Tag: Securelist

Text-based fraud: from 419 scams to vishing

Text-based fraud (419 scams, vishing, extortion, etc.) is still alive and well. Here, we describe cybercriminal techniques and present statistics. This article has been indexed from Securelist Read the original article: Text-based fraud: from 419 scams to vishing

Text-based fraud: from 419 scams to vishing

Text-based fraud (419 scams, vishing, extortion, etc.) is still alive and well. Here, we describe cybercriminal techniques and present statistics. This article has been indexed from Securelist Read the original article: Text-based fraud: from 419 scams to vishing

Dynamic analysis of firmware components in IoT devices

We decided to discuss less obvious tools for working with firmware, including Renode and Qiling. Each of those tools has its own features, advantages, and limitations that make it effective for certain types of task. This article has been indexed…

Dynamic analysis of firmware components in IoT devices

We decided to discuss less obvious tools for working with firmware, including Renode and Qiling. Each of those tools has its own features, advantages, and limitations that make it effective for certain types of task. This article has been indexed…

The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East. This article has been indexed from Securelist Read…

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’. This article has…

How much does access to corporate infrastructure cost?

This article has been indexed from Securelist What cybercriminals charge for the data of large companies on the dark web – a review of underground forum offers by category. Read the original article: How much does access to corporate infrastructure…

Router security in 2021

This article has been indexed from Securelist We analyze data on vulnerabilities in routers, plus malware that attacks IoT devices: Mirai, NyaDrop, Gafgyt, and other. Read the original article: Router security in 2021

WinDealer dealing on the side

This article has been indexed from Securelist We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack. Read the original article: WinDealer dealing on the side

IT threat evolution in Q1 2022. Non-mobile statistics

This article has been indexed from Securelist PC malware statistics for the Q1 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Read the original article: IT threat evolution in Q1 2022.…

IT threat evolution Q1 2022

This article has been indexed from Securelist Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against Ukraine, phishing kits, Okta hack and more. Read the original article: IT threat…

IT threat evolution in Q1 2022. Mobile statistics

This article has been indexed from Securelist According to Kaspersky Security Network, in Q1 2022 516,617 mobile malware installation packages were detected, of which 53,947 packages were related to mobile banking trojans, and 1,942 packages were mobile ransomware trojans. Read…

Managed detection and response in 2021

This article has been indexed from Securelist Kaspersky Managed Detection and Response (MDR) services in 2021 in facts and figures: number of security incidents detected, their severity, etc. Read the original article: Managed detection and response in 2021

The Verizon 2022 DBIR

This article has been indexed from Securelist The Verizon 2022 Data Breach Investigations Report is out, where Kaspersky collaborated as a contributor. The report provides interesting analysis of a full amount of global incident data. Read the original article: The…

What’s wrong with automotive mobile apps?

This article has been indexed from Securelist Third party automotive mobile apps, web apps and API clients provide drivers with additional functions but may pose security risks for their data. Read the original article: What’s wrong with automotive mobile apps?

ISaPWN – research on the security of ISaGRAF Runtime

This article has been indexed from Securelist This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several vulnerabilities the Kaspersky ICS CERT team had identified. Read the original article:…

HTML attachments in phishing e-mails

This article has been indexed from Securelist In this article we review phishing HTML attachments, explaining common tricks the attackers use, and give statistics on HTML attachments detected by Kaspersky solutions. Read the original article: HTML attachments in phishing e-mails

New ransomware trends in 2022

This article has been indexed from Securelist This year, ransomware is no less active than before: cybercriminals continue to threaten nationwide retailers and enterprises, old variants of malware return while the new ones develop. Read the original article: New ransomware…

Mobile subscription Trojans and their little tricks

This article has been indexed from Securelist Kaspersky analysis of mobile subscription Trojans Joker (Jocker), MobOk, Vesub and GriftHorse and their activity: technical description and statistics. Read the original article: Mobile subscription Trojans and their little tricks

A new secret stash for “fileless” malware

This article has been indexed from Securelist We observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign. It allows the “fileless” last stage Trojan to be hidden…

APT trends report Q1 2022

This article has been indexed from Securelist This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022. Read the original article: APT trends report Q1 2022

DDoS attacks in Q1 2022

This article has been indexed from Securelist Against the backdrop of the conflict between Russia and Ukraine, the number of DDoS attacks in Q1 2022 increased by 4.5 times against Q1 2021. A significant proportion of them were by hacktivists.…

A Bad Luck BlackCat

This article has been indexed from Securelist A new ransomware actor started advertising its services on a Russian underground forum. They presented themselves as ALPHV, but the group is also known as BlackCat. Two recent BlackCat incidents stand out as…

