Here is the rewritten article in markdown format:
Cybersecurity in the Republic of Moldova: 2015-2020 Report
===========================================================
Overview
This report highlights various aspects of cyber threats and attacks faced by the government and private sectors of the Republic of Moldova between 2015 and 2020.
Key Findings
- Malware Infections: Between 2015-2019, a total of 43,334 reports on malware activity were processed in Moldova, with 27,879 (64.33%) being related to government networks.
- Trend of Cyber Attacks: In 2018, the most common incident classes in order of frequency of alerts were:
- Vulnerable system
- Compromise system
- Botnet
- Malware
- Attack
- Ransomware Attacks: Ransomware attacks targeting public sector increased in 2019 due to their ability to pay higher ransoms.
- Cryptojacking: Unauthorized cryptocurrency mining activities have become a significant threat, mainly by exploiting vulnerabilities in websites or network equipment (cryptojacking).
- Malware Detection: The top five strains of malware targeting businesses in 2019 were:
- Trojan.Emotet
- Adware
- InstallCore
- HackTool.WinActivator
- Riskware.BitCoinMiner
Regional Infection Rates and Malware Networks
- Regional Infection Rates: In 2018, most infected information systems were located in:
- Chisinau (58.92%)
- Tiraspol (30.72%)
- Bendery (3.38%)
- Balti (1.36%)
- Control and Routing Servers: The malware network was directed by approximately 764 control and routing (C&C) servers located in 44 countries around the world, with most being:
- United States (30%)
- Germany (19%)
- Sweden (14%)
Conclusion
The report highlights the main objective of the offensive actions carried out by cyber actors as the exfiltration of information of strategic interest through Advanced Persistent Threats (APTs).