PRINT
PRINT
SEND MAIL
SEND MAIL

Tag: ransomware

Security FeedsMalware StatisticsFeaturedMobile MalwareMalware reportsTrojan BankerTrojan-DropperStalkerwareSMS Trojan

IT threat evolution Q2 2020. Mobile statistics

IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. PC statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, the second quarter saw: 1,245,894 detected malicious installers, of which 38,951 packages were related to mobile banking trojans 3,805 packages proved to be mobile ransomware trojans A total of 14,204,345 attacks on mobile devices were blocked Quarterly highlights In summing up the results of the…

Security FeedsMalware StatisticsFinancial malwareInternet of ThingsFeaturedVulnerabilities and exploitsMalware reportsMinerApple MacOSVulnerability StatisticsTrojan-Dropper

IT threat evolution Q2 2020. PC statistics

IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, in Q2: Kaspersky solutions blocked 899,744,810 attacks launched from online resources in 191 countries across the globe. As many as 286,229,445 unique URLs triggered Web Anti-Virus components. Attempted infections by malware designed to steal money via online access to bank accounts were logged on the…

Security FeedsIndustrial threatsPublicationsFeaturedVulnerabilities and exploitsData leaksMalicious spamMedical threatsMoney theft

Incident Response Analyst Report 2019

 Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries’ cyber-incident tactics and techniques used in the wild. In this report, we share our teams’ conclusions and analysis based on incident responses and statistics from 2019. As well as a range of highlights, this report will cover the affected industries, the most widespread attack tactics and techniques, how long it took to detect and stop adversaries after initial entry and the most…

Security FeedsMalware DescriptionsFeaturedTargeted AttacksMalware Technologies

WastedLocker: technical analysis

The use of crypto-ransomware in targeted attacks has become an ordinary occurrence lately: new incidents are being reported every month, sometimes even more often. On July 23, Garmin, a major manufacturer of navigation equipment and smart devices, including smart watches and bracelets, experienced a massive service outage. As confirmed by an official statement later, the cause of the downtime was a cybersecurity incident involving data encryption. The situation was so dire that at the time of writing of this post (7/29) the operation of…

Security FeedsAPTFinancial malwareAPT reportsFeaturedTargeted AttacksLazarusTurlaRussian-speaking cybercrimeChinese-speaking cybercrime

APT trends report Q2 2020

For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of. This is our latest installment, focusing on activities that we observed during…

Security FeedsBotnetsMalware DescriptionsAPT reportsFeaturedTargeted AttacksCybercrimeMalware TechnologiesLazarus

Lazarus on the hunt for big game

We may only be six months in, but there’s little doubt that 2020 will go down in history as a rather unpleasant year. In the field of cybersecurity, the collective hurt mostly crystallized around the increasing prevalence of targeted ransomware attacks. By investigating a number of these incidents and through discussions with some of our trusted industry partners, we feel that we now have a good grasp on how the ransomware ecosystem is structured. Structure of the ransomware ecosystem Criminals piggyback on widespread botnet…

Security FeedsMalware DescriptionsFeaturedVulnerabilities and exploitsMalware Technologiesexploit kits

Magnitude exploit kit – evolution

Exploit kits are not as widespread as they used to be. In the past, they relied on the use of already patched vulnerabilities. Newer and more secure web browsers with automatic updates simply do not allow known vulnerabilities to be exploited. It was very different back in the heyday of Adobe Flash because it’s just a plugin for a web browser, meaning that even if the user has an up-to-date browser, there’s a non-zero chance that Adobe Flash may still be vulnerable to 1-day…

Security FeedsMalware StatisticsFinancial malwareInternet of ThingsFeaturedVulnerabilities and exploitsGoogle AndroidMobile MalwareMalware reportsMinerTrojan BankerApple MacOSVulnerability Statistics

IT threat evolution Q1 2020. Statistics

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, Kaspersky solutions blocked 726,536,269 attacks launched from online resources in 203 countries across the globe. A total of 442,039,230 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 249,748 unique users. Ransomware attacks were defeated on the…

Security FeedsMalware StatisticsPublicationsVulnerabilities and exploitsCybercrimeWebsite HacksData theft

Verizon’s 2020 DBIR

Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data from our unique and objective research. We have contributed to this project and others like it for years now. This year’s ~120 page report analyses data from us and 80 other contributors from all over the world. The team provides thoughts on a mountain of breach data – “This year, we analyzed a record…