Spring4Shell (CVE-2022-22965): details and mitigations

This article has been indexed from Securelist Technical details and mitigations for CVE-2022-22965 vulnerability (Spring4Shell) that can help an attacker to execute arbitrary code on a remote web server. Read the original article: Spring4Shell (CVE-2022-22965): details and mitigations

Lazarus Trojanized DeFi app for delivering malware

This article has been indexed from Securelist We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a…

CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel

This article has been indexed from Securelist Exploit for CVE-2022-0847 (Dirty Pipe) vulnerability in Linux kernel is available online. Kaspersky solutions detect and prevent exploitation attempts. Read the original article: CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel

Financial cyberthreats in 2021

This article has been indexed from Securelist This report provides insight into 2021 financial threat trends and statistics, including data on banking malware for Windows and Android, banking, payment system and e-shop phishing, etc. Read the original article: Financial cyberthreats…

Mobile malware evolution 2021

This article has been indexed from Securelist In 2021, cybercriminal activity gradually decreased, and attempts to exploit the pandemic topic became less common. However, mobile malware became more advanced, and attacks more complex. Read the original article: Mobile malware evolution…

DDoS attacks in Q4 2021

This article has been indexed from Securelist In Q4 2021, as expected, the number of DDoS attacks rose, while DDoS botnets weaponized a Log4Shell vulnerability. In this report, we present the main DDoS trends and statistics. Read the original article:…

Spam and phishing in 2021

This article has been indexed from Securelist Statistics on spam and phishing with the key trends in 2021: investment scams, fake streaming websites, theft of corporate credentials and COVID-19. Read the original article: Spam and phishing in 2021

Roaming Mantis reaches Europe

This article has been indexed from Securelist We’ve observed some new activities by Roaming Mantis in 2021, and some changes in the Wroba malware that’s mainly used in this campaign. Furthermore, we discovered that France and Germany were added as…

Telehealth: A New Frontier in Medicine—and Security

This article has been indexed from Securelist This report contains statistics and observations on vulnerabilities, phishing schemes and malware related to telehealth. Read the original article: Telehealth: A New Frontier in Medicine—and Security

Telehealth: A New Frontier in Medicine—and Security

This article has been indexed from Securelist This report contains statistics and observations on vulnerabilities, phishing schemes and malware related to telehealth. Read the original article: Telehealth: A New Frontier in Medicine—and Security

MoonBounce: the dark side of UEFI firmware

This article has been indexed from Securelist At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how…

The BlueNoroff cryptocurrency hunt is still on

This article has been indexed from Securelist It appears that BlueNoroff shifted focus from hitting banks and SWIFT-connected servers to solely cryptocurrency businesses as the main source of the group’s illegal income. Read the original article: The BlueNoroff cryptocurrency hunt…

Answering Log4Shell-related questions

This article has been indexed from Securelist Check out the answers to some of users’ biggest security questions about the Log4Shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105). Read the original article: Answering Log4Shell-related questions

How and why do we attack our own Anti-Spam?

This article has been indexed from Securelist How to trick the machine-learning model in Anti-Spam designed to detect and quarantine suspicious e-mails, and how to detect such attacks. Read the original article: How and why do we attack our own…

PseudoManuscrypt: a mass-scale spyware attack campaign

This article has been indexed from Securelist Kaspersky ICS CERT experts identified malware whose loader has some similarities to the Manuscrypt malware, which is part of the Lazarus APT group’s arsenal. Read the original article: PseudoManuscrypt: a mass-scale spyware attack…

Kaspersky Security Bulletin 2021. Statistics

This article has been indexed from Securelist Key statistics for 2021: miners, ransomware, trojan bankers and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. Read the original article: Kaspersky Security Bulletin 2021. Statistics

Kaspersky Managed Detection and Response: interesting cases

This article has been indexed from Securelist Several interesting attacks detected by Kaspersky Managed Detection and Response (MDR): two PrintNightmare exploitation attempts, MuddyWater attack and LSASS credential dumping. Read the original article: Kaspersky Managed Detection and Response: interesting cases

CVE-2021-44228 vulnerability in Apache Log4j library

This article has been indexed from Securelist The summary of the critical vulnerability CVE-2021-44228 in the Apache Log4j library, technical details and mitigations. Read the original article: CVE-2021-44228 vulnerability in Apache Log4j library

The life cycle of phishing pages

This article has been indexed from Securelist We’ve analyzed the life cycle of phishing pages, how they transform during their active period, and the domains where they’re located. Read the original article: The life cycle of phishing pages

