Category: SECURELIST
-
Dero miner zombies biting through Docker APIs to build a cryptojacking horde
Kaspersky experts break down an updated cryptojacking campaign targeting containerized environments: a Dero crypto miner abuses the Docker …
-
Threat landscape for industrial automation systems in Q1 2025
Kaspersky ICS CERT shares trends and statistics on industrial threats in Q1 …
-
State of ransomware in 2025
Kaspersky researchers review ransomware trends for 2024, analyze the most active groups and forecast how this threat will evolve in …
-
Outlaw cybergang attacking targets worldwide
The Kaspersky Global Emergency Response Team (GERT) detected an Outlaw mining botnet in a customer incident. In this article, we share …
-
Triada strikes back
Kaspersky expert has discovered a new version of the Triada Trojan, with custom modules for Telegram, WhatsApp, TikTok, and other …
-
Operation SyncHole: Lazarus APT goes back to the well
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a …
-
Russian organizations targeted by backdoor masquerading as secure networking software upda
While investigating an incident, we discovered a sophisticated new backdoor targeting Russian organizations by impersonating secure …
-
Lumma Stealer – Tracking distribution channels
During incident response activities, our GERT team discovered Lumma Stealer in a customer’s infrastructure. Our experts conducted an …
-
Phishing attacks leveraging HTML code inside SVG files
Attackers are increasingly sending phishing emails with SVG attachments that contain embedded HTML pages or JavaScript …
-
IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia
MysterySnail RAT attributed to IronHusky APT group hasn’t been reported since 2021. Recently, Kaspersky GReAT detected new versions of …
-
Streamlining detection engineering in security operation centers
A proper detection engineering program can help improve SOC operations. In this article we’ll discuss potential SOC issues, the necessary …
●●●