Category: Securelist

Kimsuky’s GoldDragon cluster and its C2 operations

Kimsuky (also known as Thallium, Black Banshee and Velvet Chollima) is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea. This article…

Ransomware updates & 1-day exploits

In this report, we discuss the new multi-platform ransomware RedAlert (aka N13V) and Monster, as well as private 1-day exploits for the CVE-2022-24521 vulnerability. This article has been indexed from Securelist Read the original article: Ransomware updates & 1-day exploits

Black Hat USA 2022 and DEF CON 30

Black Hat 2022 USA Briefings wrapped up this past week, along with its sister conference Defcon 30. Coming back from the COVID hiatus, the conferences were enthusiastically full compared to the 2021 ghost town. This article has been indexed from…

Two more malicious Python packages in the PyPI

We used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI. They were masquerading as one of the most popular open-source packages named “requests“. This article has been indexed from Securelist…

IT threat evolution in Q2 2022. Non-mobile statistics

Our non-mobile malware statistics for Q2 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. This article has been indexed from Securelist Read the original article: IT threat evolution in Q2 2022.…

IT threat evolution in Q2 2022. Mobile statistics

In Q2 2022, we detected 405,684 mobile malware installation packages, of which 55,614 packages were related to mobile banking trojans, and 3,821 packages were mobile ransomware trojans. This article has been indexed from Securelist Read the original article: IT threat…

IT threat evolution Q2 2022

ToddyCat APT and WinDealer man-on-the-side attack, Spring4Shell and other vulnerabilities, ransomware trends and our in-depth analysis of the TTPs of the eight most widespread ransomware families. This article has been indexed from Securelist Read the original article: IT threat evolution…

OpenTIP, command line edition

We released Python-based command line tools for our OpenTIP service that also implement a client class that you can reuse in your own tools. This article has been indexed from Securelist Read the original article: OpenTIP, command line edition

Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly. This article…

DDoS attacks in Q2 2022

Politically-motivated cyberattacks dominated the DDoS landscape in the second quarter of 2022 just as they did in Q1. Also, we saw the continuation of a trend that began in spring: an increase in superlong attacks. This article has been indexed…

APT trends report Q2 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q2 2022. This article has been indexed from Securelist Read the original article: APT trends report Q2 2022

Text-based fraud: from 419 scams to vishing

Text-based fraud (419 scams, vishing, extortion, etc.) is still alive and well. Here, we describe cybercriminal techniques and present statistics. This article has been indexed from Securelist Read the original article: Text-based fraud: from 419 scams to vishing

Text-based fraud: from 419 scams to vishing

Text-based fraud (419 scams, vishing, extortion, etc.) is still alive and well. Here, we describe cybercriminal techniques and present statistics. This article has been indexed from Securelist Read the original article: Text-based fraud: from 419 scams to vishing

Dynamic analysis of firmware components in IoT devices

We decided to discuss less obvious tools for working with firmware, including Renode and Qiling. Each of those tools has its own features, advantages, and limitations that make it effective for certain types of task. This article has been indexed…

Dynamic analysis of firmware components in IoT devices

We decided to discuss less obvious tools for working with firmware, including Renode and Qiling. Each of those tools has its own features, advantages, and limitations that make it effective for certain types of task. This article has been indexed…

The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East. This article has been indexed from Securelist Read…

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’. This article has…

How much does access to corporate infrastructure cost?

This article has been indexed from Securelist What cybercriminals charge for the data of large companies on the dark web – a review of underground forum offers by category. Read the original article: How much does access to corporate infrastructure…

Router security in 2021

This article has been indexed from Securelist We analyze data on vulnerabilities in routers, plus malware that attacks IoT devices: Mirai, NyaDrop, Gafgyt, and other. Read the original article: Router security in 2021

WinDealer dealing on the side

This article has been indexed from Securelist We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack. Read the original article: WinDealer dealing on the side

IT threat evolution in Q1 2022. Non-mobile statistics

This article has been indexed from Securelist PC malware statistics for the Q1 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Read the original article: IT threat evolution in Q1 2022.…

IT threat evolution Q1 2022

This article has been indexed from Securelist Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against Ukraine, phishing kits, Okta hack and more. Read the original article: IT threat…

