Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  •  
  • Filter
  • Time
  • Show
Clear All
new posts

  • Turla renews its arsenal with Topinambour

    Turla renews its arsenal with Topinambour

    2019 has seen the Turla actor actively renew its arsenal. Its developers are still using a familiar coding style, but they’re creating new tools. Here we’ll tell you about several of them, namely “Topinambour” and its related modules.

    More...
    See more | Go to post

  • New FinSpy iOS and Android implants revealed ITW

    New FinSpy iOS and Android implants revealed ITW

    FinSpy is used to collect a variety of private user information on various platforms. Since 2011 Kaspersky has continuously monitored the development of this malware and the emergence of new versions in the wild. According to our telemetry, several dozen unique mobile devices have been infected over the past year, with recent activity recorded in Myanmar in June 2019.

    More...
    See more | Go to post

  • ‘Twas the night before

    ‘Twas the night before

    Recently, the United States Cyber Command highlighted several VirusTotal uploads of theirs – and the executable objects relating to 2016 – 2017 NewsBeef/APT33 activity are interesting for a variety of reasons.

    More...
    See more | Go to post

  • Sodin ransomware exploits Windows vulnerability and processor architecture

    Sodin ransomware exploits Windows vulnerability and processor architecture

    When Sodin appeared in the first half of 2019, it immediately caught our attention for distributing itself through an Oracle Weblogic vulnerability and carrying out attacks on MSP providers.

    More...
    See more | Go to post

  • How we hacked our colleague’s smart home

    How we hacked our colleague’s smart home

    In this article, we publish the results of our study of the Fibaro Home Center smart home. We identified vulnerabilities in Fibaro Home Center 2 and Fibaro Home Center Lite version 4.540, as well as vulnerabilities in the online API.

    More...
    See more | Go to post

  • Criminals, ATMs and a cup of coffee

    Criminals, ATMs and a cup of coffee

    In spring 2019, we discovered a new ATM malware sample written in Java that was uploaded to a multiscanner service from Mexico and later from Colombia. After a brief analysis, it became clear that the malware, which we call ATMJaDi, can cash out ATMs.

    More...
    See more | Go to post

  • ViceLeaker Operation: mobile espionage targeting Middle East

    ViceLeaker Operation: mobile espionage targeting Middle East

    In May 2018, we discovered a campaign targeting dozens of mobile Android devices belonging to Israeli citizens. We decided to call the operation “ViceLeaker”, because of strings and variables in its code.

    More...
    See more | Go to post

  • Riltok mobile Trojan: A banker with global reach

    Riltok mobile Trojan: A banker with global reach

    Riltok is one of numerous families of mobile banking Trojans with standard (for such malware) functions and distribution methods. Originally intended to target the Russian audience, the banker was later adapted for the European “market.

    More...
    See more | Go to post

  • Plurox: Modular backdoor

    Plurox: Modular backdoor

    The analysis showed the Backdoor.Win32.Plurox to have a few quite unpleasant features. What’s more, the backdoor is modular, which means that its functionality can be expanded with the aid of plugins.

    More...
    See more | Go to post

  • What kids get up to online

    What kids get up to online

    To help children avoid potential dangers in the digital world, parents must understand what their children are interested in, know about the latest online trends, and be aware of ​​what might pose a risk.

    More...
    See more | Go to post
There are no articles in this category.
 
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Turla renews its arsenal with Topinambour
    by willie
    2019 has seen the Turla actor actively renew its arsenal. Its developers are still using a familiar coding style, but they’re creating new tools. Here we’ll tell you about several of them, namely “Topinambour” and its related modules.

    More...
    16-07-2019, 19:37
  • New FinSpy iOS and Android implants revealed ITW
    by willie
    FinSpy is used to collect a variety of private user information on various platforms. Since 2011 Kaspersky has continuously monitored the development of this malware and the emergence of new versions in the wild. According to our telemetry, several dozen unique mobile devices have been infected over the past year, with recent activity recorded in Myanmar in June 2019.

    More...
    10-07-2019, 15:00
  • Platinum is back
    by willie
    In June 2018, we came across an unusual set of samples spreading throughout South and Southeast Asian countries targeting diplomatic, government and military entities.

    More...
    04-07-2019, 18:39
  • What kids get up to online
    by willie
    To help children avoid potential dangers in the digital world, parents must understand what their children are interested in, know about the latest online trends, and be aware of ​​what might pose a risk.

    More...
    04-07-2019, 18:39
  • Plurox: Modular backdoor
    by willie
    The analysis showed the Backdoor.Win32.Plurox to have a few quite unpleasant features. What’s more, the backdoor is modular, which means that its functionality can be expanded with the aid of plugins.

    More...
    04-07-2019, 18:39
  • Riltok mobile Trojan: A banker with global reach
    by willie
    Riltok is one of numerous families of mobile banking Trojans with standard (for such malware) functions and distribution methods. Originally intended to target the Russian audience, the banker was later adapted for the European “market.

    More...
    04-07-2019, 18:39
Working...
X