IT threat evolution in Q1 2026. Non-mobile statistics
IT threat evolution in Q1 2026. Mobile statistics
The statistics in this report are based on detection verdicts returned by Kaspersky products unless otherwise stated. The information was provided by Kaspersky users who consented to sharing statistical data.
Quarterly figures
In Q1 2026:
- Kaspersky products blocked more than 343 million attacks that originated with various online resources.
- Web Anti-Virus responded to 50 million unique links.
- File Anti-Virus blocked nearly 15 million malicious and potentially unwanted objects.
- 2938 new ransomware variants were detected.
- More than 77,000 users experienced ransomware attacks.
- 14% of all ransomware victims whose data was published on threat actors’ data leak sites (DLS) were victims of Clop.
- More than 260,000 users were targeted by miners.
Ransomware
Quarterly trends and highlights
Law enforcement success
In January 2026, it was reported that the FBI had seized the domains of the RAMP cybercrime forum, a major platform used extensively by ransomware developers to advertise their RaaS programs and to recruit affiliates. There has been no official statement from the FBI, nor is it clear if RAMP servers were seized. In a post on an external website, a RAMP moderator mentioned law enforcement agencies gaining control over the forum. The takedown disrupted a key element of the RaaS ecosystem, creating ripple effects for ransomware operators, affiliates, and initial access brokers.
A man suspected of links to the Phobos group was apprehended in Poland. He was charged with the creation, acquisition, and distribution of software designed for unlawfully obtaining information, including data that facilitates unauthorized access to information stored within a computer system.
In March, a Phobos ransomware administrator pleaded guilty to the creation and distribution of the Trojan, which had been used in international attacks dating back to at least November 2020.
In March, the U.S. Department of Justice charged a man who had acted as a negotiator for ransomware groups. The company he worked for specializes in cyberincident investigations. The prosecution alleges the suspect colluded with the BlackCat threat actor to share privileged insights into the ongoing progress of negotiations. Additionally, the suspect is alleged to have had a prior direct role in BlackCat attacks, serving as an affiliate for the RaaS operation.
In a separate development this March, a U.S. court sentenced an initial access broker associated with the Yanluowang ransomware group to 81 months of imprisonment. According to the U.S. Department of Justice, the convict facilitated dozens of ransomware attacks across the United States, resulting in over $9 million in actual loss and more than $24 million in intended loss.
Vulnerabilities and attacks
The Interlock group has been heavily exploiting the CVE-2026-20131 zero-day vulnerability in Cisco Secure FMC firewall management software since at least January 26, 2026. The vulnerability enabled arbitrary Java code execution with root privileges on the affected device. This campaign demonstrates the ongoing reliance on zero-day vulnerabilities for initial access, a focus on network appliances as high-value entry points, and the rapid weaponization of new vulnerabilities within the ransomware ecosystem.
The most prolific groups
This section highlights the most prolific ransomware gangs by number of victims added to each group’s DLS. This quarter, the Clop ransomware (14.42%) returned to the top of the rankings, displacing Qilin (12.34%), which had held the leading position in the previous reporting period. Following closely is a new threat actor, The Gentlemen (9.25%). Emerging no later than July 2025, the group had already surpassed the activity levels of mainstays such as Akira (7.25%) and INC Ransom (6.13%).
Number of each group’s victims according to its DLS as a percentage of all groups’ victims published on all the DLSs under review during the reporting period (download)
Number of new variants
In Q1 2026, Kaspersky solutions detected six new ransomware families and 2938 new modifications. Volumes have returned to Q3 2025 levels following a surge in Q4 2025.
Number of new ransomware modifications, Q1 2025 — Q1 2026 (download)
Number of users attacked by ransomware Trojans
Throughout Q1, our solutions protected 77,319 unique users from ransomware. Ransomware activity was highest in March, with 35,056 unique users encountering such attacks during the month.
