APT Trends report, Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries. During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with IOC data and YARA rules to assist in forensics and malware-hunting. Continue reading APT Trends report, Q1 2017

Hackers stole $800,000 from ATMs using Fileless Malware

Hackers targeted at least 8 ATMs in Russia and stole $800,000 in a single night, but the method used by the intruders remained a complete mystery with CCTV footage just showing a lone culprit walking up to the ATM and collecting cash without even touch… Continue reading Hackers stole $800,000 from ATMs using Fileless Malware

Fileless UAC Bypass Uses Windows Backup and Restore Utility

Researcher Matt Nelson disclosed another Windows UAC bypass, this one abusing the sdclt.exe backup and restore utility to execute a payload without triggering an alert. Continue reading Fileless UAC Bypass Uses Windows Backup and Restore Utility

Locky, Cerber Ransomware Skilled at Hiding

Since January, a number of ransomware families are sharing a common infrastructure with different techniques allowing the malware to hide from detection systems. Continue reading Locky, Cerber Ransomware Skilled at Hiding

Fileless Malware Campaigns Tied to Same Attacker

Two recent fileless malware campaigns targeting financial institutions, government agencies and other enterprises have been linked to the same attack group. Continue reading Fileless Malware Campaigns Tied to Same Attacker

New Fileless Malware Uses DNS Queries To Receive PowerShell Commands

It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day.

While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques tha… Continue reading New Fileless Malware Uses DNS Queries To Receive PowerShell Commands