Home Tags Iran

Tag: Iran

IT threat evolution Q1 2017. Statistics

According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world.

File antivirus detected a total of 174,989,956 unique malicious and potentially unwanted objects.

Spam and phishing in Q1 2017

Although the beginning of Q1 2017 was marked by a decline in the amount of spam in overall global email traffic, in March the situation became more stable, and the average share of spam for the quarter amounted to 55.9%.

The US (18.75%) remained the biggest source of spam, followed by Vietnam (7.86%) and China (7.77%).

Hajime, the mysterious evolving botnet

Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 in a public report by RapidityNetworks.
In this blogpost we outline some of the recent ‘improvements’ to Hajime, some techniques that haven’t been made public, and some statistics about infected IoT devices.

Windows bug used to spread Stuxnet remains world’s most exploited

Code-execution flaw is triggered by plugging a booby-trapped USB into vulnerable PCs.

Microsoft Word 0-day was actively exploited by strange bedfellows

Same exploit used by malware crooks and nation-sponsored hackers targeting Russians.

The Mistakes of Smart Medicine

A technological boom in medicine both encouraged medical institutions to use exclusively information systems in processing data and led to the emergence of new types of technological equipment and personal devices that can be used to interact with traditional systems and networks.

This means that the threats that are relevant for them can also be relevant for medical systems.

After NSA hacking exposé, CIA staffers asked where Equation Group went...

CIA hackers wasted no time analyzing the blunders made by their NSA counterparts.

From Shamoon to StoneDrill

Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at multiple targets in the Middle East.

The malware used in the new attacks was a variant of the infamous Shamoon worm that targeted Saudi Aramco and Rasgas back in 2012.

Mobile malware evolution 2016

In 2016, the growth in the number of advertising Trojans capable of exploiting super-user rights continued.

Throughout the year it was the No. 1 threat, and we see no sign of this trend changing.

Iran Intensifies Its Cyberattack Activity

Middle East targets - namely Saudi Arabia - feeling the brunt of the attacks, but experts anticipate Iran will double down on hacking US targets.

Revealed: Web servers used by disk-nuking Shamoon cyberweapon

Avoid this wonderful malware on your network by black-holing connections A detailed analysis of the Shamoon malware – which is playing a huge role in the cyberwar between Saudi Arabia and Iran – has identified servers used to spread the software nasty.…

US visitors may have to reveal social media passwords to enter...

"If they don't want to cooperate, then you don't come in."