Ztorg: from rooting to SMS

by Roman Unuchek
20 Jun 2017 at 9:01am
I?ve been monitoring Google Play Store for new Ztorg Trojans since September 2016, and have so far found several dozen new malicious apps. All of them were rooting malware that used exploits to gain root rights on the infected device. In May 2017, a new Ztorg variant appeared on the Google Play S...

Honeypots and the Internet of Things

by Vladimir Kuskov
19 Jun 2017 at 9:08am
According to Gartner, there are currently over 6 billion IoT devices on the planet. Such a huge number of potentially vulnerable gadgets could not possibly go unnoticed by cybercriminals. As of May 2017, Kaspersky Lab?s collections included several thousand different malware samples for IoT devic...

Nigerian phishing: Industrial companies under attack

by Kaspersky Lab ICS CERT
15 Jun 2017 at 9:00am
In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors. As further research demonstrated, this was jus...

Two Tickets as Bait

by Nadezhda Demidova
10 Jun 2017 at 1:21pm
Over the previous weekend, social networks were hit with a wave of posts that falsely claimed that major airlines were giving away tickets for free. Users from all over the world became involved in this: they published posts that mentioned Emirates, Air France, Aeroflot, S7 Airline, Eva Air, Turk...

SambaCry is coming

by Mikhail Kuzin
9 Jun 2017 at 10:07pm
Not long ago, news appeared online of a younger sibling for the sensational vulnerability EternalBlue. The story was about a new vulnerability for *nix-based systems ? EternalRed (aka SambaCry). On May 30th our honeypots captured the first attack to make use of this particular vulnerability, but ...

Dvmap: the first Android malware with code injection

by Roman Unuchek
8 Jun 2017 at 8:58am
In April 2017 we started observing new rooting malware being distributed through the Google Play Store. Unlike other rooting malware, this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.

50 hashes per hour

by Sergey Lurye
6 Jun 2017 at 9:00am
In this research we'll be revisiting the USB port ? this time in attempts to intercept user authentication data on the system that a microcomputer is connected to. As we discovered, this type of attack successfully allows an intruder to retrieve user authentication data ? even when the targeted s...

What Interests Children Online

by Anna Larkina
1 Jun 2017 at 11:02am
In order to recognize relevant threats, our products collect anonymous statistics about potentially dangerous content that a child encounters. As part of this report, we analyze the collected data in our quest for the answer to the question of what interests the current generation of children onl...

WannaCry mistakes that can help you restore files after infection

by Anton Ivanov
1 Jun 2017 at 7:00am
Sometimes ransomware developers make mistakes in their code. These mistakes could help victims regain access to their original files after a ransomware infection. This article is a short description of several errors, which were made by the WannaCry ransomware developers.

Dridex: A History of Evolution

by Nikita Slepogin
25 May 2017 at 1:56pm
In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnet?s activity. The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a stead...

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites