{"id":4177,"date":"2023-01-12T08:06:48","date_gmt":"2023-01-12T08:06:48","guid":{"rendered":"\/cybersecurity-blog\/?p=4177"},"modified":"2023-03-29T12:04:33","modified_gmt":"2023-03-29T12:04:33","slug":"annual-report-2022","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/","title":{"rendered":"Annual Report 2022"},"content":{"rendered":"\n<p>It&#8217;s tradition now to review the year and share all cybersecurity trends and <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=report2022&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a>&#8216;s updates of the last year. Our team has prepared 2022\u2019s threat stats and hopes it helps you make your best decisions.&nbsp;<br><\/p>\n\n\n\n<p>For a moment, it looked like we were headed for a great year.<br><\/p>\n\n\n\n<p>January began with a huge win against REvil, whose activity got squashed by an unprecedented international law enforcement operation. Was the world about to crack down on ransomware and finally deal the lethal blow?<br><\/p>\n\n\n\n<p>Unfortunately \u2014 no. One way or another, ransomware <em>was<\/em> in the spotlight this year. Only, not in the way we would have liked.&nbsp;<br><\/p>\n\n\n\n<p>A new player called Conti quickly filled the void left by REvil. The audacious gang almost caused a nation-wide economic collapse in Costa Rica by temporarily driving the country\u2019s international trade into a standstill. Looks like this battle will continue in 2023.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.google.com\/url?q=https:\/\/twitter.com\/BleepinComputer\/status\/1550123586081288192&amp;sa=D&amp;source=docs&amp;ust=1673503087341883&amp;usg=AOvVaw0evxQBhoC96cKqWxwoLhA5\" target=\"_blank\">https:\/\/twitter.com\/BleepinComputer\/status\/1550123586081288192<\/a><\/p>\n\n\n\n<p>This year was, once again, a record-breaker. And not in a good way. But it\u2019s not all doom and gloom, though. New cybersecurity tools are coming in the clutch to assist security professionals and ANY.RUN is continuing to make threat analysis simpler and easier than ever before.&nbsp;<br><\/p>\n\n\n\n<p>Let\u2019s dive straight into the malware trends of the outgoing year and recount how far we\u2019ve come in our annual report.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity 2022 review&nbsp;<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ransomware is still a huge threat. An unprecedented attack against the government of Costa Rica halted the country\u2019s export and import early in the year. The economy was paralyzed and a state of emergency was declared. Ransomware can cripple countries, then. This malware type has also undergone a Cambrian explosion, with over 21 000 variants <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2022_targeted-ransomware-doubled-in-2022-new-techniques-and-groups-emerge\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">appearing<\/a> in the wild. Keep your eyes on Lock-Bit, Play, HIVE, Royal and Donut.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Data breaches were on the rise, too. A hacking group called Lapsus$ entered the stage in December 2021 and immediately began wreaking havoc. One after another, they breached Nvidia, Samsung, Ubisoft, and then Bing. In an unrelated incident, Twitter got hacked thanks to a zero-day vulnerability. The security oversight <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/54-million-twitter-users-stolen-data-leaked-online-more-shared-privately\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">caused<\/a> a leak that revealed the confidential data of 5.4 million users.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>DDoS attacks are at a historical all-time high. This year\u2019s unstable geopolitical landscape nourished state-sponsored hacktivists, who, having decided that the existing tools are not enough, began working on new botnets. As a result, attacks over 1 Tbp\/s are now common, and their duration is increasing alarmingly fast. Of course, hackers were quick to jump on the wagon. They began incorporating DDoS into multi-vector attacks as a smokescreen to throw off security teams.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Digital supply chains are growing in scale and complexity. Enterprises rely increasingly on third-party solutions, whose cybersecurity they can\u2019t control. Open-source libraries, use of trusted software, and post-pandemic security ease off: these are all factors that expose enterprises to supply chain attacks.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li>Cyber attacks are getting more press coverage, and many companies are finally getting serious about security. But lack of funding and understaffing remains an acute issue with many teams complaining that there are simply not enough hands on deck to respond to incidents effectively.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>To counterbalance the shortage of trained personnel, companies are beginning to adapt managed services. And thanks to online sandboxes, identification and analysis are now faster than it\u2019s ever been.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Malware 2022 review&nbsp;<\/h2>\n\n\n\n<p>There were <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/\" target=\"_blank\">2.8 billion malware attacks<\/a> in the first half of 2022. While the data that covers the whole year is not available yet, this is in line with what we saw in 2021. <br><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=report2022&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN  (opens in a new tab)\">ANY.RUN <\/a>can also share with you some numbers. Redline dominated ANY.RUN\u2019s upload chart, and Emotet was not far behind, helping to spread other variants.