Kaspersky Security Bulletin 2016. Story of the year
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […] more…IT threat evolution Q3 2016
Download the full report (PDF) Overview Targeted attacks and malware campaigns Dropping Elephant Targeted attack campaigns don’t need to be technically advanced in order to be successful. In July 2016 we reported on a group called Dropping Elephant (also known as ‘Chinastrats’ and ‘Patchwork’). Using a combination of social engineering, old exploit code and some […] more…TeamXRat: Brazilian cybercrime meets ransomware
Brazilian cybercriminals are notorious for their ability to develop banking trojans but now they have started to focus their efforts in new areas, including ransomware. We discovered a new variant of a Brazilian-made ransomware, Trojan-Ransom.Win32.Xpan, that is being used to infect local companies and hospitals, directly affecting innocent people, encrypting their files using the extension […] more…Ransomware and Business Email Compromise (BEC) Lead Year of Online Extortion
Emails have become the battleground for the first half of the year in terms of security. It is the number one infection vector that have ushered in 2016’s biggest threats so far—ransomware and business email compromise (BEC). Ransomware infections normally start via email. Based on our findings, 71% of the known ransomware families’ delivery method […] more…Threat intelligence report for the telecommunications industry
Download PDF Introduction The telecommunications industry keeps the world connected. Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission – and they communicate and store vast amounts of sensitive data. This makes them a top target for cyber-attack. According to PwC’s Global State of Information Security, 2016, IT […] more…IT threat evolution in Q2 2016. Overview
Download the full report (PDF) Targeted attacks and malware campaigns Cha-ching! Skimming off the cream Earlier in the year, as part of an incident response investigation, we uncovered a new version of the Skimer ATM malware. The malware, which first surfaced in 2009, has been re-designed. So too have the tactics of the cybercriminals using […] more…VDI: Non-virtual problems of virtual desktop security, and how to solve them for real
Introduction Virtualization marches victoriously across the globe, adding to its list of champions not only individual IT-specialists and businesses, but even whole sections of the IT industry. In fact, it’s barely possible to find a data center with only physical servers on board: both electricity and physical space are far too expensive nowadays to be […] more…KSN Report: Mobile ransomware in 2014-2016
Part 1. KSN Report: PC ransomware in 2014-2016 Download PDF version Statistics The activity of mobile ransomware, although not as widely covered in the media as PC ransomware, also skyrocketed over the period covered by this report. Especially in the second half. Fig. 12: The number of users encountering mobile ransomware at least once in […] more…Crypto-ransomware Gains Footing in Corporate Grounds, Gets Nastier for End Users
In the first four months of 2016, we have discovered new families and variants of ransomware, seen their vicious new routines, and witnessed threat actors behind these operations upping the ransomware game to new heights. All these developments further establish crypto-ransomware as a lucrative cybercriminal enterprise. As we predicted, this year is indeed shaping up […] more…Hello from #RSA2016!
This week, a large fraction of the world’s top security professionals converge into the wonderful city of San Francisco for RSA Conference 2016. Spread across several halls and buildings, the event has grown to be a kind of “meet anyone” type of conference/show, where you can’t walk for more than a 100 meters without running […] more…APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks
Introduction In late 2014, Kaspersky Lab researchers made a worrying prediction: financially-motivated cyber-criminals would adopt sophisticated tactics and techniques from APT groups for use in bank robberies. Just a few months later, in February 2015, we announced the discovery of Carbanak, a cyber-criminal gang that used custom malware and APT techniques to steal millions of […] more…Chimera Crypto-Ransomware Wants You (As the New Recruit)
Victim or potential business partner? That’s the question raised by the crypto-ransomware named Chimera (Ransom_CRYPCHIM.A). At first glance, it might seem like your typical crypto-ransomware. However, there are three things that make Chimera stand out. Online Extortion The first is the threat of exposure: Chimera not only encrypts files, it also threatens to post them online […] more…Macro Threats and Ransomware Make Their Mark: A Midyear Look at the Email Landscape
Email can be considered a big business—for cybercrime. In 2014, 196.3 billion emails were sent and received daily. Of that number, 108.7 billion were business emails. With the volume of business emails sent daily, it would be unimaginable for cybercriminals not to take advantage of email to target big businesses. And those attempts can result in million-dollar […] more…FuTuRology: Watch Out for Literally Crippling Healthcare Technologies
We’re back to look inside the crystal ball of future technologies. This is the third post of the “FuTuRology” project, a blog series where the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of popular technologies. In the last two installments of this series, we introduced our future technology threat landscape project and started to […] more…FuTuRology: A Look at Impending Threats to Popular Technologies
How do you think will the threat landscape evolve in the next two years? Three years? One of the most exciting aspects of belonging to a research group like the Trend Micro Forward-Looking Threat Research (FTR) team is practicing the intellectual exercise that is predicting the future. We can’t know what will happen but, with […] more…State of Play: Network Devices Facing Bulls-eye
A long time has passed since we published our analysis of threats for home network devices. Since then, the situation has significantly changed – alas, not for the better. Back in 2011, we were concerned mainly about the security of SOHO routers, DSL modems and wifi access points. Today, we are talking about the whole […] more…More information
- NoFlyZone aims to keep the airspace over your home drone-free
- Apple says iOS 14.5.1 and macOS 11.3.1 patch WebKit flaws that may have been actively exploited
- New Mirai Variant Targets Enterprise IoT Devices
- University Enterprise Network Redundant Connections Migration April 25th
- Dyre Banking Trojan Now Targets Windows 10, Microsoft Edge
- What Would Life Be Like In A World Without The Internet?
- 福利 | 获取HITB安全峰会门票的最全姿势(阿姆斯特丹)#HITB2018AMS
- Hacking Intelligent Buildings and a Journey into a Modern Private Hospital at #HITB2018AMS
- Fighting Back Against the Cyber Mafia
- FBI Investigates Hacking of Computers at Sony Pictures