Monthly Archives: May 2017

Adware the series, part 4

In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our objective is to give you an idea of how many different types of adware are around for … Continue reading

Posted in Antivirus | Comments Off on Adware the series, part 4

A week in security (May 22 – May 28)

Last week we informed you about several new threats, including the android ransomware that targets Tencent users. This SLocker.fh masquerades as various legitimate apps to fool users into accepting escalated rights. Or how about the potential danger of spilling Windows … Continue reading

Posted in Antivirus | Comments Off on A week in security (May 22 – May 28)

A stolen version of DMA-locker is making the rounds

Ransomware has become a popular criminal business with a relatively easy entrance. Even the people with little technical knowledge can build their own ransomware based on open source code, that has been published on the internet some time ago. Nevertheless, … Continue reading

Posted in Antivirus | Comments Off on A stolen version of DMA-locker is making the rounds

Dridex: A History of Evolution

The Dridex banking Trojan, which has become a major financial cyberthreat in the past years (in 2015, the damage done by the Trojan was estimated at over $40 million), stands apart from other malware because it has continually evolved and … Continue reading

Posted in Antivirus | Comments Off on Dridex: A History of Evolution

RoughTed: The anti ad-blocker malvertiser

RoughTed is a large malvertising operation that peaked in March 2017 but has been going on for at least well over a year. It is unique for its considerable scope ranging from scams to exploit kits, targeting a wide array of … Continue reading

Posted in Antivirus | Comments Off on RoughTed: The anti ad-blocker malvertiser

5 Unsettling cyberthreats

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who’s trying it.  But what about the outliers? What about threats that impact you, but you can’t remediate, or … Continue reading

Posted in Antivirus | Comments Off on 5 Unsettling cyberthreats

Stealing Windows credentials using Google Chrome

Security researcher Bosko Stankovic recently published an article explaining how an attacker could use Chrome, the SMB file sharing protocol, and Windows Explorer Shell Command File to steal victims credentials. The basic elements Chrome Similar attacks have been demonstrated using … Continue reading

Posted in Antivirus | Comments Off on Stealing Windows credentials using Google Chrome

IT threat evolution Q1 2017. Statistics

Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were recognized as malicious by web antivirus components. Attempted infections by … Continue reading

Posted in Antivirus | Comments Off on IT threat evolution Q1 2017. Statistics

IT threat evolution Q1 2017

Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to … Continue reading

Posted in Antivirus | Comments Off on IT threat evolution Q1 2017

A week in security (May 15 – May 21)

Last week was dominated by the WannaCry ransomware and the discussions ensuing it. We published: A quick roundup of everything we found out in the first few days. How did it spread? Was it by email, was it a targeted … Continue reading

Posted in Antivirus | Comments Off on A week in security (May 15 – May 21)