Key Group: another ransomware group using leaked builders

Kaspersky experts studied the activity of Key Group, which utilizes publicly available builders for ransomware and wipers, as well as GitHub and Telegram. Continue reading Key Group: another ransomware group using leaked builders

From 12 to 21: how we discovered connections between the Twelve and BlackJack groups

An investigation of BlackJack’s software, TTPs, and motivations led Kaspersky experts to identify a possible connection with the Twelve group. Continue reading From 12 to 21: how we discovered connections between the Twelve and BlackJack groups

BlindEagle flying high in Latin America

Kaspersky shares insights into the activity and TTPs of the BlindEagle APT, which targets organizations and individuals in Colombia, Ecuador, Chile, Panama and other Latin American countries. Continue reading BlindEagle flying high in Latin America

Canary Token (from canarytokens.org) still getting triggered despite reinstalling Windows? [closed]

I installed the token months ago, have since wiped my drive and reinstalled windows, but I still get email notifications saying my token is triggered?
THe token in question is called a FAST URL REDIRECT (Alert When a URL is Visited, User i… Continue reading Canary Token (from canarytokens.org) still getting triggered despite reinstalling Windows? [closed]

Found some files on my pc that made me suspect a RAT. Need some help/advice [closed]

Just found some text files inside some folders that are in C:\Users(my username)\AppData\Local\k-Logged-(my username).zip
Here’s the link to some of the screenshots

https://postimg.cc/gallery/nnbTzfV/4163afc1

The last date modified for a… Continue reading Found some files on my pc that made me suspect a RAT. Need some help/advice [closed]

Trusted relationship attacks: trust, but verify

We analyze the tactics and techniques of attackers targeting organizations through trusted relationships – that is, through contractors and external IT service providers. Continue reading Trusted relationship attacks: trust, but verify