Dissecting TriangleDB, a Triangulation spyware implant
Over the years, there have been multiple cases when iOS devices were infected with targeted spyware such as Pegasus, Predator, Reign and others. Often, the process of infecting a device involves...
A bowl full of security problems: Examining the vulnerabilities of smart pet feeders
Introduction
In today’s interconnected world, more and more devices are being connected to the internet, including everyday household items like pet feeders that are becoming smart by virtue of this simple fact....
Understanding Malware-as-a-Service
Money is the root of all evil, including cybercrime. Thus, it was inevitable that malware creators would one day begin not only to distribute malicious programs themselves, but also to sell...
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency
Introduction
Stealing cryptocurrencies is nothing new. For example, the Mt. Gox exchange was robbed of many bitcoins back in the beginning of 2010s. Attackers such as those behind the Coinvault ransomware were...
IT threat evolution Q1 2023
IT threat evolution in Q3 2022
IT threat evolution in Q3 2022. Non-mobile statistics
IT threat evolution in Q3 2022. Mobile statistics
Targeted attacks
BlueNoroff introduces new methods bypassing MotW
At the close of 2022, we...
IT threat evolution Q1 2023. Mobile statistics
IT threat evolution Q1 2023
IT threat evolution Q1 2023. Non-mobile statistics
IT threat evolution Q1 2023. Mobile statistics
These statistics are based on detection verdicts of Kaspersky products received from users who consented...
IT threat evolution in Q1 2023. Non-mobile statistics
IT threat evolution in Q1 2023
IT threat evolution in Q1 2023. Non-mobile statistics
IT threat evolution in Q1 2023. Mobile statistics
These statistics are based on detection verdicts of Kaspersky products and services...
Satacom delivers browser extension that steals cryptocurrency
Satacom downloader, also known as LegionLoader, is a renowned malware family that emerged in 2019. It is known to use the technique of querying DNS servers to obtain the base64-encoded URL...
In search of the Triangulation: triangle_check utility
In our initial blogpost about “Operation Triangulation”, we published a comprehensive guide on how to manually check iOS device backups for possible indicators of compromise using MVT. This process takes time...
Operation Triangulation: iOS devices targeted with previously unknown malware
While monitoring the network traffic of our own corporate Wi-Fi network dedicated for mobile devices using the Kaspersky Unified Monitoring and Analysis Platform (KUMA), we noticed suspicious activity that originated from...