Announcement

Collapse
No announcement yet.

Zero-day vulnerability in Telegram

Collapse
X
Collapse

  • Zero-day vulnerability in Telegram

    In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when a user sends files over the messenger service.

    More...
      Posting comments is disabled.

    Categories

    Collapse

    Article Tags

    Collapse

    Latest Articles

    Collapse

    • Roaming Mantis dabbles in mining and phishing multilingually
      willie
      In May, while monitoring Roaming Mantis, aka MoqHao and XLoader, we observed significant changes in their M.O. The group’s activity expanded geographically and they broadened their attack/evasion methods. Their landing pages and malicious apk files now support 27 languages covering Europe and the Middle East.

      More...
      19-05-2018, 18:09
    • IT threat evolution Q1 2018. Statistics
      willie
      According to KSN, Kaspersky Lab solutions blocked 796,806,112 attacks launched from online resources located in 194 countries across the globe.

      More...
      15-05-2018, 09:12
    • IT threat evolution Q1 2018
      willie
      In January, we uncovered a sophisticated mobile implant Skygofree that provides attackers with remote control of infected Android devices. Network worm OlympicDestroyer attacked on the Olympic infrastructure just before the opening of the games in February.

      More...
      15-05-2018, 09:12
    • OPC UA security analysis
      willie
      This article discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. We hope to draw the attention of vendors that develop software for industrial automation systems and the industrial IoT to problems associated with using such widely available technologies.

      More...
      10-05-2018, 14:26
    • The King is dead. Long live the King!
      willie
      In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the wild example (CVE-2016-0189). This particular vulnerability and subsequent exploit are interesting for many reasons.

      More...
      09-05-2018, 14:20
    • SynAck targeted ransomware uses the Doppelgänging technique
      willie
      In April 2018, we spotted the first ransomware employing the Process Doppelgänging technique – SynAck ransomware. It should be noted that SynAck is not new, but a recently discovered sample caught our attention after it was found to be using Process Doppelgänging. Here we present the results of our investigation of this new SynAck variant.

      More...
      07-05-2018, 11:37
    Working...
    X