Securelist – Kaspersky Lab’s cyberthreat research and reports
English
  • English
  • Pусский
  • Deutsch
  • Français
  • Italiano
  • Español
  • Polski
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions
Menu
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions

Securelist Archive / Analysis

Tag: Sinowal

no-image
News archive

TDL4 Starts Using 0-Day Vulnerability!

December 7, 2010, 4:45 pm.
Sergey Golovanov

In early December, Kaspersky Lab experts detected samples of the malicious program TDL4 (a new modification of TDSS) which uses a 0-day vulnerability for privilege escalation under Windows 7/2008 x86/x64 (Windows Task Scheduler Privilege Escalation, CVE: 2010-3888). Read Full Article

no-image
Publications

Bootkit 2009

June 9, 2009, 4:00 pm.
Vyacheslav Rusakov, Sergey Golovanov

In 2008, we wrote about Backdoor.Win32.Sinowal , a malicious program we believed to pose a serious threat, as it employed the most advanced, at the time, virus technologies. Read Full Article

no-image
Publications

Bootkit: the challenge of 2008

December 18, 2008, 10:00 am.
Sergey Golovanov, Alexander Gostev, Alexey Monastyrsky

The term MalWare 2.0 is often used in our reports to denote a model for the complex malicious programs which appeared at the end of 2006. The most striking examples, and the initial members of MalWare 2.0 are the Bagle, Warezov and Zhelatin worms. Read Full Article

no-image
Malware reports

Malware evolution: January – March 2008

May 7, 2008, 10:00 am.
Alexander Gostev

Our annual report on malware evolution in 2007, published a few months ago, contained forecasts on how the threat landscape would evolve in 2008 Read Full Article

  • Categories
  • Date
  • Tags
  • Author
  • APT reports
  • Archive
  • DDoS reports
  • Events
  • Incidents
  • Industrial threats
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware reports
  • Mobile threats
  • News archive
  • Opinion
  • Publications
  • Research
  • SAS
  • Security technologies
  • Software
  • Spam and phishing
  • Spam and phishing reports
  • Virus Watch
  • Webcasts
<
  • 2018

