Malware of this family is used by cybercriminals to stay anonymous when performing malicious actions via the Internet. Cybercriminals use an infected computer as a proxy between their computer and the web resources being accessed. Since all contact with the web resources is made through the proxy, information about the attacker’s computer is hidden.
Geographical distribution of attacks by the Trojan-Proxy.Win32.Lethic family
Geographical distribution of attacks during the period from 20 April 2015 to 20 April 2016
Top 10 countries with most attacked users (% of total attacks)
* Percentage among all unique Kaspersky users worldwide who were attacked by this malware