IT threat evolution in Q1 2022. Mobile statistics

This article has been indexed from Securelist According to Kaspersky Security Network, in Q1 2022 516,617 mobile malware installation packages were detected, of which 53,947 packages were related to mobile banking trojans, and 1,942 packages were mobile ransomware trojans. Read…

Managed detection and response in 2021

This article has been indexed from Securelist Kaspersky Managed Detection and Response (MDR) services in 2021 in facts and figures: number of security incidents detected, their severity, etc. Read the original article: Managed detection and response in 2021

The Verizon 2022 DBIR

This article has been indexed from Securelist The Verizon 2022 Data Breach Investigations Report is out, where Kaspersky collaborated as a contributor. The report provides interesting analysis of a full amount of global incident data. Read the original article: The…

What’s wrong with automotive mobile apps?

This article has been indexed from Securelist Third party automotive mobile apps, web apps and API clients provide drivers with additional functions but may pose security risks for their data. Read the original article: What’s wrong with automotive mobile apps?

ISaPWN – research on the security of ISaGRAF Runtime

This article has been indexed from Securelist This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several vulnerabilities the Kaspersky ICS CERT team had identified. Read the original article:…

HTML attachments in phishing e-mails

This article has been indexed from Securelist In this article we review phishing HTML attachments, explaining common tricks the attackers use, and give statistics on HTML attachments detected by Kaspersky solutions. Read the original article: HTML attachments in phishing e-mails

New ransomware trends in 2022

This article has been indexed from Securelist This year, ransomware is no less active than before: cybercriminals continue to threaten nationwide retailers and enterprises, old variants of malware return while the new ones develop. Read the original article: New ransomware…

Mobile subscription Trojans and their little tricks

This article has been indexed from Securelist Kaspersky analysis of mobile subscription Trojans Joker (Jocker), MobOk, Vesub and GriftHorse and their activity: technical description and statistics. Read the original article: Mobile subscription Trojans and their little tricks

A new secret stash for “fileless” malware

This article has been indexed from Securelist We observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign. It allows the “fileless” last stage Trojan to be hidden…

APT trends report Q1 2022

This article has been indexed from Securelist This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022. Read the original article: APT trends report Q1 2022

DDoS attacks in Q1 2022

This article has been indexed from Securelist Against the backdrop of the conflict between Russia and Ukraine, the number of DDoS attacks in Q1 2022 increased by 4.5 times against Q1 2021. A significant proportion of them were by hacktivists.…

A Bad Luck BlackCat

This article has been indexed from Securelist A new ransomware actor started advertising its services on a Russian underground forum. They presented themselves as ALPHV, but the group is also known as BlackCat. Two recent BlackCat incidents stand out as…

Spring4Shell (CVE-2022-22965): details and mitigations

This article has been indexed from Securelist Technical details and mitigations for CVE-2022-22965 vulnerability (Spring4Shell) that can help an attacker to execute arbitrary code on a remote web server. Read the original article: Spring4Shell (CVE-2022-22965): details and mitigations

Lazarus Trojanized DeFi app for delivering malware

This article has been indexed from Securelist We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a…

CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel

This article has been indexed from Securelist Exploit for CVE-2022-0847 (Dirty Pipe) vulnerability in Linux kernel is available online. Kaspersky solutions detect and prevent exploitation attempts. Read the original article: CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel

Financial cyberthreats in 2021

This article has been indexed from Securelist This report provides insight into 2021 financial threat trends and statistics, including data on banking malware for Windows and Android, banking, payment system and e-shop phishing, etc. Read the original article: Financial cyberthreats…

Mobile malware evolution 2021

This article has been indexed from Securelist In 2021, cybercriminal activity gradually decreased, and attempts to exploit the pandemic topic became less common. However, mobile malware became more advanced, and attacks more complex. Read the original article: Mobile malware evolution…

DDoS attacks in Q4 2021

This article has been indexed from Securelist In Q4 2021, as expected, the number of DDoS attacks rose, while DDoS botnets weaponized a Log4Shell vulnerability. In this report, we present the main DDoS trends and statistics. Read the original article:…

Spam and phishing in 2021

This article has been indexed from Securelist Statistics on spam and phishing with the key trends in 2021: investment scams, fake streaming websites, theft of corporate credentials and COVID-19. Read the original article: Spam and phishing in 2021

