Email crypto phishing scams: stealing from hot and cold crypto wallets

Here is how email phishing scams targeting hot and cold crypto wallets, such as Trezor and Ledger, work. Continue reading Email crypto phishing scams: stealing from hot and cold crypto wallets

Incident Response Analyst Report 2019

As an incident response service provider, Kaspersky delivers a global service that results in a global visibility of adversaries’ cyber-incident tactics and techniques on the wild. In this report, we share our teams’ conclusions and analysis based on incident responses and statistics from 2019. Continue reading Incident Response Analyst Report 2019

Incident Response report 2018

This report covers our team’s incident response practices for the year 2018. We have thoroughly analyzed all the service requests, customer conversations and incident response deliverables to provide you an overview in numbers. Continue reading Incident Response report 2018

Bots and botnets in 2018

Due to the wide media coverage botnets activities have become largely associated with DDoS attacks. Yet this is merely the tip of the iceberg, and botnets are used widely not only to carry out DDoS attacks, but to steal various user information. Continue reading Bots and botnets in 2018

Hey there! How much are you worth?

I decided to investigate the black market and see what kind of information is being sold there. We all know that you can buy drugs, weapons and stolen goods there, but you can also buy online identities. How much do you think your online identity is worth? Continue reading Hey there! How much are you worth?

Spanish Authorities Arrest Leader of Cybercriminal Gang Behind €1 Billion Heist

The Spanish National Police has arrested the suspected leader of a cybercriminal gang that stole more than  €1 billion from financial institutions in more than 40 countries. The gang has been operating since 2013 and has hit more than 100 financial in… Continue reading Spanish Authorities Arrest Leader of Cybercriminal Gang Behind €1 Billion Heist

Future attack scenarios against ATM authentication systems

The report comprises two papers in which we analyze all existing methods of authentication used in ATMs and those expected to be used in the near future, including: contactless authentication through NFC, one-time password authentication and biometric authentication systems, as well as potential vectors of attacks using malware, through to network attacks and attacks on hardware components. Continue reading Future attack scenarios against ATM authentication systems