Which threats target the Czech Republic?
Trends from telemetry and experience
Two years into the COVID-19 pandemic, Czech organizations still face billions of brute-force attacks targeted against Remote Desktop Protocol (RDP). Moreover, ESET’s latest data clearly shows that the intensity of these attacks has grown rapidly towards the end of 2021 and that the detection rate of such intrusion attempts increased by hundreds of percent year over year.And RDP attacks are only one of many threats aimed at Czech companies in 2021. Tens of millions of attacks against public-facing SQL and SMB services, campaigns of Emotet, a malware once described by Europol as the most dangerous malware in the world, and targeted ransomware attacks; all add to the defender’s burden and are all included in our regularly published ESET Threat Report.If you’re interested in what other trends we’ve discovered in last year’s data and what we expect in 2022, then our talk is exactly for you. On top of the high-level overview, we will also talk about our hands-on experience and illustrate what scenarios and malware were used in attacks against Czech companies as well as which legitimate tools the attackers transformed into nefarious weapons.
Robert Šuman leads ESET’s research laboratory in Prague. He practices reverse engineering for more than 25 years, even though he started as a developer and IT architect of C++ and Java projects related to Telco and banking areas. He specializes mainly in detection of advanced malware, APT attacks and consulting clients regarding Threat Intelligence.
Jakub Souček graduated from the Computer Security program at FIT CTU in Prague. Since 2015, he works at ESET, where he currently coordinates the team focused on long-term malware tracking of significantly active malware families. Besides that, he focuses on in-depth analysis of malware and participates in security courses as a teacher.