Research (Insikt)
Posted: 25th February 2025
By: Insikt Group®
In 2024, Insikt Group significantly expanded its tracking of malicious infrastructure by covering more malware families and categories, additional infrastructure types such as staging servers, and integrating data sources like Recorded Future® Network Intelligence, enhancing threat detection, higher-tier infrastructure insights, and victimology analysis. While many key 2023 trends persisted — such as Cobalt Strike dominating offensive security tools (OSTs), AsyncRAT and QuasarRAT leading among remote access trojans (RATs), China and the United States (US) being the top hosting locations, and law enforcement actions having often only temporary impact — Insikt Group identified several emerging trends in 2024.
Notably, malware-as-a-service (MaaS) infostealers, led by LummaC2, grew in prevalence, likely driven by law enforcement actions against competitor infostealers and rapid innovation by LummaC2. Additionally, Android remained the primary target for mobile malware, with Hook leading. While Latrodectus dominated droppers and loaders despite law enforcement disruptions in the loader ecosystem, traffic distribution systems (TDSs) continued to enhance cybercrime efficiency, as seen with TAG-124, and the abuse of content delivery networks (CDNs) like Cloudflare surged. In regards to state-sponsored groups, China notably increased its use of relay networks such as ArcSilt, while Russia continued its abuse of a wide range of legitimate internet services (LIS).
Defenders should leverage this report’s insights to strengthen security controls by prioritizing top malware and infrastructure techniques, and thereby enhance network monitoring and deploy relevant detections like YARA, Sigma, and Snort. This should be complemented by investments in tracking evolving malicious infrastructure dynamics, conducting threat simulations to test defenses, and effectively monitoring the broader threat landscape. Regarding LIS, defenders must balance blocking, flagging, or allowing high-risk services based on their assessed criticality and risk level.
As malicious infrastructure evolves and detection improves, Insikt Group expects existing trends to persist in 2025, driven by continuous threat actor innovation rather than drastic shifts. For example, the “as-a-service” ecosystem will likely expand, and threat actors will increasingly rely on legitimate tools, services, and CDNs to evade detection. Furthermore, with growing mobile reliance, Insikt Group expects mobile-based threats to continue to rise. Relay networks, primarily used by Chinese state-sponsored groups up until now, may see broader adoption by cybercriminals and other state-sponsored groups. Lastly, law enforcement actions are expected to have a greater impact due to enhanced international cooperation and accrued expertise in large-scale cybercrime takedowns.
Insikt Group proactively identifies and monitors infrastructure associated with hundreds of malware families, threat actors, and other artifacts, including phishing kits, scanners, and relay networks. By automatically validating malicious infrastructure through various proprietary methods on a daily basis, Insikt Group provides accurate risk representation, enabling Recorded Future customers to enhance their detection and defense capabilities.
Building on Insikt Group’s annual adversary infrastructure reports from 2022 and 2023, the 2024 Malicious Infrastructure Report provides a concise, data-based overview of malicious infrastructure observed throughout 2024. This year, it specifically emphasizes the synergy among passive infrastructure detection, higher-tier infrastructure insights powered by Recorded Future Network Intelligence, and victim identification. Overall, this report is for anyone interested in malicious infrastructure, offering a high-level overview of its current state as well as summaries of key findings to inform decision-making and provide a broad perspective in this highly dynamic environment.
Recognizing the challenge of categorizing malware types in a mutually exclusive manner due to their overlapping functionalities, this report establishes a set of malware categories to facilitate analysis, as detailed in Appendix A, with brief definitions for each. Notably, certain malware categories, such as crypters, have been intentionally excluded due to the usual absence of network artifacts.
Beyond examining malicious infrastructure through the lens of malware categories, Insikt Group also monitors it by type, with each type assigned a distinct risk scoring within the Recorded Future Intelligence Cloud. This differentiation reflects varying levels of severity — for instance, network traffic to or from a C2 server in a corporate network may indicate higher risk compared to a management panel, as it typically implies active malicious activity. The infrastructure types defined by Insikt Group are detailed in Appendix B.
Proactively identifying malicious infrastructure is a complex task shaped by various factors. In addition to the vast volume of data, each malware family, version, or infrastructure linked to specific threat actors often employs entirely unique setups. Detection becomes even more challenging due to factors such as hosting behind CDNs like Cloudflare, the use of high or random ports, reliance on legitimate internet services such as Discord or Telegram, or the exploitation of compromised infrastructure.
These setups also evolve continuously, demanding that Insikt Group constantly innovate and refine its tracking methodologies. Considering all these factors, this report examines malicious infrastructure across multiple categories, including infostealers, backdoors and RATs, mobile malware, OSTs, botnets, droppers and loaders, phishing kits, web shells, and ransomware.
Overall, in 2024, there has been a significant rise in identified malicious infrastructure, driven by an evolving threat landscape and advancements in detection methodologies by Insikt Group. For instance, the number of unique, validated C2 servers doubled from 2023 to 2024, while unique, validated management panels saw a 69% increase over the same period.
In addition, using Recorded Future Network Intelligence, Insikt Group identified victims in approximately 200 countries worldwide in 2024 based on victim IP address geolocation. Countries in Figure 1 were categorized into five groups based on the number of unique victims detected, with those showing high exposure being geographically dispersed worldwide. Notably, accurately measuring malware impact across countries is challenging due to variations in population size, digital footprint, analytical biases (for example, the types of malware tracked), internet infrastructure (such as proxies), and the geographical hosting choices of victim organizations.
