Tag: Securelist

How to train your Ghidra

Brief introduction to setting up Ghidra, and then configuring it with a familiar UI and shortcuts, so that you would not need to re-learn all the key sequences you have got used to over the years. This article has been…

DeathStalker targets legal entities with new Janicab variant

While hunting for less common Deathstalker intrusions, we identified a new Janicab variant used in targeting legal entities in the Middle East throughout 2020. This article has been indexed from Securelist Read the original article: DeathStalker targets legal entities with…

Main phishing and scamming trends and techniques

Phishing in social networks and messengers, marketplace fraud, exploitation of Google Forms and other services: we uncover what’s trending among attackers in 2022 This article has been indexed from Securelist Read the original article: Main phishing and scamming trends and…

Crimeware trends: self-propagation and driver exploitation

In this report, Kaspersky researchers discuss propagation methods of several ransomware families, and a vulnerable driver abuse case that may become a trend. This article has been indexed from Securelist Read the original article: Crimeware trends: self-propagation and driver exploitation

If one sheep leaps over the ditch…

In this report, Kaspersky researchers discuss propagation methods of several ransomware families, and a vulnerable driver abuse case that may become a trend. This article has been indexed from Securelist Read the original article: If one sheep leaps over the…

Indicators of compromise (IOCs): how we collect and use them

How exactly can indicators of compromise help information security specialists in their everyday work? To find the answer we asked three Kaspersky experts to share their experience. This article has been indexed from Securelist Read the original article: Indicators of…

Kaspersky Security Bulletin 2022. Statistics

Key statistics for 2022: ransomware, trojan bankers, miners and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. This article has been indexed from Securelist Read the original article: Kaspersky Security Bulletin 2022. Statistics

Consumer cyberthreats: predictions for 2023

Kaspersky consumer cyberthreat predictions: console shortage, scams related to new games and shows, cyberattacks in the metaverse, and threats related to online education. This article has been indexed from Securelist Read the original article: Consumer cyberthreats: predictions for 2023

Privacy predictions 2023

We think the geopolitical and economic events of 2022, as well as new technological trends, will be the major factors influencing the privacy landscape in 2023. Here we take a look at the most important developments that, in our opinion,…

Who tracked internet users in 2021–2022

A review of Do Not Track (DNT) statistics for the most widely used web tracking services in 2021 and 2022. This article has been indexed from Securelist Read the original article: Who tracked internet users in 2021–2022

Black Friday shoppers beware: online threats so far in 2022

Online shopping security threat statistics and trends in 2022: phishing, scams, banking Trojans—things that you should be aware of as the Black Friday sales are approaching. This article has been indexed from Securelist Read the original article: Black Friday shoppers…

Crimeware and financial cyberthreats in 2023

This report assesses how accurately we predicted the developments in the financial threats landscape in 2022 and ponder at what to expect in 2023. This article has been indexed from Securelist Read the original article: Crimeware and financial cyberthreats in…

ICS cyberthreats in 2023 – what to expect

The coming year looks to be much more complicated. In the post we share some of our thoughts on potential developments of 2023, though we cannot claim to be providing either a complete picture or a high degree of precision.…

IT threat evolution Q3 2022

Recent APT campaigns, a sophisticated UEFI rootkit, new ransomware for Windows, Linux and ESXi, attacks on foreign and crypto-currency exchanges, and malicious packages in online code repositories. This article has been indexed from Securelist Read the original article: IT threat…

IT threat evolution in Q3 2022. Mobile statistics

In Q3 2022, a total of 5,623,670 mobile malware, adware, and riskware attacks were blocked, and 438,035 malicious installation packages were detected. This article has been indexed from Securelist Read the original article: IT threat evolution in Q3 2022. Mobile…

IT threat evolution in Q3 2022. Non-mobile statistics

PC malware statistics for Q3 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. This article has been indexed from Securelist Read the original article: IT threat evolution in Q3 2022. Non-mobile…

DTrack activity targeting Europe and Latin America

In recent campaigns DTrack targets organizations in Europe and Latin America, and uses more delivery stages. This article has been indexed from Securelist Read the original article: DTrack activity targeting Europe and Latin America

DTrack activity targeting Europe and Latin America

In recent campaigns DTrack targets organizations in Europe and Latin America, and uses more delivery stages. This article has been indexed from Securelist Read the original article: DTrack activity targeting Europe and Latin America

Advanced threat predictions for 2023

We polled our experts from the GReAT team and have gathered a small number of key insights about what APT actors are likely to focus on in 2023. This article has been indexed from Securelist Read the original article: Advanced…

The state of cryptojacking in the first three quarters of 2022

In 2022 cryptocurrencies dropped, but cryptojacking (illicit cryptocurrency mining) activity grew. In this report we provide statistics on cryptojacking in 2022. This article has been indexed from Securelist Read the original article: The state of cryptojacking in the first three…

Cybersecurity threats: what awaits us in 2023?

We invited notable experts to share their insights and unbiased opinions on what we should expect from cybersecurity in the following year. This article has been indexed from Securelist Read the original article: Cybersecurity threats: what awaits us in 2023?

DDoS attacks in Q3 2022

In Q3 2022, the situation on the DDoS market stabilized, and sophisticated attacks on HTTP(S) began to hold sway over simple TCP attacks. This article has been indexed from Securelist Read the original article: DDoS attacks in Q3 2022

APT trends report Q3 2022

This is our latest summary of advanced persistent threat (APT) activities, focusing on events that we observed during Q3 2022. This article has been indexed from Securelist Read the original article: APT trends report Q3 2022

APT10: Tracking down LODEINFO 2022, part I

The first part of this report will provide technical analysis of the new infection methods such as SFX files and DOWNIISSA, a new downloader shellcode used to deploy the LODEINFO backdoor. This article has been indexed from Securelist Read the…

APT10: Tracking down LODEINFO 2022, part II

In the second part of this report, we discuss improvements made to the LODEINFO backdoor shellcode in 2022. This article has been indexed from Securelist Read the original article: APT10: Tracking down LODEINFO 2022, part II

Ongoing exploitation of CVE-2022-41352 (Zimbra 0-day)

We investigated CVE-2022-41352 and were able to confirm that unknown APT groups have actively been exploiting this vulnerability in the wild, one of which is systematically infecting servers in Central Asia. This article has been indexed from Securelist Read the…

Malicious WhatsApp mod distributed through legitimate apps

The malicious version of YoWhatsApp messenger, containing Triada trojan, was spreading through ads in the popular Snaptube app and the Vidmate app’s internal store. This article has been indexed from Securelist Read the original article: Malicious WhatsApp mod distributed through…

Ongoing exploitation of CVE-2022-41352 (Zimbra 0-day)

We investigated CVE-2022-41352 and were able to confirm that unknown APT groups have actively been exploiting this vulnerability in the wild, one of which is systematically infecting servers in Central Asia. This article has been indexed from Securelist Read the…

Malicious WhatsApp mod distributed through legitimate apps

The malicious version of YoWhatsApp messenger, containing Triada trojan, was spreading through ads in the popular Snaptube app and the Vidmate app’s internal store. This article has been indexed from Securelist Read the original article: Malicious WhatsApp mod distributed through…

Ongoing exploitation of CVE-2022-41352 (Zimbra 0-day)

We investigated CVE-2022-41352 and were able to confirm that unknown APT groups have actively been exploiting this vulnerability in the wild, one of which is systematically infecting servers in Central Asia. This article has been indexed from Securelist Read the…

Malicious WhatsApp mod distributed through legitimate apps

The malicious version of YoWhatsApp messenger, containing Triada trojan, was spreading through ads in the popular Snaptube app and the Vidmate app’s internal store. This article has been indexed from Securelist Read the original article: Malicious WhatsApp mod distributed through…

A look at the 2020–2022 ATM/PoS malware landscape

We looked at the number of affected ATMs and PoS terminals, geography of attacks and threat families used by cybercriminals to target victims in 2020-2022. This article has been indexed from Securelist Read the original article: A look at the…

Uncommon infection and malware propagation methods

In this report, Kaspersky researchers discuss uncommon infection and propagation methods observed in certain crimeware families. This article has been indexed from Securelist Read the original article: Uncommon infection and malware propagation methods

TOP 10 unattributed APT mysteries

TajMahal, DarkUniverse, PuzzleMaker, ProjectSauron (aka Strider), USB Thief, TENSHO (aka White Tur), PlexingEagle, SinSono, MagicScroll (aka AcidBox), Metador—all these targeted attacks are still unattributed. This article has been indexed from Securelist Read the original article: TOP 10 unattributed APT mysteries

A look at the 2020–2022 ATM/PoS malware landscape

We looked at the number of affected ATMs and PoS terminals, geography of attacks and threat families used by cybercriminals to target victims in 2020-2022. This article has been indexed from Securelist Read the original article: A look at the…

