Announcement

Collapse
No announcement yet.

Zero-day vulnerability in Telegram

Collapse
X
Collapse

  • Zero-day vulnerability in Telegram

    In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when a user sends files over the messenger service.

    More...
      Posting comments is disabled.

    Categories

    Collapse

    Article Tags

    Collapse

    Latest Articles

    Collapse

    • DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign
      willie
      This website for volunteers in Venezuela appeared online on February 6th. Only a few days later, on February 11th, the day after the public announcement of the initiative, another almost identical website appeared with a very similar domain name and structure.

      More...
      15-02-2019, 06:14
    • DDoS Attacks in Q4 2018
      willie
      For the third quarter in a row, the Top 10 ratings of countries by number of attacks, targets, and botnet C&C servers continue to fluctuate. Growth in DDoS activity is strongest where previously it was relatively low, while the once-dominant countries have seen a decline.

      More...
      08-02-2019, 23:40
    • Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities
      willie
      Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic entities based in Iran. The attackers were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation.

      More...
      31-01-2019, 00:51
    • Razy in search of cryptocurrency
      willie
      Last year, we discovered malware that installs a malicious browser extension on its victim’s computer or infects an already installed extension. To do so, it disables the integrity check for installed extensions and automatic updates for the targeted browser. Kaspersky Lab products detect the malicious program as Trojan.Win32.Razy.gen.

      More...
      31-01-2019, 00:51
    • GreyEnergy’s overlap with Zebrocy
      willie
      We have identified an overlap between GreyEnergy, which is believed to be a successor to BlackEnergy group, and a Sofacy subset called “Zebrocy”. Both used the same servers at the same time and targeted the same organization.

      More...
      31-01-2019, 00:51
    • Razy in search of cryptocurrency
      willie
      Last year, we discovered malware that installs a malicious browser extension on its victim’s computer or infects an already installed extension. To do so, it disables the integrity check for installed extensions and automatic updates for the targeted browser. Kaspersky Lab products detect the malicious program as Trojan.Win32.Razy.gen.

      More...
      27-01-2019, 20:38
    Working...
    X