Number of unique users attacked by ransomware Trojans, Q1 2026 (download)
Attack geography
TOP 10 countries and territories attacked by ransomware Trojans
| Country/territory* | %** | |
| 1 | Pakistan | 0.79 |
| 2 | South Korea | 0.64 |
| 3 | China | 0.52 |
| 4 | Tajikistan | 0.40 |
| 5 | Libya | 0.38 |
| 6 | Turkmenistan | 0.36 |
| 7 | Iraq | 0.35 |
| 8 | Bangladesh | 0.33 |
| 9 | Rwanda | 0.30 |
| 10 | Cameroon | 0.28 |
* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by ransomware Trojans as a percentage of all unique users of Kaspersky products in the country/territory.
TOP 10 most common families of ransomware Trojans
| Name | Verdict | %* | |
| 1 | (generic verdict) | Trojan-Ransom.Win32.Gen | 33.90 |
| 2 | (generic verdict) | Trojan-Ransom.Win32.Crypren | 6.38 |
| 3 | WannaCry | Trojan-Ransom.Win32.Wanna | 5.87 |
| 4 | (generic verdict) | Trojan-Ransom.Win32.Encoder | 4.68 |
| 5 | (generic verdict) | Trojan-Ransom.Win32.Agent | 3.80 |
| 6 | LockBit | Trojan-Ransom.Win32.Lockbit | 2.80 |
| 7 | (generic verdict) | Trojan-Ransom.Win32.Phny | 1.99 |
| 8 | (generic verdict) | Trojan-Ransom.MSIL.Agent | 1.96 |
| 9 | (generic verdict) | Trojan-Ransom.Python.Agent | 1.93 |
| 10 | (generic verdict) | Trojan-Ransom.Win32.Crypmod | 1.89 |
* Unique Kaspersky users attacked by the specific ransomware Trojan family as a percentage of all unique users attacked by this type of threat.
Miners
Number of new variants
In Q1 2026, Kaspersky solutions detected 3485 new modifications of miners.
Number of new miner modifications, Q1 2026 (download)
Number of users attacked by miners
In Q1, we detected attacks using miner programs on the computers of 260,588 unique Kaspersky users worldwide.
Number of unique users attacked by miners, Q1 2026 (download)
Attack geography
TOP 10 countries and territories attacked by miners
| Country/territory* | %** | |
| 1 | Senegal | 3.19 |
| 2 | Turkmenistan | 3.06 |
| 3 | Mali | 2.63 |
| 4 | Tanzania | 1.62 |
| 5 | Bangladesh | 1.06 |
| 6 | Ethiopia | 0.95 |
| 7 | Panama | 0.88 |
| 8 | Afghanistan | 0.79 |
| 9 | Kazakhstan | 0.77 |
| 10 | Bolivia | 0.75 |
* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by miners as a percentage of all unique users of Kaspersky products in the country/territory.
Attacks on macOS
In Q1 2026, Google uncovered a new cryptocurrency theft campaign. The scammers directed victims to a fraudulent video call, prompting them to execute malicious scripts under the guise of technical support fixes for connection problems.
In March, researchers with GTIG and iVerify reported the discovery of an in-the-wild exploit chain targeting both iOS and macOS devices. The exploit kit was apparently marketed on the dark web, providing threat actors with a suite of spyware capabilities alongside specialized cryptocurrency exfiltration modules. The exploit was delivered via drive-by downloads when victims visited various compromised websites. Our analysis confirmed that the toolkit included an updated version of a component previously identified in the Operation Triangulation attack chain.
Devices running macOS were similarly impacted by the high-profile supply chain attack targeting the Axios npm package, a widely used HTTP client for JavaScript. The installation of the infected package led to the deployment of a backdoor on macOS devices.
TOP 20 threats to macOS
Unique users* who encountered this malware as a percentage of all attacked users of Kaspersky security solutions for macOS (download)
* Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.