The story of the year: ransomware in the headlines

This article has been indexed from Securelist In the past twelve months, the word “ransomware” has popped up in countless headlines worldwide across both print and digital publications. But how did we get here and what has changed about the…

APT annual review 2021

This article has been indexed from Securelist For this annual review, we have tried to focus on what we consider to be the most interesting trends and developments of the last 12 months. Read the original article: APT annual review…

IT threat evolution Q3 2021

This article has been indexed from Securelist WildPressure and LuminousMoth threat actors, FinSpy implants, zero-day vulnerabilities and PrintNightmare, threats for Linux and macOS in our review of Q3 2021. Read the original article: IT threat evolution Q3 2021

IT threat evolution in Q3 2021. PC statistics

This article has been indexed from Securelist PC threat statistics for Q3 2021 contain data on miners, encrypting ransomware, financial malware, and threats to Windows, macOS and IoT. Read the original article: IT threat evolution in Q3 2021. PC statistics

Threats to ICS and industrial enterprises in 2022

This article has been indexed from Securelist In recent years, we have observed various trends in the changing threat landscape for industrial enterprises. We can say with high confidence that many of these trends will not only continue, but gain…

Cyberthreats to financial organizations in 2022

This article has been indexed from Securelist We are going to analyze the forecasts we made at the end of 2020, go through the key events of 2021 relating to financial attacks and make some forecasts about them in 2022.…

Black Friday 2021: How to Have a Scam-Free Shopping Day

This article has been indexed from Securelist We constantly monitor the landscape of shopping-related threats and release a report tracking the latest criminal activity targeting online shoppers. Here’s what we found this year. Read the original article: Black Friday 2021:…

Advanced threat predictions for 2022

This article has been indexed from Securelist Over the past 12 months, the style and severity of APT threats has continued to evolve. Despite their constantly changing nature, there is a lot we can learn from recent APT trends to…

Streaming wars continue — what about cyberthreats?

This article has been indexed from Securelist 2020–2021 report on malware, unwanted software and phishing schemes using streaming services Netflix, Apple TV, Amazon Prime, Hulu and Disney+ as a lure. Read the original article: Streaming wars continue — what about…

DDoS attacks in Q3 2021

This article has been indexed from Securelist This report provides DDoS attack statistics for Q3 2021, as well as a news roundup and forecasts for the next quarter. Read the original article: DDoS attacks in Q3 2021

Spam and phishing in Q3 2021

This article has been indexed from Securelist This report contains spam and phishing statistics for Q3 2021, plus descriptions of scams linked to the Olympics, Euro 2020, COVID-19, and other relevant events. Read the original article: Spam and phishing in…

How we took part in MLSEC and (almost) won

This article has been indexed from Securelist How we took part in the Machine Learning Security Evasion Competition (MLSEC) — a series of trials testing contestants’ ability to create and attack machine learning models. Read the original article: How we…

Extracting type information from Go binaries

This article has been indexed from Securelist Go programs may contain hundreds of calls, it is obviously impractical to manually look up each type using a hex editor. So, there is the script I use in my daily work. Read…

APT trends report Q3 2021

This article has been indexed from Securelist The APT trends reports are based on our threat intelligence research and provide a representative snapshot of what we have discussed in greater detail in our private APT reports. This is our latest…

Trickbot module descriptions

This article has been indexed from Securelist In this article we describe the functionality of the Trickbot (aka TrickLoader or Trickster) banking malware modules and provide a tip on how to download and analyze these modules. Read the original article:…

Lyceum group reborn

This article has been indexed from Securelist According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the…

SAS 2021: Learning to ChaCha with APT41

This article has been indexed from Securelist John Southworth gives insights about APT41 and the malware used by the threat actor – the Motnug loader and its descendant, the ChaCha loader; also, shares some thoughts on the actor’s attribution and…

MysterySnail attacks with Windows zero-day

This article has been indexed from Securelist We detected attacks with the use of an elevation of privilege exploit on multiple Microsoft Windows servers. Variants of the malware payload used along with the zero-day exploit were detected in widespread espionage…

SAS 2021: Fireside chat with Chris Bing

This article has been indexed from Securelist How to build up a fascinating story from a hardcore APT report? Sitting by the virtual fireside, Brian Bartholomew and Christopher Bing will discuss how malware researchers and investigative journalists can help each…

SAS 2021: Operation Software Concepts

This article has been indexed from Securelist Experts from NTT Security (Japan) will cover a new APT named Operation Software Concepts. They will share details about this multi-stage attack campaign targeting government and defense sector. Read the original article: SAS…

