In the fall of 2014, we discovered a new banking Trojan, which caught our attention for two reasons… Read Full Article
Cloud Atlas: RedOctober APT is back in style
Two years ago, we published our research into RedOctober, a complex cyber-espionage operation targeting diplomatic embassies worldwide. We named it RedOctober because we started this investigation in October 2012, an unusually hot month. Read Full Article
'Destover' malware now digitally signed by Sony certificates (updated)
Several days ago, our products detected an unusual sample from the Destover family. Read Full Article
The 'Penquin' Turla
In November 2014, an interesting malicious sample was uploaded to a multiscanner service. This immediately triggered our interest because it appears to represent a previously unknown piece of a larger puzzle. Read Full Article
Sony/Destover: mystery North Korean actor's destructive and past network activity
This week, for the first time ever, the FBI issued a media FLASH to warn businesses about the destructive wiper activity that was used in the attack on Sony Pictures Entertainment. Read Full Article
The art of finding Cyber-Dinosaur skeletons
Following the release of our report on the Regin nation-state cyber operation, questions were raised about whether anti-malware companies deliberately withheld information – and detections – at the request of governments and customers. Read Full Article
Phishing attack to target the clients of a Japanese bank
Most phishing emails that aim to steal bank and e-payment data are written in English. However, we are seeing more and more fraudulent messages written in other languages. Read Full Article
State of play: network devices facing bulls-eye
A long time has passed since we published our analysis of threats for home network devices. Since then, the situation has significantly changed – alas, not for the better. Read Full Article
Guidelines for securing your home
Our homes today look more like small offices. We have tons of different devices connected to our network, everything from storage devices and network equipment to wireless network printers. Read Full Article
Regin: nation-state ownage of GSM networks
A sophisticated group known as Regin has targeted high-profile entities around the world. Regin is one of the most sophisticated attack platforms we have ever analysed. The ability to penetrate and monitor GSM networks is the most unusual aspect of these operations. Read Full Article