    • Jan
    • Feb
    • Mar
    • Apr
  • 2017

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2016

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2015

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • AES-256
  • Audiocapture
  • Banloader
  • Base64
  • Biometric authentication
  • Bitcoins
  • Comparative Tests
  • DBIR APT
  • Desktop
  • Destructive attackers
  • Detected Objects
  • DNS Amplification
  • Dropbox
  • Espionage
  • Excel
  • Google glass
  • JAR
  • Mcrosoft Office
  • Methods of authentication
  • No More Ransom
  • OS X
  • PAC
  • PlugX
  • Python
  • Qt
  • RaaS
  • Remsec
  • Screenshot
  • Surveillance
  • TLD
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertisement
  • Adware
  • AES-256
  • Amazon
  • AMD
  • Android
  • Animal Farm
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iOS
  • Apple MacOS
  • Application Control
  • APT
  • APT criminal
  • Arabic Malware
  • ARM
  • AT&T
  • ATM
  • ATM attacks
  • Audiocapture
  • Backdoor
  • Backup
  • BadRabbit
  • Bagle
  • Banking Trojan
  • Banloader
  • Base64
  • Biometric authentication
  • BIOS
  • Bitcoin
  • Bitcoins
  • Bitscout
  • Blackberry
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Bootkit
  • Boran
  • Botnets
  • Bozori
  • Brasil
  • Brazil
  • Browser Plugins
  • BSides
  • BTC
  • Buffer Overflows
  • Cabir
  • Campaigns
  • CAPTCHA
  • Carbanak
  • Certificate
  • Certificate authorities
  • Chronopay
  • CIL
  • Cloud
  • Cloud Computing
  • code injection
  • Comodo
  • Comparative Tests
  • Conferences
  • connected car
  • Content Filtering
  • Copyright
  • Corporative Threats
  • Credit Cards
  • Crimeware
  • Cross-platform malware
  • Crypto
  • Cryptocurrencies
  • cryptocurrency
  • CVE
  • Cyber espionage
  • Cyber War
  • Cyber weapon
  • Cybercrime
  • Cybercrime Legislation
  • Cyberespionage
  • Darknet
  • Data Encryption
  • Data leaks
  • Data loss
  • Data Protection
  • DBIR APT
  • DDoS-attacks
  • Deception techniques
  • Default Deny
  • Dell
  • Desktop
  • Destructive attackers
  • Detected Objects
  • Digital Certificates
  • DLL hijacking
  • DNS
  • DNS Amplification
  • DoS
  • drive-by attack
  • drivers
  • Dropbox
  • Dropper
  • Duqu
  • Duts
  • eBay
  • Electronic Payments
  • Email
  • Emotet
  • Encryption
  • Equation
  • Espionage
  • Excel
  • Exhibitions
  • ExPetr
  • Exploit Kits
  • Facebook
  • FakeCry
  • False Alarms
  • false positives
  • File Sharing
  • fileless malware
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Forecast
  • Forensic
  • Forensics
  • Fraud
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hackers Attacks
  • Hacking Team
  • HDD Rootkit
  • HDRoot
  • History of Malware
  • Hoaxes
  • honeypot
  • HTC
  • HTTPS
  • ICS
  • Identity Theft
  • Induc
  • Industrial control systems
  • industrial software
  • Industrial threats
  • Infected Files and Devices
  • infrastructure
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • Internet Safety
  • IOActive
  • IOC
  • iOS
  • IoT
  • JAR
  • Java
  • JavaScript
  • Joint ventures
  • Json
  • Kaspersky Lab
  • Kaspersky Security Network (KSN)
  • KasperskyOS
  • Kelvir
  • Keylogger
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • KSS
  • Law Enforcement
  • Lazarus
  • LdPinch
  • LinkedIn
  • Linux
  • Location-based services
  • LoveLetter
  • Machete
  • machine learning
  • Macros
  • Madi
  • Malicious spam
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • malware description
  • Malware Descriptions
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • marketplace
  • Mastercard
  • MBR
  • Mcrosoft Office
  • messengers
  • Methods of authentication
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Internet Explorer
  • Microsoft Office
  • Microsoft Windows
  • Microsoft Word
  • Miner
  • Mirai
  • MITM
  • Mobile Attacks
  • mobile browser
  • Mobile Malware
  • Mobile security
  • Money theft
  • Motorola
  • Mozilla Foundation
  • MSIL
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Scam
  • Nigerian Spam
  • No More Ransom
  • Non-Windows Malware
  • Novell
  • Numerology
  • Nyxem
  • Obfuscation
  • Offline Phishing
  • Onion
  • Online Games
  • open source
  • Oracle
  • OS X
  • OSX
  • P2P networks
  • PAC
  • Parental control
  • Passwords
  • Patch tuesday
  • Paypal
  • Petya
  • Phishing
  • PHP
  • Plugins
  • PlugX
  • Polymorphism
  • POS malware
  • PowerShell
  • Privacy
  • proactive protection
  • ProjectSauron
  • Proof-of-Concept
  • Public key infrastructure
  • Public transportation
  • PUPs
  • Python
  • QR code
  • Qt
  • RaaS
  • Ransomware
  • RAT Trojan
  • RDP
  • RedHat
  • Remsec
  • Reverse engineering
  • RFID
  • Rogue Security Solutions
  • Rooting Trojan
  • Rootkits
  • Router
  • RSA
  • Russian-speaking cybercrime
  • Safari
  • Sality
  • Santy
  • Sasser
  • Satellite
  • Scada
  • Scam
  • Screenshot
  • Script
  • Script Worms
  • Search Engines
  • Seculert
  • Secunia
  • secure OS
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shadow Brokers
  • Shamoon
  • Shellshock
