IT threat evolution Q3 2024

In this part of the malware report we discuss the most remarkable findings of Q3 2024, including APT and hacktivist attacks, ransomware, stealers, macOS malware and so on. Continue reading IT threat evolution Q3 2024

APT trends report Q3 2024

The report features the most significant developments relating to APT groups in Q3 2024, including hacktivist activity, new APT tools and campaigns. Continue reading APT trends report Q3 2024

Scammer Black Friday offers: Online shopping threats and dark web sales

Kaspersky experts share their insights into cyberthreats that face online shoppers in 2024: phishing, banking trojans, fake shopping apps and Black Friday sales on the dark web data market. Continue reading Scammer Black Friday offers: Online shopping threats and dark web sales

Ymir: new stealthy ransomware in the wild

Kaspersky GERT experts have discovered in Colombia new Ymir ransomware, which uses RustyStealer for initial access and the qTox client for communication with its victims. Continue reading Ymir: new stealthy ransomware in the wild

New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency

Kaspersky experts have discovered a new SteelFox Trojan that mimics popular software like Foxit PDF Editor and JetBrains to spread a stealer-and-miner bundle. Continue reading New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency

What advanced techniques Trojans use to enhance persistence and evade modern detection systems? [closed]

What techniques do modern Trojans employ to maintain persistence on compromised systems and effectively evade detection by advanced security solutions?
What are the specific methodologies used for mechanisms like fileless malware, process … Continue reading What advanced techniques Trojans use to enhance persistence and evade modern detection systems? [closed]

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

Malicious CAPTCHA distributed through ad networks delivers the Amadey Trojan or the Lumma stealer, which pilfers data from browsers, password managers, and crypto wallets. Continue reading Lumma/Amadey: fake CAPTCHAs want to know if you’re human

Beyond the Surface: the evolution and expansion of the SideWinder APT group

Kaspersky analyzes SideWinder APT’s recent activity: new targets in the MiddleEast and Africa, post-exploitation tools and techniques. Continue reading Beyond the Surface: the evolution and expansion of the SideWinder APT group