welcome to

Industry Reports

The Global Threat Landscape Report - 2017

This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting
devices in the IoT space.


2017 Ransomware Report

The most comprehensive research to date, revealing how corporate IT and security professionals are dealing with the evolving ransomware threat and how organizations are preparing to better protect their critical data and IT infrastructure.


Spam and Phishing in the First Quarter of 2016

When it comes to persistent Internet pests, spam is a veteran. Seemingly innocent, this old threat now delivers one of the newest, and most dangerous payloads yet – crypto ransomware.


Petya Ransomware Goes Low Level: Analysis and Full Details on Bitdefender's Vaccine Preventing File Encryption

The new Petya ransomware seems to have been built with speed in mind, as to expedite the encryption process. While traditional ransomware encrypts files one by one, Petya encrypts the location containing all information about disk files, such as size, permissions, and data content, essentially preventing users from accessing all their data.

Bitdefender was able to analyze the Petya ransomware and offer potential victims a tool that intercepts the encryption process and offers the decryption key, free of charge. Most importantly, the tool needs to be installed prior to being infected - not afterwards – in order to perform its function correctly.


Android Ransomware and SMS-Sending Trojans Remain a Growing Threat - Android Malware Threat Report H2 2015

Ransomware has been plaguing Windows PC for the past couple of years, but recently it seems to have developed platform-agnostic capabilities and has moved towards Linux and Android.

While not yet as advanced as its Windows counterpart, Android ransomware can still cause massive headaches, disruptions and financial losses. Bitdefender Android telemetry shows the Android.Trojan.Slocker ransomware family ranked first in UK, German and Australian charts, based on the number of devices that reported it.

Android ransomware could be considered more important than it's PC counterpart because mobile devices have access to and store a lot of personal and even corporate data that's usually not backed up. Losing that data or simply being denied access to it could be irreversible and users would be far more inclined to pay to recover their contacts, conversations, pictures and documents.


The Internet of Things: Risks in the Connected Home

Bitdefender believes the IoT can reach its full potential only if interactions between users, devices, applications and the cloud are authentic and secure.

In this light, researchers from Bitdefender Labs examined four Internet-connected consumer devices and found several common vulnerabilities. The analysis reveals that current authentication mechanisms of internet-connected devices can easily be bypassed to expose smart households and their inhabitants to privacy theft.


Ransomware. A Victim's Perspective A study on US and European Internet Users

Biological viruses try to adapt to their surroundings to survive. Some fail, but some thrive, even spreading to become an epic epidemic. Cyber-threats are no different. In 2015, ransomware caused $350 million in damage, living up to its reputation as the most significant menace targeting Internet users and organizations to date.

A study Bitdefender conducted in November 2015 on 3,009 Internet users from the US, France, Germany, Denmark, the UK and Romania offers a victim's perspective on data loss through crypto-ransomware. What motivates victims to pay up? How much do they value their data? What role does antivirus protection play in the problem-solving equation?


APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information

The discovery of Stuxnet in the nuclear processing plant in Natanz, Iran laid the ground for a new family of cyber-attacks: advanced persistent threats. Although the term has since become highly popular, state-sponsored cyber-intelligence operations have been carried out since long before the advent of Stuxnet or Flamer; less known advanced persistent threats such as APT28 (or Sofacy) have been covertly running in Europe since 2007.

To connect the dots between an identified attack and the state actor(s) behind it, companies like Bitdefender look for solid evidence inside the APT code or in the used communication infrastructure. The following report is a technical investigation of some particularities in the APT28 payload implementation that allowed us to link the threat to its operators.


IT Security: Creating Heroes Instead of Headaches

An Executive Brief that explains how security leaders can take a more proactive approach to their security operations, and weave it into the total IT strategy.


HIPAA compliance: what you need to know about security for virtualization and cloud environments

This eGuide provides an overview of HIPAA and the challenges it presents to healthcare and other related industries, the impact the legislation is having on several technology areas, and how trends such as cloud and mobility may impact compliance efforts.


Newest Data Center Dilemma: Security vs. Performance

This Executive Brief, written by CIO Insight and sponsored by Bitdefender, explains how traditional security solutions can undermine the benefits of virtualization, and how you can address this challenge.


Security Business Review – Q4:2014

Brought to you by Bitdefender Labs, the Security Business Review is an analysis of some the most pervasive IT security threats affecting businesses.

We discuss the evolution of threats and the methods and techniques used to attack business.
With new threats emerging on an hourly basis, you need to be informed and prepared.

We’ve included some of our own findings as well as industry best practices to give you an overview of how critical company data can be compromised, and most importantly help prepare you with knowledge and advice to help mitigate threats.