Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • Threats posed by using RATs in ICS

    Threats posed by using RATs in ICS

    While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors had used RATs to attack industrial organizations.

    More...
    See more | Go to post

  • New trends in the world of IoT threats

    New trends in the world of IoT threats

    Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times more than in 2016. That doesn’t bode well for the years ahead.

    More...
    See more | Go to post

  • Threats posed by using RATs in ICS

    Threats posed by using RATs in ICS

    While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors had used RATs to attack industrial organizations.

    More...
    See more | Go to post

  • New trends in the world of IoT threats

    New trends in the world of IoT threats

    Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times more than in 2016. That doesn’t bode well for the years ahead.

    More...
    See more | Go to post

  • LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company

    Since March 2018 we have discovered several infections where a previously unknown Trojan was injected into the lsass.exe system process memory. This campaign was active immediately prior to Central Asian high-level meeting and we suppose that actor behind still follows regional political agenda.

    More...
    See more | Go to post

  • Threat Landscape for Industrial Automation Systems in H1 2018

    Threat Landscape for Industrial Automation Systems in H1 2018

    In this report, Kaspersky Lab ICS CERT publishes the findings of its research on the threat landscape for industrial automation systems conducted during the first half of 2018.

    More...
    See more | Go to post

  • We know what your kids did this summer

    We know what your kids did this summer

    For many kids and teenagers, summer is all about ditching school books in favor of hobbies and fun. Every year we release a report on children's interests, as reflected in their online activity. This summer, we investigated what they prefer in their free time.

    More...
    See more | Go to post

  • What are botnets downloading?

    What are botnets downloading?

    Every day we intercept numerous file-download commands sent to bots of various types and families. Here we present the results of our botnet activity analysis for H2 2017 and H1 2018.

    More...
    See more | Go to post

  • Loki Bot: On a hunt for corporate passwords

    Loki Bot: On a hunt for corporate passwords

    Starting in early July, we have seen malicious spam activity that has targeted corporate mailboxes. Messages discovered so far contain an attachment with an .iso extension, which Kaspersky Lab solutions detect as Loki Bot.

    More...
    See more | Go to post

  • BusyGasper – the unfriendly spy

    BusyGasper – the unfriendly spy

    In early 2018 we found a suspicious Android sample that, as it turned out, belonged to an unknown spyware family. Further investigation showed that the malware, which we named BusyGasper, is not all that sophisticated, but demonstrates some unusual features for this type of threat.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Threats posed by using RATs in ICS
    willie
    While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors had used RATs to attack industrial organizations.

    More...
    21-09-2018, 09:26
  • New trends in the world of IoT threats
    willie
    Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times more than in 2016. That doesn’t bode well for the years ahead.

    More...
    21-09-2018, 09:26
  • Threats posed by using RATs in ICS
    willie
    While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors had used RATs to attack industrial organizations.

    More...
    20-09-2018, 14:36
  • New trends in the world of IoT threats
    willie
    Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times more than in 2016. That doesn’t bode well for the years ahead.

    More...
    19-09-2018, 15:48
  • LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company
    willie
    Since March 2018 we have discovered several infections where a previously unknown Trojan was injected into the lsass.exe system process memory. This campaign was active immediately prior to Central Asian high-level meeting and we suppose that actor behind still follows regional political agenda.

    More...
    11-09-2018, 10:13
  • Threat Landscape for Industrial Automation Systems in H1 2018
    willie
    In this report, Kaspersky Lab ICS CERT publishes the findings of its research on the threat landscape for industrial automation systems conducted during the first half of 2018.

    More...
    06-09-2018, 15:50
Working...
X