Roaming Mantis reaches Europe

This article has been indexed from Securelist We’ve observed some new activities by Roaming Mantis in 2021, and some changes in the Wroba malware that’s mainly used in this campaign. Furthermore, we discovered that France and Germany were added as…

Telehealth: A New Frontier in Medicine—and Security

This article has been indexed from Securelist This report contains statistics and observations on vulnerabilities, phishing schemes and malware related to telehealth. Read the original article: Telehealth: A New Frontier in Medicine—and Security

Telehealth: A New Frontier in Medicine—and Security

This article has been indexed from Securelist This report contains statistics and observations on vulnerabilities, phishing schemes and malware related to telehealth. Read the original article: Telehealth: A New Frontier in Medicine—and Security

MoonBounce: the dark side of UEFI firmware

This article has been indexed from Securelist At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how…

The BlueNoroff cryptocurrency hunt is still on

This article has been indexed from Securelist It appears that BlueNoroff shifted focus from hitting banks and SWIFT-connected servers to solely cryptocurrency businesses as the main source of the group’s illegal income. Read the original article: The BlueNoroff cryptocurrency hunt…

Answering Log4Shell-related questions

This article has been indexed from Securelist Check out the answers to some of users’ biggest security questions about the Log4Shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105). Read the original article: Answering Log4Shell-related questions

How and why do we attack our own Anti-Spam?

This article has been indexed from Securelist How to trick the machine-learning model in Anti-Spam designed to detect and quarantine suspicious e-mails, and how to detect such attacks. Read the original article: How and why do we attack our own…

PseudoManuscrypt: a mass-scale spyware attack campaign

This article has been indexed from Securelist Kaspersky ICS CERT experts identified malware whose loader has some similarities to the Manuscrypt malware, which is part of the Lazarus APT group’s arsenal. Read the original article: PseudoManuscrypt: a mass-scale spyware attack…

Kaspersky Security Bulletin 2021. Statistics

This article has been indexed from Securelist Key statistics for 2021: miners, ransomware, trojan bankers and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. Read the original article: Kaspersky Security Bulletin 2021. Statistics

Kaspersky Managed Detection and Response: interesting cases

This article has been indexed from Securelist Several interesting attacks detected by Kaspersky Managed Detection and Response (MDR): two PrintNightmare exploitation attempts, MuddyWater attack and LSASS credential dumping. Read the original article: Kaspersky Managed Detection and Response: interesting cases

CVE-2021-44228 vulnerability in Apache Log4j library

This article has been indexed from Securelist The summary of the critical vulnerability CVE-2021-44228 in the Apache Log4j library, technical details and mitigations. Read the original article: CVE-2021-44228 vulnerability in Apache Log4j library

The life cycle of phishing pages

This article has been indexed from Securelist We’ve analyzed the life cycle of phishing pages, how they transform during their active period, and the domains where they’re located. Read the original article: The life cycle of phishing pages

The story of the year: ransomware in the headlines

This article has been indexed from Securelist In the past twelve months, the word “ransomware” has popped up in countless headlines worldwide across both print and digital publications. But how did we get here and what has changed about the…

APT annual review 2021

This article has been indexed from Securelist For this annual review, we have tried to focus on what we consider to be the most interesting trends and developments of the last 12 months. Read the original article: APT annual review…

IT threat evolution Q3 2021

This article has been indexed from Securelist WildPressure and LuminousMoth threat actors, FinSpy implants, zero-day vulnerabilities and PrintNightmare, threats for Linux and macOS in our review of Q3 2021. Read the original article: IT threat evolution Q3 2021

IT threat evolution in Q3 2021. PC statistics

This article has been indexed from Securelist PC threat statistics for Q3 2021 contain data on miners, encrypting ransomware, financial malware, and threats to Windows, macOS and IoT. Read the original article: IT threat evolution in Q3 2021. PC statistics

Threats to ICS and industrial enterprises in 2022

This article has been indexed from Securelist In recent years, we have observed various trends in the changing threat landscape for industrial enterprises. We can say with high confidence that many of these trends will not only continue, but gain…

Cyberthreats to financial organizations in 2022

This article has been indexed from Securelist We are going to analyze the forecasts we made at the end of 2020, go through the key events of 2021 relating to financial attacks and make some forecasts about them in 2022.…

Black Friday 2021: How to Have a Scam-Free Shopping Day

This article has been indexed from Securelist We constantly monitor the landscape of shopping-related threats and release a report tracking the latest criminal activity targeting online shoppers. Here’s what we found this year. Read the original article: Black Friday 2021:…

Advanced threat predictions for 2022

This article has been indexed from Securelist Over the past 12 months, the style and severity of APT threats has continued to evolve. Despite their constantly changing nature, there is a lot we can learn from recent APT trends to…

Streaming wars continue — what about cyberthreats?