  • Signed malware
  • Simda
  • Sinowal
  • Skype
  • Smart City
  • Smart home
  • SmartTV
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social networks
  • Sofacy
  • Software
  • Sony
  • Spam
  • Spam and the law
  • Spam Letters
  • Spam report
  • Spam Statistics
  • Spammer techniques
  • Spear-Phishing
  • Spearphishing
  • SpyEye
  • Spyware
  • SSL
  • steganography
  • Stuxnet
  • Sun Java
  • SunOS / Solaris
  • supply-chain attack
  • Surveillance
  • Syria
  • Targeted attack
  • Targeted Attacks
  • TDSS
  • TeamXRat
  • Tematic Spam
  • TheSAS2016
  • TheSAS2017
  • TLD
  • Tools
  • TOR
  • Trainings
  • Trojan
  • Trojan-Bankers
  • Trojan-clicker
  • Trusted Environment
  • Turla
  • Twitter
  • Ubuntu
  • UEFI
  • USB-token
  • VBE
  • VBMania
  • Verisign
  • Verizon
  • Virtualization
  • Virus Writers Wars
  • Virut
  • VISA
  • VMWare
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerabilities and Hackers
  • Vulnerability Statistics
  • WannaCry
  • WAP
  • Wardriving
  • Warezov
  • Watering hole attacks
  • Wearable devices
  • Weblogs
  • Website Hacks
  • WhatsApp
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Windows
  • Windows 10
  • Windows Mobile
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • XSS
  • Zafi
  • zero-day exploit
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Ztorg
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Alon, Noam
  • Alyushin, Victor
  • Amin Hasbini, Mohamad
  • Antukh, Alexander
  • Armstrong, Tim
  • Aseev, Eugene
  • Assolini, Fabio
  • Bakhmutov, Andrey
  • Bartholomew, Brian
  • Baumgartner, Kurt
  • Belov, Sergey
  • Berdnikov, Vasily
  • Bestuzhev, Dmitry
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Brulez, Nicolas
  • Buchka, Nikita
  • Bulavas, Vladas
  • But, Andrey
  • Chebyshev, Victor
  • Coursen, Shane
  • Creus, Dani
  • Dashchenko, Vladimir
  • Davydov, Vasily
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Diaz, Vicente
  • Dolgushev, Andrey
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Emelyanova, Olga
  • Emm, David
  • Eremin, Alexander
  • Fedotov, Nikolay
  • Firsh, Alexey
  • Funk, Christian
  • Galov, Dmitry
  • Garnaeva, Maria
  • Godwood, Ben
  • Goland, Dani
  • Golovanov, Sergey
  • Golovkin, Maxim
  • Gorchakov, Denis
  • Gorobets, Oleg
  • Gostev, Alexander
  • GReAT,
  • Grachev, Igor
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Guerrero-Saade, Juan Andrés
  • Hioureas, Vasilios
  • Ibragimov, Timur
  • ICS CERT, Kaspersky Lab
  • Ignatiev, Konstantin
  • Ilganaev, Kirill
  • Ishimaru, Suguru
  • Ivanov, Anton
  • Jacoby, David
  • Janus, Marta
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kamluk, Vitaly
  • Karasovsky, Dmitry
  • Kaspersky Lab,
  • Kazantsev, Anatoly
  • Khalimonenko, Alexander
  • Khudyakov, Andrey
  • Kivva, Anton
  • Kochetova, Olga
  • Kolesnikov, Alexander
  • Kollberg, Dirk
  • Kolotinsky, Evgeny
  • Komarov, Alexey
  • Kostin, Andrey
  • Kruglov, Kirill
  • Krylova, Evgeniya
  • Krylov, Vladimir
  • Kryukov, Andrey
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Roman
  • Ladikov, Andrey
  • Larin, Boris
  • Larkina, Anna
  • Legezo, Denis
  • Liskin, Alexander
  • Lopatin, Evgeny
  • Lozhkin, Sergey
  • Lurye, Sergey
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Malanov, Alexey
  • Mamedov, Orkhan
  • Markov, Konstantin
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mineev, Sergey
  • Molsner, Michael
  • Monastyrsky, Alexey
  • Moore, Daniel
  • Muravitsky, Andrey
  • Namestnikova, Maria
  • Namestnikov, Yury
  • Naor, Ido
  • Naraine, Ryan
  • Nazarov, Denis
  • Nikishin, Andrey
  • Novikov, Sergey
  • Olsen, Bo
  • Onishchenko, Alexander
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Osipov, Alexey
  • Parinov, Denis
  • Parys, Bart
  • Pintiysky, Vladislav
  • Pomerantsev, Ilya
  • Pontiroli, Santiago
  • Preuss, Marco
  • Prokhorenko, Mikhail
  • Rid, Thomas
  • Rosén, Frans
  • Rubinstein, Maria
  • Rubin, Andrey
  • Rudina, Ekaterina
  • Rusakov, Vyacheslav
  • Saad, Ghareeb
  • Sako, Roland
  • Samekh, Mary-Beth
  • Sapronov, Konstantin
  • Schouwenberg, Roel
  • Semenchenko, Artem
  • Shabab, Noushin
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shmelev, Yaroslav
  • Shulmin, Alexey
  • Shvetsov, Dmitry
  • Shvetsov, Nikita
  • Sinitsyn, Fedor
  • Slepogin, Nikita
  • Soumenkov, Igor
  • Stepanov, Boris
  • Stolyarov, Vladislav
  • Stoyanov, Ruslan
  • Strohschneider, Jens
  • Tanase, Stefan
  • Tarakanov, Dmitry
  • Unuchek, Roman
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vinogradov, Dmitry
  • Vlasova, Victoria
  • Vlasova, Anna
  • Volodina, Anna
  • van der Wiel, Jornt
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yunakovsky, Sergey
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Sergey
  • Zelensky, Pavel
  • Zhang, Vigi
  • Zhuravlev, Maxim
  • Ziarek, Maciej
  • Zykov, Konstantin

© 2018 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective owners.

Contact us | Privacy Policy | License Agreement

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • RSS
  • Email