
Key facts
Three times the amount of theft from targeted attacks on banks, as compared with the previous reporting period
A dramatic increase in the risk of attacks on critical industrial infrastructure
Growth in DDoS extortion including attacks using IoT devices
Attackers are increasingly active in traffic interception and cyber espionage. This is primarily through vulnerabilities at telecom operators and Internet providers.
Discover:
How banks in and outside Russia are attacked and by whom
How the cryptolocker market is evolving
How threat actors conduct the most popular attacks on Android users
Brand abuse schemes
From investigating complex cybercrimes and collecting threat data from hundreds of sources over the past year, Group-IB specialists have recorded the evolution of cyber-crime and the tools employed. Our Annual Report is an overview of these observations, along with analysis of key threats targeting businesses and governments, as well as forecasts for their development.
This report allows you to tailor your IT security strategy to meet incoming threats in the coming year. This is of particular importance to the banking and industrials sector as well as critical infrastructure protection specialists.
Group-IB’s status has been confirmed by Gartner — in 2015 Group-IB was included in the top 7 global vendors of threat intelligence.

Ilya Sachkov
CEO, Founder Group-IB
Group-IB research on targeted attack groups

Hi-Tech Crime Trends 2020/2021

UltraRank: the unexpected twist of a JS-sniffer triple threat

RedCurl: The pentest
you didn’t know about

Online Piracy Research:
Jolly Roger’s patrons
of online pirates in developing countries.

Fxmsp: “The invisible god of networks”

Hi-Tech Crime Trends 2019/20

Attacks by Silence

Hi-Tech Crime Trends 2018

Crime without punishment: in-depth analysis of JS-sniffers

2018 Cryptocurrency Exchanges

Cobalt: their evolution and joint operations

Hi-Tech Crime Trends 2017

Lazarus Arisen: Architecture, Techniques and Attribution

MoneyTaker

Buhtrap

Analysis of attacks against trading and bank card system

Anunak: APT against financial institutions

Hi-Tech Crime Trends 2020/2021

UltraRank: the unexpected twist of a JS-sniffer triple threat

RedCurl: The pentest
you didn’t know about

Online Piracy Research:
Jolly Roger’s patrons
of online pirates in developing countries.

Fxmsp: “The invisible god of networks”

Hi-Tech Crime Trends 2019/20

Attacks by Silence

Hi-Tech Crime Trends 2018

Crime without punishment: in-depth analysis of JS-sniffers

2018 Cryptocurrency Exchanges

Cobalt: their evolution and joint operations

Hi-Tech Crime Trends 2017

Lazarus Arisen: Architecture, Techniques and Attribution

MoneyTaker

Buhtrap

Analysis of attacks against trading and bank card system

Anunak: APT against financial institutions
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Thank you for your interest in our research.
Please fill in the form below and we will send you the Group-IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid corporate email address.
Advanced protection against cyber threats
Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence and deep analysis of attacks and incident response.
Intelligence
Аctionable, finished intelligence to track actors and prevent attacks before they happen
Comprehensive solution to protect corporate network, hunt for threats and respond to even the most complex cyber attacks
Client-side fraud and attack prevention system for online banking, working across sessions, platforms and devices
Protection from bots, fraud and data leakage for e‑commerce and web portals