Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • Spam and phishing in Q1 2018

    Spam and phishing in Q1 2018

    The quarter's main topic, one that we will likely return to many times this year, is personal data. It remains one of the most sought-after wares in the world of information technology for app and service developers, owners of various agencies, and, of course, cybercriminals. Unfortunately, many users still fail to grasp the need to protect their personal information and don’t pay attention to who and how their data is transferred in social media.

    More...
    See more | Go to post

  • I know where your pet is

    I know where your pet is

    It would seem that no gadget has escaped the attention of hackers, yet there is one last bastion: "smart" devices for animals. For example, trackers to monitor their location.

    More...
    See more | Go to post

  • Roaming Mantis dabbles in mining and phishing multilingually

    Roaming Mantis dabbles in mining and phishing multilingually

    In May, while monitoring Roaming Mantis, aka MoqHao and XLoader, we observed significant changes in their M.O. The group’s activity expanded geographically and they broadened their attack/evasion methods. Their landing pages and malicious apk files now support 27 languages covering Europe and the Middle East.

    More...
    See more | Go to post

  • IT threat evolution Q1 2018. Statistics

    IT threat evolution Q1 2018. Statistics

    According to KSN, Kaspersky Lab solutions blocked 796,806,112 attacks launched from online resources located in 194 countries across the globe.

    More...
    See more | Go to post

  • IT threat evolution Q1 2018

    IT threat evolution Q1 2018

    In January, we uncovered a sophisticated mobile implant Skygofree that provides attackers with remote control of infected Android devices. Network worm OlympicDestroyer attacked on the Olympic infrastructure just before the opening of the games in February.

    More...
    See more | Go to post

  • OPC UA security analysis

    OPC UA security analysis

    This article discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. We hope to draw the attention of vendors that develop software for industrial automation systems and the industrial IoT to problems associated with using such widely available technologies.

    More...
    See more | Go to post

  • The King is dead. Long live the King!

    The King is dead. Long live the King!

    In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the wild example (CVE-2016-0189). This particular vulnerability and subsequent exploit are interesting for many reasons.

    More...
    See more | Go to post

  • SynAck targeted ransomware uses the Doppelgänging technique

    SynAck targeted ransomware uses the Doppelgänging technique

    In April 2018, we spotted the first ransomware employing the Process Doppelgänging technique – SynAck ransomware. It should be noted that SynAck is not new, but a recently discovered sample caught our attention after it was found to be using Process Doppelgänging. Here we present the results of our investigation of this new SynAck variant.

    More...
    See more | Go to post

  • Who’s who in the Zoo

    Who’s who in the Zoo

    ZooPark is a cyberespionage operation that has been focusing on Middle Eastern targets since at least June 2015. The threat actors behind the operation infect Android devices using several generations of malware, with the attackers including new features in each iteration.

    More...
    See more | Go to post

  • DDoS attacks in Q1 2018

    DDoS attacks in Q1 2018

    In Q1 2018, we observed a significant increase in both the total number and duration of DDoS attacks against Q4 2017. The new Linux-based botnets Darkai (a Mirai clone) and AESDDoS are largely responsible for this hike.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Calisto Trojan for macOS
    willie
    As researchers we interesting in developmental prototypes of malware that have had limited distribution or not even occurred in the wild. We recently came across one such sample: a macOS backdoor that we named Calisto.

    More...
    20-07-2018, 16:42
  • Online generators… of dashed expectations
    willie
    Quite recently, we started to designate an entire class of sites — gift card generators — as fraudulent, despite their not stealing any money or personal data from visitors. Why? Let's try to unpick these sites and see how they work.

    More...
    19-07-2018, 10:05
  • The return of Fantomas, or how we deciphered Cryakl
    willie
    This spring marked the fourth anniversary of the malware's first attacks. Against the backdrop of a general decline in ransomware activity (see our report), we decided to return to the topic of Cryakl and tell in detail about how one of the most eye-catching members of this endangered species evolved.

    More...
    17-07-2018, 13:10
  • In cryptoland, trust can be costly
    willie
    While the legal status of cryptocurrencies and laws to regulate them continue to be hammered out, scammers are busy exploiting the digital gold rush. Besides hacking cryptocurrency exchanges, exploiting smart-contract vulnerabilities, and deploying malicious miners, cybercriminals are also resorting to more traditional social-engineering methods that can reap millions of dollars.

    More...
    15-07-2018, 10:59
  • Coinvault, the court case
    willie
    Today, after almost 3 years of waiting, it was finally the day of the trial. In the Netherlands, where the whole case took place, the hearings are open to the public. Meaning anyone who is interested can visit. And it was quite busy.

    More...
    13-07-2018, 18:03
  • APT Trends Report Q2 2018
    willie
    These summaries are a representative snapshot of what has been discussed in greater detail in our private reports during Q2 2018. They aim to highlight the significant events and findings that we feel people should be aware of.

    More...
    11-07-2018, 10:36
Working...
X