Ransomware in the CIS

This article has been indexed from Securelist Statistics on ransomware attacks in the CIS and technical descriptions of Trojans, including BigBobRoss/TheDMR, Crysis/Dharma, Phobos/Eking, Cryakl/CryLock, CryptConsole, Fonix/XINOF, Limbozar/VoidCrypt, Thanos/Hakbit and XMRLocker. Read the original article: Ransomware in the CIS

GhostEmperor: From ProxyLogon to kernel mode

This article has been indexed from Securelist While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset…

DarkHalo after SolarWinds: the Tomiris connection

This article has been indexed from Securelist We discovered a campaign delivering the Tomiris backdoor that shows a number of similarities with the Sunshuttle malware distributed by DarkHalo APT and target overlaps with Kazuar. Read the original article: DarkHalo after…

FinSpy: unseen findings

This article has been indexed from Securelist FinSpy, also known as FinFisher or Wingbird, is an infamous surveillance toolset, we has been tracking deployments of this spyware since 2011. In the report we decided to share some of our unseen…

BloodyStealer and gaming assets for sale

This article has been indexed from Securelist We take a closer look at threats linked to loss of accounts with popular video game digital distribution services, such as Steam and Origin. We also explore the kind of game-related data that…

Wake me up till SAS summit ends

This article has been indexed from Securelist What do cyberthreats, Kubernetes and donuts have in common – except that all three end in “ts”, that is? All these topics will be mentioned during the new SAS@Home online conference, scheduled for…

Exploitation of the CVE-2021-40444 vulnerability in MSHTML

This article has been indexed from Securelist Last week, Microsoft reported the RCE vulnerability CVE-2021-40444 in the MSHTML browser engine. Kaspersky is aware of targeted attacks using this vulnerability, and our products protect against attacks leveraging it. Read the original…

Summer 2021: Friday Night Funkin’, Måneskin and pop it

This article has been indexed from Securelist This report discusses the statistics gathered by Kaspersky Safe Kids on the websites and apps children use, and on children’s YouTube search queries in summer 2021. Read the original article: Summer 2021: Friday…

Incident response analyst report 2020

This article has been indexed from Securelist We deliver a range of services: incident response, digital forensics and malware analysis. Data in the report comes from our daily practices with organizations seeking assistance with full-blown incident response or complementary expert…

Incident response analyst report 2020

This article has been indexed from Securelist We deliver a range of services: incident response, digital forensics and malware analysis. Data in the report comes from our daily practices with organizations seeking assistance with full-blown incident response or complementary expert…

Applied YARA training Q&A

This article has been indexed from Securelist On August 31, 2021 we ran a joint webinar between VirusTotal and Kaspersky, with a focus on YARA rules best practices and real world examples. In this post, we answer your questions that…

QakBot technical analysis

This article has been indexed from Securelist This report contains technical analysis of the Trojan-Banker named QakBot (aka QBot, QuackBot or Pinkslipbot) and its information stealing, web injection and other modules. Read the original article: QakBot technical analysis

Triada Trojan in WhatsApp mod

This article has been indexed from Securelist We discovered that the Trojan Triada snook into one of modified versions of the WhatsApp messenger called FMWhatsapp 16.80.0 together with the advertising software development kit (SDK). Read the original article: Triada Trojan…

Triada Trojan in WhatsApp MOD

This article has been indexed from Securelist We discovered that the Trojan Triada snook into one of modified versions of the WhatsApp messenger called FMWhatsapp 16.80.0 together with the advertising software development kit (SDK). Read the original article: Triada Trojan…

Gaming-related cyberthreats in 2020 and 2021

This article has been indexed from Securelist In this report, you will find statistics and other information about gaming-related malware, phishing schemes and other threats in 2020 and the first half of 2021. Read the original article: Gaming-related cyberthreats in…

IT threat evolution in Q2 2021. PC statistics

This article has been indexed from Securelist PC threat statistics for Q2 2021 contain data on miners, encrypting ransomware, financial malware and threats to Windows, macOS and IoT. Read the original article: IT threat evolution in Q2 2021. PC statistics

IT threat evolution in Q2 2021. Mobile statistics

This article has been indexed from Securelist In Q2 2021, we prevented 14,465,672 mobile malware, adware and riskware attacks; 886,105 malicious installation packages were detected, of which 24,604 packages were mobile banking Trojans and 3,623 packages were mobile ransomware Trojans.…

IT threat evolution Q2 2021

This article has been indexed from Securelist Ferocious Kitten, TunnelSnake, PuzzleMaker and other threat actors, zero-day vulnerabilities, ransomware and banking Trojans – check out our review of Q2 2021. Read the original article: IT threat evolution Q2 2021