The share of PasivRobber spyware attacks is beginning to decline, giving way to more traditional adware and Monitor-class software capable of tracking user activity. The popular Amos stealer also maintains its presence within the TOP 20.
Geography of threats to macOS
TOP 10 countries and territories by share of attacked users
| Country/territory | %* Q4 2025 | %* Q1 2026 |
| China | 1.28 | 1.97 |
| France | 1.18 | 1.07 |
| Brazil | 1.13 | 0.98 |
| Mexico | 0.72 | 0.52 |
| Germany | 0.71 | 0.45 |
| The Netherlands | 0.62 | 0.75 |
| Hong Kong | 0.49 | 0.53 |
| India | 0.42 | 0.48 |
| Russian Federation | 0.34 | 0.37 |
| Thailand | 0.24 | 0.27 |
* Unique users who encountered threats to macOS as a percentage of all unique Kaspersky users in the country/territory.
IoT threat statistics
This section presents statistics on attacks targeting Kaspersky IoT honeypots. The geographic data on attack sources is based on the IP addresses of attacking devices.
In Q1 2026, the share of devices attacking Kaspersky honeypots via the SSH protocol saw a significant increase compared to the previous reporting period.
Distribution of attacked services by number of unique IP addresses of attacking devices (download)
The distribution of attacks between Telnet and SSH maintained the ratio observed in Q4 2025.
Distribution of attackers’ sessions in Kaspersky honeypots (download)
TOP 10 threats delivered to IoT devices
Share of each threat delivered to an infected device as a result of a successful attack, out of the total number of threats delivered (download)
The primary shifts in the IoT threat distribution are linked to the activity of various Mirai botnet variants, although members of this family continue to account for the majority of the list. Furthermore, a new variant, Mirai.kl, surfaced in the rankings. We also observed a significant decline in NyaDrop botnet activity during Q1.
Attacks on IoT honeypots
The United States, the Netherlands, and Germany accounted for the highest proportions of SSH-based attacks during this period.
| Country/territory | Q4 2025 | Q1 2026 |
| United States | 16.10% | 23.74% |
| The Netherlands | 15.78% | 17.57% |
| Germany | 12.07% | 10.34% |
| Panama | 7.72% | 6.34% |
| India | 5.32% | 6.05% |
| Romania | 4.05% | 5.82% |
| Australia | 1.62% | 4.61% |
| Vietnam | 4.21% | 3.50% |
| Russian Federation | 3.79% | 2.35% |
| Sweden | 2.25% | 2.09% |
China continues to account for the largest proportion of Telnet attacks, though there was a marked increase in activity originating from Pakistan.
| Country/territory | Q4 2025 | Q1 2026 |
| China | 53.64% | 39.54% |
| Pakistan | 14.27% | 27.31% |
| Russian Federation | 8.20% | 8.25% |
| Indonesia | 8.58% | 6.71% |
| India | 4.85% | 4.66% |
| Brazil | 0.06% | 3.30% |
| Argentina | 0.02% | 2.51% |
| Nigeria | 1.22% | 1.38% |
| Thailand | 0.01% | 0.55% |
| Sweden | 0.54% | 0.55% |
Attacks via web resources
The statistics in this section are based on detection verdicts by Web Anti-Virus, which protects users when suspicious objects are downloaded from malicious or infected web pages. These malicious pages are purposefully created by cybercriminals. Websites that host user-generated content, such as message boards, as well as compromised legitimate sites, can become infected.
TOP 10 countries and territories that served as sources of web-based attacks
The following statistics show the distribution by country/territory of the sources of internet attacks blocked by Kaspersky products on user computers (web pages redirecting to exploits, sites containing exploits and other malicious programs, botnet C&C centers, and so on). One or more web-based attacks could originate from each unique host.
To determine the geographic source of web attacks, we matched the domain name with the real IP address where the domain is hosted, then identified the geographic location of that IP address (GeoIP).
