This report covers our team’s incident response practices for the year 2018. We have thoroughly analyzed all the service requests, customer conversations and incident response deliverables to provide you an overview in numbers. Read Full Article
Bots and botnets in 2018
Due to the wide media coverage botnets activities have become largely associated with DDoS attacks. Yet this is merely the tip of the iceberg, and botnets are used widely not only to carry out DDoS attacks, but to steal various user information. Read Full Article
Hey there! How much are you worth?
I decided to investigate the black market and see what kind of information is being sold there. We all know that you can buy drugs, weapons and stolen goods there, but you can also buy online identities. How much do you think your online identity is worth? Read Full Article
Bingo, Amigo! Jackpotting: ATM malware from Latin America to the World
Of all the forms of attack against financial institutions around the world, the one that brings traditional crime and cybercrime together the most is the malicious ecosystem that exists around ATM malware. Criminals from different backgrounds work together with a single goal in mind: jackpotting. Read Full Article
Future attack scenarios against ATM authentication systems
The report comprises two papers in which we analyze all existing methods of authentication used in ATMs and those expected to be used in the near future, including: contactless authentication through NFC, one-time password authentication and biometric authentication systems, as well as potential vectors of attacks using malware, through to network attacks and attacks on hardware components. Read Full Article
Russian financial cybercrime: how it works
The Russian-language cybercrime market is known all over the world. Kaspersky Lab experts have been monitoring the Russian hacker underground since its emergence. In this review we analyze how financial cybercrime works. Read Full Article
Well, that escalated quickly
From penny-stealing malware to multi-million-dollar heists, a quick overview of the bitcoin bonanza in the digital era. Read Full Article
Sinkholing the Backoff POS Trojan
There is currently a lot of buzz about the Backoff point-of-sale Trojan that is designed to steal credit card information from computers that have POS terminals attached. Read Full Article
The economics of Botnets
In the past ten years, botnets have evolved from small networks of a dozen PCs controlled from a single C&C into sophisticated distributed systems comprising millions of computers with decentralized control. Why are these enormous zombie networks created? Read Full Article
Mobile thefts – using malware in Indonesia
We found 5 new Trojans over the past week which send such money transfer requests to 151 – without the permission or knowledge of the phone’s owner. Read Full Article