Figure 1: Malware impact by country based on Recorded Future Network Intelligence (Source: Recorded Future)
Figure 2 shows the distribution of victims by country across different continents. In North America, the US is the most targeted country, accounting for around 87% of unique victims in the region despite making up only about half of its population. The high victim count in the US is likely driven by factors such as its large population, extensive digital footprint, widespread English use (exploited in phishing campaigns), and economics, while also being influenced by the country’s role as a global infrastructure hub, providing hosting and digital services to organizations worldwide. Most victims are linked to AsyncRAT, followed by SolarMarker RAT and QuasarRAT (see Table 1). Notably, unlike AsyncRAT and QuasarRAT, SolarMarker RAT is believed to be operated by a single threat actor and has previously been observed predominantly targeting the US.
Figure 2: Shares of unique victim by country and continent (Source: Recorded Future)
In South America, Brazil recorded the highest number of unique victims, accounting for 86% of the region’s total, while also only making up around half of the continent’s population. Previously identified as one of the countries most vulnerable to cyberattacks, Brazil has long been a hotspot for both global and local cyber threats, ranking high in cybercrime activity, with groups like Grandoreiro operating almost exclusively within its borders. In 2024, QuasarRAT infections were the most prevalent among Brazilian victims, followed by infections linked to AsyncRAT and SectopRAT.
In Africa, Angola recorded the highest number of unique victims, followed by Ghana, South Africa, the Republic of the Congo, and the Democratic Republic of the Congo. Notably, in two of the five most targeted African countries, PlugX, a malware linked to multiple Chinese state-sponsored groups, ranked among the most prevalent malware.
In Europe, France had the highest number of unique victims, followed by Germany, the United Kingdom, the Netherlands, and Poland. AsyncRAT was the most prevalent malware across all five countries, with Cobalt Strike ranking second in three of them. The distribution of victims in these top five countries closely aligns with their population sizes. Notably, in the Netherlands, GobRAT — a backdoor targeting Linux routers with malware written in Go — ranked among the top three malware families.
In Asia, India recorded the highest number of unique victims, followed by China, Indonesia, Thailand, and Hong Kong. Approximately 73% of all victims in these countries were linked to AsyncRAT, QuasarRAT, and Cobalt Strike infections. Notably, Brute Ratel C4 ranked among the top three malware in Hong Kong, highlighting its growing significance.
In Oceania, Australia accounted for 87% of all unique victims despite making up only 60% of the region’s population. AsyncRAT was the most prevalent malware, linked to over half of Australia’s victims, while in New Zealand, 67% of victims were associated with AsyncRAT infections.
Table 1 presents the full list of the top three malware families for each of the five leading countries in each continent, based on the number of unique victims observed by Insikt Group in those countries.
Continent | Country | Top 1 | Top 2 | Top 3 |
---|---|---|---|---|
North America | United States | AsyncRAT | SolarMarker RAT | QuasarRAT |
Canada | SolarMarker RAT | AsyncRAT | DcRAT | |
Cuba | Rhadamanthys Stealer | AsyncRAT | PrivateLoader | |
Mexico | AsyncRAT | DanaBot | Rhadamanthys Stealer | |
Bahamas | Spylix | AsyncRAT | QuasarRAT | |
Europe | France | AsyncRAT | Cobalt Strike | PrivateLoader |
Germany | AsyncRAT | DcRAT | Cobalt Strike | |
United Kingdom | AsyncRAT | Cobalt Strike | DcRAT | |
Netherlands | AsyncRAT | Cobalt Strike | GobRAT | |
Poland | AsyncRAT | DcRAT | Cobalt Strike | |
South America | Brazil | QuasarRAT | AsyncRAT | SectopRAT |
Colombia | AsyncRAT | Rhadamanthys Stealer | DcRAT | |
Peru | Rhadamanthys Stealer | AsyncRAT | PrivateLoader | |
Argentina | AsyncRAT | QuasarRAT | Rhadamanthys Stealer | |
Venezuela | QuasarRAT | Rhadamanthys Stealer | AsyncRAT | |
Asia | India | AsyncRAT | Cobalt Strike | Mythic |
China | Cobalt Strike | AsyncRAT | QuasarRAT | |
Indonesia | AsyncRAT | QuasarRAT | DcRAT | |
Thailand | AsyncRAT | QuasarRAT | Cobalt Strike | |
Hong Kong | QuasarRAT | Cobalt Strike | Brute Ratel C4 | |
Africa | Angola | QuasarRAT | AsyncRAT | Gh0st RAT |
Ghana | AsyncRAT | Spylix | QuasarRAT | |
South Africa | AsyncRAT | PrivateLoader | QuasarRAT | |
Republic of the Congo | AsyncRAT | PlugX | QuasarRAT | |
Democratic Republic of Congo | AsyncRAT | PlugX | MoqHao | |
Oceania | Australia | AsyncRAT | Cobalt Strike | DcRAT |
New Zealand | AsyncRAT | DcRAT | Rhadamanthys Stealer | |
Fiji | AsyncRAT | Stealc | N/A | |
New Caledonia | AsyncRAT | N/A | N/A | |
French Polynesia | AsyncRAT | N/A | N/A |
Table 1: Top three families for the top five countries of each continent (Source: Recorded Future)
To read the entire analysis, click here to download the report as a PDF.
Related Research (Insikt)