In Q1 2026, Kaspersky solutions blocked 343,823,407 attacks launched from internet resources worldwide. Web Anti-Virus was triggered by 49,983,611 unique URLs.
Web-based attacks by country/territory, Q1 2026 (download)
Countries and territories where users faced the greatest risk of online infection
To assess the risk of malware infection via the internet for users’ computers in different countries and territories, we calculated the share of Kaspersky users in each location on whose computers Web Anti-Virus was triggered during the reporting period. The resulting data provides an indication of the aggressiveness of the environment in which computers operate in different countries and territories.
This ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out Web Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.
| Country/territory* | %** | |
| 1 | Venezuela | 9.33 |
| 2 | Hungary | 8.16 |
| 3 | Italy | 7.58 |
| 4 | Tajikistan | 7.48 |
| 5 | India | 7.21 |
| 6 | Greece | 7.13 |
| 7 | Portugal | 7.10 |
| 8 | France | 7.05 |
| 9 | Belgium | 6.83 |
| 10 | Slovakia | 6.80 |
| 11 | Vietnam | 6.62 |
| 12 | Bosnia and Herzegovina | 6.57 |
| 13 | Canada | 6.56 |
| 14 | Serbia | 6.50 |
| 15 | Tunisia | 6.36 |
| 16 | Qatar | 6.01 |
| 17 | Spain | 5.95 |
| 18 | Germany | 5.95 |
| 19 | Sri Lanka | 5.89 |
| 20 | Brazil | 5.88 |
* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users targeted by web-based Malware attacks as a percentage of all unique users of Kaspersky products in the country/territory.
On average during the quarter, 4.73% of users’ computers worldwide were subjected to at least one Malware web attack.
Local threats
Statistics on local infections of user computers are an important indicator. They include objects that penetrated the target computer by infecting files or removable media, or initially made their way onto the computer in non-open form. Examples of the latter are programs in complex installers and encrypted files.
Data in this section is based on analyzing statistics produced by anti-virus scans of files on the hard drive at the moment they were created or accessed, and the results of scanning removable storage media. The statistics are based on detection verdicts from the On-Access Scan (OAS) and On-Demand Scan (ODS) modules of File Anti-Virus and include detections of malicious programs located on user computers or removable media connected to the computers, such as flash drives, camera memory cards, phones, or external hard drives.
In Q1 2026, our File Anti-Virus detected 15,831,319 malicious and potentially unwanted objects.
Countries and territories where users faced the highest risk of local infection
For each country and territory, we calculated the percentage of Kaspersky users whose computers had the File Anti-Virus triggered at least once during the reporting period. This statistic reflects the level of personal computer infection in different countries and territories around the world.
Note that this ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out File Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.
| Country/territory* | %** | |
| 1 | Turkmenistan | 47.96 |
| 2 | Tajikistan | 31.48 |
| 3 | Cuba | 31.03 |
| 4 | Yemen | 29.59 |
| 5 | Afghanistan | 28.47 |
| 6 | Burundi | 26.93 |
| 7 | Uzbekistan | 24.81 |
| 8 | Syria | 23.08 |
| 9 | Nicaragua | 21.97 |
| 10 | Cameroon | 21.60 |
| 11 | China | 21.09 |
| 12 | Mozambique | 21.02 |
| 13 | Algeria | 20.64 |
| 14 | Democratic Republic of the Congo | 20.63 |
| 15 | Bangladesh | 20.44 |
| 16 | Mali | 20.35 |
| 17 | Republic of the Congo | 20.23 |
| 18 | Madagascar | 20.00 |
| 19 | Belarus | 19.78 |
| 20 | Tanzania | 19.52 |
* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users on whose computers local Malware threats were blocked, as a percentage of all unique users of Kaspersky products in the country/territory.
On average worldwide, Malware local threats were detected at least once on 11.55% of users’ computers during Q1.
Russia scored 11.92% in these rankings.



IT threat evolution in Q1 2026. Non-mobile statistics