Uncommon infection and malware propagation methods

In this report, Kaspersky researchers discuss uncommon infection and propagation methods observed in certain crimeware families. This article has been indexed from Securelist Read the original article: Uncommon infection and malware propagation methods

The secrets of Schneider Electric’s UMAS protocol

Kaspersky ICS CERT report on vulnerabilities in Schneider Electric’s engineering software that enables UMAS protocol abuse. This article has been indexed from Securelist Read the original article: The secrets of Schneider Electric’s UMAS protocol

Prilex: the pricey prickle credit card complex

Prilex is a Brazilian threat actor focusing on ATM and PoS attacks. In this report, we provide an overview of its PoS malware. This article has been indexed from Securelist Read the original article: Prilex: the pricey prickle credit card…

The secrets of Schneider Electric’s UMAS protocol

Kaspersky ICS CERT report on vulnerabilities in Schneider Electric’s engineering software that enables UMAS protocol abuse. This article has been indexed from Securelist Read the original article: The secrets of Schneider Electric’s UMAS protocol

NullMixer: oodles of Trojans in a single dropper

NullMixer is a dropper delivering a number of Trojans, such as RedLine Stealer, SmokeLoader, Satacom, and others. This article has been indexed from Securelist Read the original article: NullMixer: oodles of Trojans in a single dropper

Prilex: the pricey prickle credit card complex

Prilex is a Brazilian threat actor focusing on ATM and PoS attacks. In this report, we provide an overview of its PoS malware. This article has been indexed from Securelist Read the original article: Prilex: the pricey prickle credit card…

NullMixer: oodles of Trojans in a single dropper

NullMixer is a dropper delivering a number of Trojans, such as RedLine Stealer, SmokeLoader, Satacom, and others. This article has been indexed from Securelist Read the original article: NullMixer: oodles of Trojans in a single dropper

Mass email campaign with a pinch of targeted spam

Mass spam mailing posing as customer email delivers the Agent Tesla stealer disguised as a document to corporate users. This article has been indexed from Securelist Read the original article: Mass email campaign with a pinch of targeted spam

Self-spreading stealer attacks gamers via YouTube

A malicious bundle containing the RedLine stealer and a miner is distributed on YouTube through cheats and cracks ads for popular games. This article has been indexed from Securelist Read the original article: Self-spreading stealer attacks gamers via YouTube

The nature of cyber incidents

In this report Kaspersky provides incident response statistics for 2021, as well as conclusions based on investigations of the real incidents. This article has been indexed from Securelist Read the original article: The nature of cyber incidents

Kimsuky’s GoldDragon cluster and its C2 operations

Kimsuky (also known as Thallium, Black Banshee and Velvet Chollima) is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea. This article…

Ransomware updates & 1-day exploits

In this report, we discuss the new multi-platform ransomware RedAlert (aka N13V) and Monster, as well as private 1-day exploits for the CVE-2022-24521 vulnerability. This article has been indexed from Securelist Read the original article: Ransomware updates & 1-day exploits

Black Hat USA 2022 and DEF CON 30

Black Hat 2022 USA Briefings wrapped up this past week, along with its sister conference Defcon 30. Coming back from the COVID hiatus, the conferences were enthusiastically full compared to the 2021 ghost town. This article has been indexed from…

Two more malicious Python packages in the PyPI

We used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI. They were masquerading as one of the most popular open-source packages named “requests“. This article has been indexed from Securelist…

IT threat evolution in Q2 2022. Non-mobile statistics

Our non-mobile malware statistics for Q2 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. This article has been indexed from Securelist Read the original article: IT threat evolution in Q2 2022.…

IT threat evolution in Q2 2022. Mobile statistics

In Q2 2022, we detected 405,684 mobile malware installation packages, of which 55,614 packages were related to mobile banking trojans, and 3,821 packages were mobile ransomware trojans. This article has been indexed from Securelist Read the original article: IT threat…

IT threat evolution Q2 2022

ToddyCat APT and WinDealer man-on-the-side attack, Spring4Shell and other vulnerabilities, ransomware trends and our in-depth analysis of the TTPs of the eight most widespread ransomware families. This article has been indexed from Securelist Read the original article: IT threat evolution…

OpenTIP, command line edition

We released Python-based command line tools for our OpenTIP service that also implement a client class that you can reuse in your own tools. This article has been indexed from Securelist Read the original article: OpenTIP, command line edition

Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly. This article…

DDoS attacks in Q2 2022

Politically-motivated cyberattacks dominated the DDoS landscape in the second quarter of 2022 just as they did in Q1. Also, we saw the continuation of a trend that began in spring: an increase in superlong attacks. This article has been indexed…

APT trends report Q2 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q2 2022. This article has been indexed from Securelist Read the original article: APT trends report Q2 2022

Text-based fraud: from 419 scams to vishing

Text-based fraud (419 scams, vishing, extortion, etc.) is still alive and well. Here, we describe cybercriminal techniques and present statistics. This article has been indexed from Securelist Read the original article: Text-based fraud: from 419 scams to vishing

Text-based fraud: from 419 scams to vishing

Text-based fraud (419 scams, vishing, extortion, etc.) is still alive and well. Here, we describe cybercriminal techniques and present statistics. This article has been indexed from Securelist Read the original article: Text-based fraud: from 419 scams to vishing

Dynamic analysis of firmware components in IoT devices

We decided to discuss less obvious tools for working with firmware, including Renode and Qiling. Each of those tools has its own features, advantages, and limitations that make it effective for certain types of task. This article has been indexed…

Dynamic analysis of firmware components in IoT devices

We decided to discuss less obvious tools for working with firmware, including Renode and Qiling. Each of those tools has its own features, advantages, and limitations that make it effective for certain types of task. This article has been indexed…

The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East. This article has been indexed from Securelist Read…

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’. This article has…

How much does access to corporate infrastructure cost?

This article has been indexed from Securelist What cybercriminals charge for the data of large companies on the dark web – a review of underground forum offers by category. Read the original article: How much does access to corporate infrastructure…

Router security in 2021

This article has been indexed from Securelist We analyze data on vulnerabilities in routers, plus malware that attacks IoT devices: Mirai, NyaDrop, Gafgyt, and other. Read the original article: Router security in 2021

WinDealer dealing on the side

This article has been indexed from Securelist We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack. Read the original article: WinDealer dealing on the side

IT threat evolution in Q1 2022. Non-mobile statistics

This article has been indexed from Securelist PC malware statistics for the Q1 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Read the original article: IT threat evolution in Q1 2022.…

IT threat evolution Q1 2022

This article has been indexed from Securelist Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against Ukraine, phishing kits, Okta hack and more. Read the original article: IT threat…

IT threat evolution in Q1 2022. Mobile statistics

This article has been indexed from Securelist According to Kaspersky Security Network, in Q1 2022 516,617 mobile malware installation packages were detected, of which 53,947 packages were related to mobile banking trojans, and 1,942 packages were mobile ransomware trojans. Read…

Managed detection and response in 2021

This article has been indexed from Securelist Kaspersky Managed Detection and Response (MDR) services in 2021 in facts and figures: number of security incidents detected, their severity, etc. Read the original article: Managed detection and response in 2021

The Verizon 2022 DBIR

This article has been indexed from Securelist The Verizon 2022 Data Breach Investigations Report is out, where Kaspersky collaborated as a contributor. The report provides interesting analysis of a full amount of global incident data. Read the original article: The…

What’s wrong with automotive mobile apps?

This article has been indexed from Securelist Third party automotive mobile apps, web apps and API clients provide drivers with additional functions but may pose security risks for their data. Read the original article: What’s wrong with automotive mobile apps?

ISaPWN – research on the security of ISaGRAF Runtime

This article has been indexed from Securelist This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several vulnerabilities the Kaspersky ICS CERT team had identified. Read the original article:…

HTML attachments in phishing e-mails

This article has been indexed from Securelist In this article we review phishing HTML attachments, explaining common tricks the attackers use, and give statistics on HTML attachments detected by Kaspersky solutions. Read the original article: HTML attachments in phishing e-mails

New ransomware trends in 2022

This article has been indexed from Securelist This year, ransomware is no less active than before: cybercriminals continue to threaten nationwide retailers and enterprises, old variants of malware return while the new ones develop. Read the original article: New ransomware…

Mobile subscription Trojans and their little tricks

This article has been indexed from Securelist Kaspersky analysis of mobile subscription Trojans Joker (Jocker), MobOk, Vesub and GriftHorse and their activity: technical description and statistics. Read the original article: Mobile subscription Trojans and their little tricks

A new secret stash for “fileless” malware

This article has been indexed from Securelist We observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign. It allows the “fileless” last stage Trojan to be hidden…

APT trends report Q1 2022

This article has been indexed from Securelist This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022. Read the original article: APT trends report Q1 2022