Russian organizations targeted by backdoor masquerading as secure networking software updates

While investigating an incident, we discovered a sophisticated new backdoor targeting Russian organizations by impersonating secure networking software updates. Continue reading Russian organizations targeted by backdoor masquerading as secure networking software updates

IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia

MysterySnail RAT attributed to IronHusky APT group hasn’t been reported since 2021. Recently, Kaspersky GReAT detected new versions of this implant in government organizations in Mongolia and Russia. Continue reading IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia

Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain

Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome. Continue reading Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain

Incident response analyst report 2024

Kaspersky provides incident response statistics for 2024, as well real incidents analysis. The report also shares IR trends and cybersecurity recommendations. Continue reading Incident response analyst report 2024

SideWinder targets the maritime and nuclear sectors with an updated toolset

In this article, we discuss the tools and TTPs used in the SideWinder APT’s attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors. Continue reading SideWinder targets the maritime and nuclear sectors with an updated toolset