Tagged: analysis

IT threat evolution Q1 2021. Non-mobile statistics 0

IT threat evolution Q1 2021. Non-mobile statistics

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, in Q1 2021: Kaspersky solutions blocked 2,023,556,082 attacks...

Gootkit: the cautious Trojan 0

Gootkit: the cautious Trojan

Gootkit is complex multi-stage banking malware that was discovered for the first time by Doctor Web in 2014. Initially it was distributed via spam and exploits kits such as Spelevo and RIG. In conjunction...

IT threat evolution Q1 2021 0

IT threat evolution Q1 2021

Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a sophisticated supply-chain attack. The company’s Orion IT, a solution for monitoring and managing customers’...

CISA Analysis on FiveHands Ransomware 0

CISA Analysis on FiveHands Ransomware

The CISA has published a report on the FiveHands ransomware deployed by an aggressively financially motivated group – UNC2447. The campaign involved extortion incidents between January and February. click here to read full Article...

DDoS attacks in Q1 2021 0

DDoS attacks in Q1 2021

News overview Q1 2021 saw the appearance of two new botnets. News broke in January of the FreakOut malware, which attacks Linux devices. Cybercriminals exploited several critical vulnerabilities in programs installed on victim devices,...

Operation TunnelSnake 0

Operation TunnelSnake

Windows rootkits, especially those operating in kernel space, are pieces of malware infamous for their near absolute power in the operating system. Usually deployed as drivers, such implants have high privileges in the system,...