Great

Detecting unknown threats: a honeypot how-to

Catching threats is tricky business, especially in today’s threat landscape. To tackle this problem, for many years сybersecurity researchers have… Read More

3 years ago

Do cybercriminals play cyber games in quarantine? A look one year later

Last year, we decided to take a look at how the pandemic influenced the gaming industry and what new threats… Read More

3 years ago

Remote dating: How do the apps safeguard our data?

The pandemic and the restrictions that came with it have led to an increase in the popularity of dating apps.… Read More

3 years ago

Malicious spam campaigns delivering banking Trojans

In mid-March 2021, we observed two new spam campaigns. The messages in both cases were written in English and contained… Read More

3 years ago

How to confuse antimalware neural networks. Adversarial attacks and protection

Introduction Nowadays, cybersecurity companies implement a variety of methods to discover new, previously unknown malware files. Machine learning (ML) is… Read More

3 years ago

Analysis of Black Kingdom ransomware

The ransomware is coded in Python and compiled to an executable using PyInstaller; it supports two encryption modes: one generated… Read More

3 years ago

Andariel evolves to target South Korea with ransomware

Executive summary In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed… Read More

3 years ago

Black Kingdom ransomware

Black Kingdom ransomware appeared on the scene back in 2019, but we observed some activity again in 2021. The ransomware… Read More

3 years ago

Ferocious Kitten: 6 years of covert surveillance in Iran

Interestingly, some of the TTPs used by this threat actor are reminiscent of other groups that are active against a… Read More

3 years ago

IT threat evolution Q1 2021. Non-mobile statistics

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly… Read More

3 years ago

Gootkit: the cautious Trojan

Gootkit is complex multi-stage banking malware that was discovered for the first time by Doctor Web in 2014. Initially it… Read More

3 years ago

PuzzleMaker attacks with Chrome zero-day exploit chain

On April 14-15, 2021, Kaspersky technologies detected a wave of highly targeted attacks against multiple companies. Closer analysis revealed that… Read More

3 years ago

IT threat evolution Q1 2021. Mobile statistics

The statistics presented here draw on detection verdicts returned by Kaspersky products as provided by users who consented to share… Read More

3 years ago

Email spoofing: how attackers impersonate legitimate senders

Introduction In a nutshell, email spoofing is the creation of fake emails that seem legitimate. This article analyzes the spoofing… Read More

3 years ago

Kids on the Web in 2021: Infinite creativity

For over a year we’ve been living in a world gripped by the COVID-19 pandemic. Not only has the pandemic… Read More

3 years ago

IT threat evolution Q1 2021

Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a… Read More

3 years ago