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/dMcprZcbU-3nnWbCbqUXFj823nLQlp4CjLCNMlVxx_Q0X-bN859i0_WzQmqLr1VUb8ECJ9rJLWMQqtqCTfLKB4f1_04t9865tYOHpDwMel0WS7ArsJLyQ3ivkZhLppJddtdlZsRxwTFV1LfKBuxZ6tC133UvdMWPoP97uqGXhKiYbsPNve701PboI9rJCw\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This year our users uploaded and analyzed 2.7 million samples on the service, with almost 500k task increase over 2021. A huge thank you for the continued support!&nbsp;<br><\/p>\n\n\n\n<p>As the infographic below shows, 60% of them were, in fact, trojans:&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/tq-hwGwz0g4G1-DdfnIhaLgM4RN5ibJ9nfrqncS_PUQTxhfUX6HICGqUyXblA8dqD_mAGnH1zY0_FZ0ZhBd2YrZRCajGXsq8HFNIdJ_UjvGBYvK68tJMqNuBO62bmUtx_l4WfwcuY7V-2HP6CZ1ll8CW7Xy8fPaXlm4siUNNhwJ6SnyHdRjRILTqrZPTMA\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN in 2022<\/h2>\n\n\n\n<p>The big picture: this year, we automated malware configuration extraction (yeah), made the startup time imperceptibly quick, and released a new view that shows every detail of a process under a magnifying glass.&nbsp;<br><\/p>\n\n\n\n<p>We&#8217;ve also released an improved team management feature for big enterprises and made countless user-experience improvements.&nbsp;<br><\/p>\n\n\n\n<p>Here are the major things:&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>&nbsp;ANY.RUN is now 10 times as fast <\/strong><\/h3>\n\n\n\n<p>It\u2019s a given that startup speed is crucial for a sandbox. After all, In incident response every second matters. Our service has always performed exceptionally well in this regard, with the delay between uploading the sample and launching the analysis only around 18 seconds. A result that was already ahead of most interactive sandboxes, leaving automated ones firmly in the dust.&nbsp;<br><\/p>\n\n\n\n<p>But that wasn\u2019t enough.<br><\/p>\n\n\n\n<p>So this year, we improved it by another 10 times with the Instant access technology. Which means that a sample runs immediately and is ready for analysis. Get both: the first results in a flash and stable usage for your research.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><br><\/strong><strong>Improved analysis: more details and higher accuracy<\/strong><br><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>With<strong> Malware configurations<\/strong>, ANY.RUN can get inside a sample\u2019s memory dump and extract information from it automatically, digging out a trove of valuable data.&nbsp;<\/li>\n\n\n\n<li>A new extended process view helps to gain a deeper look at the registry, file system, network, and process activity.<\/li>\n\n\n\n<li>We\u2019ve added over 100 new signatures and corrected more than 300, improving detection and decreasing false positives.&nbsp;<\/li>\n\n\n\n<li>New JA3, JA3S, and JARM fingerprinting methods.<\/li>\n\n\n\n<li>Text reports were updated with a clearer navigation, more logical data structure and a granular control over printing formats.&nbsp;<\/li>\n\n\n\n<li>New information on various mutex objects that you can investigate in the Synchronization tab.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Expanded VM: more functions and flawless process<\/strong><br><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Windows 11 support.<\/strong> You can now run your analysis in Microsoft\u2019s latest operating system.<\/li>\n\n\n\n<li><strong>Edge browser. <\/strong>You can now access Microsoft&#8217;s new default browser from our VMs.<\/li>\n\n\n\n<li><strong>Improved VM streaming.<\/strong> We are now streaming everything using HTML5. The playback became smoother, framerate higher, and scrubbing \u2014 more responsive.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Service<\/strong><br><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Profile interface overhaul. <\/strong>The user\u2019s cabinet was redesigned to make customization easier. A new team management section was also added.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Team management and Enterprise<\/strong><\/h3>\n\n\n\n<p>A new Enterprise plan was introduced. Perfect for large teams, it comes with a unique team management interface.&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ANY.RUN is now headquartered in the UAE<\/strong><\/h3>\n\n\n\n<p>We\u2019ve opened a new HQ location in sunny Dubai!&nbsp;<br><\/p>\n\n\n\n<p>The new space will help us to keep innovating and grow. Expect to see lots of exciting features coming to you from our Dubai office, which is now home to new and existing ANY.RUN team members. We are excited to keep collaborating with our customers and business partners at the new location.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Other cool stuff<\/strong><\/h3>\n\n\n\n<p>We were named the Most innovative security service of the year in the 18th Annual 2022 Cyber Security Global Excellence Awards. Also Technology Innovator Awards 2022 recognized ANY.RUN as Monitoring &amp; Analysis Innovators 2022 and we\u2019re honored to be Malware Monitoring Innovators of the Year by Global Awards 2022\/23.&nbsp;<br><\/p>\n\n\n\n<p>We\u2019re proud that our approach, which centers around making manual analysis faster and easier, has been so highly distinguished.<br><\/p>\n\n\n\n<p>Our team has also attended the ASIS Middle East Conference, Black Hat Middle East and Africa, GITEX Global 2022 cybersecurity event \u2014 the biggest in the region. We had a blast there and met lots of companies who were interested in using interactive sandboxes to tighten their security.