This article has been indexed from Securelist 2020–2021 report on malware, unwanted software and phishing schemes using streaming services Netflix, Apple TV, Amazon Prime, Hulu and Disney+ as a lure. Read the original article: Streaming wars continue — what about…

DDoS attacks in Q3 2021

This article has been indexed from Securelist This report provides DDoS attack statistics for Q3 2021, as well as a news roundup and forecasts for the next quarter. Read the original article: DDoS attacks in Q3 2021

Spam and phishing in Q3 2021

This article has been indexed from Securelist This report contains spam and phishing statistics for Q3 2021, plus descriptions of scams linked to the Olympics, Euro 2020, COVID-19, and other relevant events. Read the original article: Spam and phishing in…

How we took part in MLSEC and (almost) won

This article has been indexed from Securelist How we took part in the Machine Learning Security Evasion Competition (MLSEC) — a series of trials testing contestants’ ability to create and attack machine learning models. Read the original article: How we…

Extracting type information from Go binaries

This article has been indexed from Securelist Go programs may contain hundreds of calls, it is obviously impractical to manually look up each type using a hex editor. So, there is the script I use in my daily work. Read…

APT trends report Q3 2021

This article has been indexed from Securelist The APT trends reports are based on our threat intelligence research and provide a representative snapshot of what we have discussed in greater detail in our private APT reports. This is our latest…

Trickbot module descriptions

This article has been indexed from Securelist In this article we describe the functionality of the Trickbot (aka TrickLoader or Trickster) banking malware modules and provide a tip on how to download and analyze these modules. Read the original article:…

Lyceum group reborn

This article has been indexed from Securelist According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the…

SAS 2021: Learning to ChaCha with APT41

This article has been indexed from Securelist John Southworth gives insights about APT41 and the malware used by the threat actor – the Motnug loader and its descendant, the ChaCha loader; also, shares some thoughts on the actor’s attribution and…

MysterySnail attacks with Windows zero-day

This article has been indexed from Securelist We detected attacks with the use of an elevation of privilege exploit on multiple Microsoft Windows servers. Variants of the malware payload used along with the zero-day exploit were detected in widespread espionage…

SAS 2021: Fireside chat with Chris Bing

This article has been indexed from Securelist How to build up a fascinating story from a hardcore APT report? Sitting by the virtual fireside, Brian Bartholomew and Christopher Bing will discuss how malware researchers and investigative journalists can help each…

SAS 2021: Operation Software Concepts

This article has been indexed from Securelist Experts from NTT Security (Japan) will cover a new APT named Operation Software Concepts. They will share details about this multi-stage attack campaign targeting government and defense sector. Read the original article: SAS…

Ransomware in the CIS

This article has been indexed from Securelist Statistics on ransomware attacks in the CIS and technical descriptions of Trojans, including BigBobRoss/TheDMR, Crysis/Dharma, Phobos/Eking, Cryakl/CryLock, CryptConsole, Fonix/XINOF, Limbozar/VoidCrypt, Thanos/Hakbit and XMRLocker. Read the original article: Ransomware in the CIS

GhostEmperor: From ProxyLogon to kernel mode

This article has been indexed from Securelist While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset…

DarkHalo after SolarWinds: the Tomiris connection

This article has been indexed from Securelist We discovered a campaign delivering the Tomiris backdoor that shows a number of similarities with the Sunshuttle malware distributed by DarkHalo APT and target overlaps with Kazuar. Read the original article: DarkHalo after…

FinSpy: unseen findings

This article has been indexed from Securelist FinSpy, also known as FinFisher or Wingbird, is an infamous surveillance toolset, we has been tracking deployments of this spyware since 2011. In the report we decided to share some of our unseen…

BloodyStealer and gaming assets for sale

This article has been indexed from Securelist We take a closer look at threats linked to loss of accounts with popular video game digital distribution services, such as Steam and Origin. We also explore the kind of game-related data that…