The Syrian Malware House of Cards
Our full Report Introduction The geopolitical conflicts in the Middle East have deepened in the last few years. Syria is no exception, with the crisis there taking many forms, and the cyberspace conflict is intensifying as sides try to tilt the struggle in their favor by exploiting cyber intelligence and using distortion. The Global Research […] more…Edward Snowden says the NSA has an autonomous Monstermind
Edward Snowden has given a long interview to Wired magazine in which he reveals that he has not read all of the NSA documents that he took with him when he left, but is shocked by the ones that he has. Snowden met journalist James Bamford in clandestine circumstances in Russia, a country that recently […] more…Cisco: Blackhole arrest cuts exploit-kit traffic, but don’t let your guard down
Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer. read more more…The echo of Stuxnet
Full PDF version At Kaspersky Lab we regularly conduct threat studies dedicated to a particular type of cyber threat. This summer we decided to look closely at what versions of Windows Operating System are most popular among our users and also at what kind of vulnerabilities are used in cyber-attacks involving exploits. As a result […] more…Shylock/Caphaw malware Trojan: the overview
Recently Kaspersky Lab has contributed to an alliance of law enforcement and industry organizations, to undertake measures against the internet domains and servers that form the core of an advanced cybercriminal infrastructure that uses the Shylock Trojan to attack online banking systems around the globe. Shylock is a banking Trojan that was first discovered in […] more…Latest version of Svpeng targets users in US
Almost a year ago, we wrote our first blog about the mobile Trojan Svpeng. Back then, the first impression was that it was a standard Trojan-SMS class malicious program that stole money from SMS banking accounts. Later we discovered that the cybercriminals had perfected the Trojan’s functionality and it had begun attacking mobile banking users, […] more…US disrupts schemes that stole millions
A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than US$100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort. In unveiling the criminal case, federal authorities said […] more…AOL Mail Service Hacked, Compromised Emails Used To Send Spam
A few days ago, America Online, or AOL, confirmed that their mail service – AOL Mail – had been hacked, with the email addresses (allegedly only 1% of their entire customer base) either compromised and/or spoofed to send spam with links leading to phishing pages. We combed through the Internet to look for samples of […] more…New threat: Trojan-SMS.AndroidOS.Stealer.a
The situation surrounding attempted mobile malware infections is constantly changing, and I’d like to write about one recent trend. Over the last year, Trojan-SMS.AndroidOS.Stealer.a, a mobile Trojan, has become a leader in terms of the number of attempted infections on KL user devices, and now continually occupies the leading positions among active threats. For example, […] more…Rival hackers fighting proxy war over Crimea
Hackers have been busy causing service interruptions, breaching databases, and defacing hundreds of Ukrainian and Russian websites, as the crisis between the two countries plays out in cyberwarfare. The attacks have similarities to the resistance movement that sprung up among German-occupied countries during World War II, which took many forms including sabotage, espionage, armed confrontation […] more…Ransomware and Bitcoin Theft Combine in BitCrypt
CryptoLocker and other such ransomware threats have been a significant problem for some time now, but recently we’ve seen a new addition to the ransomware scene. This new threat, which calls itself BitCrypt, adds a unique angle to ransomware: it steals funds from various cryptocurrency wallets as well. We have identified two distinct variants of […] more…New BlackOS Software Package Sold In Underground Forums
We recently came across this particular post in an underground forum: Figure 1. Underground forum post This particular post in Russian was advertising a new product, known as “BlackOS”. Contrary to the name, it is not an operating system. However, it is definitely “black”, or malicious: it is used to manage and redirect Internet traffic […] more…DDoS attack takes out NATO websites, Ukraine connection claimed
Pro-Russian Ukrainian hacktivist group, ‘Cyber Berkut’, claim to be behind the attacks on the main NATO public website. NATO insisted there was “no operational impact”, but further cyber incidents are likely to emerge from the current political struggle between Russia and Ukraine. more…Trojanized Flappy Bird Comes on the Heels of Takedown by App Creator
The interesting turn of events surrounding the game Flappy Bird has had the Internet buzzing: after becoming massively popular (downloaded more than 50 million times), the developer suddenly announced that he will take down the game from app stores, and then actually did it. The decision brought the interest around the game to an even […] more…A Glimpse Behind "The Mask"
The world of APTs is a colorful place. In 2012, we uncovered Flame, a massive cyberespionage operation infiltrating computers in the Middle East. Our research indicated a connection with the wellknown Stuxnet cyberweapon, designed to sabotage the Iranian nuclear program. In early 2013, we announced our research on RedOctober, a cyberespionage operation focusing on diplomatic […] more…Guilty plea for SpyEye banking malware author
Panin, a Russian national, admitted to developing and distributing the banking malware, which was sold to over 150 clients through underground cybercrime forums, and is designed to compromise PCs and connect them to botnets of similarly backdoored systems. more…More information
- Online Stalking: Jargon or Not, It’s No Laughing Matter
- Thoma Bravo to Acquire Ping Identity for $2.8 Billion
- Facebook says it’s not tracking links in private messages
- Saudi Arabia threatens to ban Skype, WhatsApp, and Viber
- SSCC161 – What do you mean, “Trade him for Edward Snowden”? [PODCAST]
- Adobe Flash Player Exploit Served Via ‘iPhone 5 Battery Images Leak’ Emails
- Yes, your smartphone camera can be used to spy on you…
- First smart TVs powered by Firefox OS on sale in Europe, worldwide soon
- Severe Vulnerabilities Could Expose Thousands of Azure Users to Attacks
- Facebook says yes, your posts can be used for ads