PuzzleMaker attacks with Chrome zero-day exploit chain

We detected a wave of highly targeted attacks against multiple companies. Closer analysis revealed that all these attacks exploited a chain of Google Chrome and Microsoft Windows zero-day exploits. Continue reading PuzzleMaker attacks with Chrome zero-day exploit chain

IT threat evolution Q1 2021

SolarWinds attacks, MS Exchange vulnerabilities, fake adblocker distributing miner, malware for Apple Silicon platform and other threats in Q1 2021. Continue reading IT threat evolution Q1 2021

IT threat evolution Q1 2021. Non-mobile statistics

In Q1 2021, we blocked more than 2 billion attacks launched from online resources across the globe, detected 77.4M unique malicious and potentially unwanted objects, and recognized 614M unique URLs as malicious. Continue reading IT threat evolution Q1 2021. Non-mobile statistics

Kaspersky Security Bulletin 2020-2021. EU statistics

In the EU, 70% of user computers experienced at least one Malware-class attack, 115,452,157 web attacks and 86,584,675 phishing attempts were blocked. Continue reading Kaspersky Security Bulletin 2020-2021. EU statistics

APT trends report Q1 2021

This report highlights significant events related to advanced persistent threat (APT) activity observed in Q1 2021. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. Continue reading APT trends report Q1 2021

Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild

CVE-2021-28310 is an out-of-bounds (OOB) write vulnerability in dwmcore.dll, which is part of Desktop Window Manager (dwm.exe). We believe it is exploited in the wild, potentially by several threat actors. Continue reading Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild

APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign

A41APT is a long-running campaign with activities detected from March 2019 to the end of December 2020. Most of the discovered malware families are fileless malware and they have not been seen before. Continue reading APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign

Zero-day vulnerabilities in Microsoft Exchange Server

The four vulnerabilities inside Microsoft Exchange Server allow an attacker to compromise a vulnerable server. As a result, an attacker will gain access to all registered email accounts, or be able to execute arbitrary code (remote code execution or RCE) within the Exchange Server context. Continue reading Zero-day vulnerabilities in Microsoft Exchange Server

Kaspersky Security Bulletin 2020. Statistics

Kaspersky solutions blocked 666,809,967 attacks launched from online resources in various countries across the world, 173,335,902 unique URLs were recognized as malicious by Web Anti-Virus. Continue reading Kaspersky Security Bulletin 2020. Statistics