-value items or services at exceptionally low prices and unrealistic returns on investments are all signs of a scam.

Suspicious payment methods

A legitimate site will offer multiple payment options. Scammers usually try to force the user to pay through non-reversible and non-traceable payment methods, like gift cards and cryptocurrencies.

Unreliable contact details

Legitimate websites will often list a phone number, an email address, and a contact form, along with various social media profiles. Scammers are likely to hide their information as much as possible. Using an email address from a free provider like Gmail instead of a corporate domain is also a clear sign that the website is not to be trusted.

Non-existent policies

Questionable or non-existent return and privacy policies are significant red flags. Legitimate websites will provide clear privacy policy and terms of service — they must have them available to comply with various data protection laws. If these can’t be found on a website, it’s probably a scam.

the most common online scams

Will Threat Protection Pro™ help me avoid phishing and scams?

Yes! Get Threat Protection Pro™ to significantly lower your chances of falling for an online scam. It blocks millions of scams every month:

how many scams did threat protection pro block

Beyond malware: Web trackers and ads

Web trackers are a broad category of privacy-invading tools that collect information on user activity. Trackers typically take the form of special scripts, browser cookies, or tracking pixels. Businesses use trackers to paint an accurate picture of you for targeted advertising — but if they suffer a data breach, the stored tracker data could end up falling into the hands of cybercriminals. The following domain categories feature the most trackers:

domain categories trackers

How to stay safe from common cyberthreats

Develop good cybersecurity habits

Cybercriminals prey on apathy, confusion, and ignorance, hoping that victims will forego due diligence. For example, most phishing attempts involve distorted names of popular brands.

Verify, download, scan, install

Malware executables may be disguised as or even hidden in legitimate files. Always verify the website you wish to download from, and always use anti-malware tools like Threat Protection Pro™ to inspect files you download. This includes suspicious email attachments.

Be careful where you go online

Certain web domain categories are much more likely to compromise your device than others. If you visit websites that are likely to contain malware, pay attention to what you type, click, and download.

Let Threat Protection Pro™ keep you safe

Threat Protection Pro™ received a huge update and now combines the best aspects of essential cybersecurity tools into one comprehensive security package. It will scan each file you download for malware, stop you from visiting malicious pages used for phishing, scams, and hosting malware, and block annoying ads.