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Top 5 blog posts<\/strong><br><\/h3>\n\n\n\n<p>ANY.RUN Blog was very active this year and we\u2019re proud to share our most viewed posts. Don\u2019t miss out on these posts:&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/raccoon-stealer-v2-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Raccoon Stealer 2.0 Malware analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">How We Discovered and Prevented an IMG-Based Malware Attack<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Expert Q&amp;A: nao_sec Follina Zero-day Vulnerability<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-do-malware-analysis-infographic\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">How to Do Malware Analysis. Infographic<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-report\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Malware Analysis Report in One Click<\/a><\/li>\n<\/ul>\n\n\n\n<p>And that is amazing that more and more specialists find our blog interesting \u2013 thank you!&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cybersecurity trends for 202<\/strong>3<\/h2>\n\n\n\n<p>As threats continue to evolve, so does our industry. We think that the following trends will help to shape it in 2023:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Companies will be outsourcing more aspects of their security to managed services. On the surface, this is good for small teams that lack expertise. But will it create disjointed security systems?<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To protect against ransomware, businesses will work on rebuilding endpoints with a sophisticated EDR. It will be a race to decrease their attack surface before they suffer a heavy blow.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The role of the cybersecurity department will become clearer for many companies. There will be less of a disconnect between what is expected of a security team and what it actually does.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud infrastructure security will continue to evolve. We\u2019ll see many new tools and novel approaches here.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI will be at the forefront of innovation, and its adoption will grow. We might see things like neural networks that spot traffic anomalies better than humans do.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=report2022&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a> is also planning to make some big improvements in 2023. Stay tuned for news, and, once again, a huge thanks for choosing our service!<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s tradition now to review the year and share all cybersecurity trends and ANY.RUN&#8216;s updates of the last year. Our team has prepared 2022\u2019s threat stats and hopes it helps you make your best decisions.&nbsp; For a moment, it looked like we were headed for a great year. January began with a huge win against [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4180,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9],"tags":[57,10,15],"class_list":["post-4177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-service-updates","tag-anyrun","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Annual Report 2022 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN team has prepared 2022\u2019s threat stats with top malware families and types and hopes it helps you make your best decisions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Annual Report 2022\",\"datePublished\":\"2023-01-12T08:06:48+00:00\",\"dateModified\":\"2023-03-29T12:04:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\"},\"wordCount\":1501,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\",\"name\":\"Annual Report 2022 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-01-12T08:06:48+00:00\",\"dateModified\":\"2023-03-29T12:04:33+00:00\",\"description\":\"ANY.RUN team has prepared 2022\u2019s threat stats with top malware families and types and hopes it helps you make your best decisions.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Annual Report 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual Report 2022 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN team has prepared 2022\u2019s threat stats with top malware families and types and hopes it helps you make your best decisions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Annual Report 2022","datePublished":"2023-01-12T08:06:48+00:00","dateModified":"2023-03-29T12:04:33+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/"},"wordCount":1501,"commentCount":2,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware"],"articleSection":["Cybersecurity Lifehacks","Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/","url":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/","name":"Annual Report 2022 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-01-12T08:06:48+00:00","dateModified":"2023-03-29T12:04:33+00:00","description":"ANY.RUN team has prepared 2022\u2019s threat stats with top malware families and types and hopes it helps you make your best decisions.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Annual Report 2022"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4177"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4177"}],"version-history":[{"count":4,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4177\/revisions"}],"predecessor-version":[{"id":4643,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4177\/revisions\/4643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4180"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}