Securelist – Kaspersky Lab’s cyberthreat research and reports
English
  • English
  • Pусский
  • Deutsch
  • Français
  • Italiano
  • Español
  • Polski
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions
Menu
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions

Securelist Archive / Analysis

Tag: Crypto

no-image
Publications

Steganography in contemporary cyberattacks

August 3, 2017, 9:00 am.
Alexey Shulmin, Evgeniya Krylova

Today, a dangerous new trend is emerging: steganography is increasingly being used by actors creating malware and cyber-espionage tools. Most modern anti-malware solutions provide little, if any, protection from steganography, while any carrier in which a payload can be secretly carried poses a potential threat. Read Full Article

no-image
Publications

A look into the Russian-speaking ransomware ecosystem

February 14, 2017, 12:41 am.
Anton Ivanov

In other words, crypto ransomware is a fine tuned, user friendly and constantly developing ecosystem. In the last few years we, at Kaspersky Lab, have been monitoring the development of this ecosystem. This is what we’ve learned. Read Full Article

no-image
Publications

KSN Report: PC ransomware in 2014-2016

June 22, 2016, 10:59 am.
Kaspersky Lab

The number of users attacked with ransomware is huge. But how big is it? Ransomware seems to be a global threat. But maybe there are regions at a higher risk of danger? There seem to be a lot of ransomware malware groups. But what are the most widespread and dangerous? Read Full Article

  • Categories
  • Date
  • Tags
  • Author
  • APT reports
  • Archive
  • DDoS reports
  • Events
  • Incidents
  • Industrial threats
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware reports
  • Mobile threats
  • News archive
  • Opinion
  • Publications
  • Research
  • SAS
  • Security technologies
  • Software
  • Spam and phishing
  • Spam and phishing reports
  • Virus Watch
  • Webcasts
<
  • 2018

    • Jan
    • Feb
    • Mar
    • Apr
  • 2017

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2016

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2015

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • AES-256
  • Audiocapture
  • Banloader
  • Base64
  • Biometric authentication
  • Bitcoins
  • Comparative Tests
  • DBIR APT
  • Desktop
  • Destructive attackers
  • Detected Objects
  • DNS Amplification
  • Dropbox
  • Espionage
  • Excel
  • Google glass
  • JAR
  • Mcrosoft Office
  • Methods of authentication
  • No More Ransom
  • OS X
  • PAC
  • PlugX
  • Python
  • Qt
  • RaaS
  • Remsec
  • Screenshot
  • Surveillance
  • TLD
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertisement
  • Adware
  • AES-256
  • Amazon
  • AMD
  • Android
  • Animal Farm
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iOS
  • Apple MacOS
  • Application Control
  • APT
  • APT criminal
  • Arabic Malware
  • ARM
  • AT&T
  • ATM
  • ATM attacks
  • Audiocapture
  • Backdoor
  • Backup
  • BadRabbit
  • Bagle
  • Banking Trojan
  • Banloader
  • Base64
  • Biometric authentication
  • BIOS
  • Bitcoin
  • Bitcoins
  • Bitscout
  • Blackberry
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Bootkit
  • Boran
  • Botnets
  • Bozori
  • Brasil
  • Brazil
  • Browser Plugins
  • BSides
  • BTC
  • Buffer Overflows
  • Cabir
  • Campaigns
  • CAPTCHA
  • Carbanak
  • Certificate
  • Certificate authorities
  • Chronopay
  • CIL
  • Cloud
  • Cloud Computing
  • code injection
  • Comodo
  • Comparative Tests
  • Conferences
  • connected car
  • Content Filtering
  • Copyright
  • Corporative Threats
  • Credit Cards
  • Crimeware
  • Cross-platform malware
  • Crypto
  • Cryptocurrencies
  • cryptocurrency
  • CVE
  • Cyber espionage
  • Cyber War
  • Cyber weapon
  • Cybercrime
  • Cybercrime Legislation
  • Cyberespionage
  • Darknet
  • Data Encryption
  • Data leaks
  • Data loss
  • Data Protection
  • DBIR APT
  • DDoS-attacks
  • Deception techniques
  • Default Deny
  • Dell
  • Desktop
  • Destructive attackers
  • Detected Objects
  • Digital Certificates
  • DLL hijacking
  • DNS
  • DNS Amplification
  • DoS
  • drive-by attack
  • drivers
  • Dropbox
  • Dropper
  • Duqu
  • Duts
  • eBay
  • Electronic Payments
  • Email
  • Emotet
  • Encryption
  • Equation
  • Espionage
  • Excel
  • Exhibitions
  • ExPetr
  • Exploit Kits
  • Facebook
  • FakeCry
  • False Alarms
  • false positives
  • File Sharing
  • fileless malware
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Forecast
  • Forensic
  • Forensics
  • Fraud
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hackers Attacks
  • Hacking Team
  • HDD Rootkit
  • HDRoot
  • History of Malware
  • Hoaxes
  • honeypot
  • HTC
  • HTTPS
  • ICS
  • Identity Theft
  • Induc
  • Industrial control systems
  • industrial software
  • Industrial threats
  • Infected Files and Devices
  • infrastructure
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • Internet Safety
  • IOActive
  • IOC
  • iOS
  • IoT
  • JAR
  • Java
  • JavaScript
  • Joint ventures
  • Json
  • Kaspersky Lab
  • Kaspersky Security Network (KSN)
  • KasperskyOS
  • Kelvir
  • Keylogger
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • KSS
  • Law Enforcement
  • Lazarus
  • LdPinch
  • LinkedIn
  • Linux
  • Location-based services
  • LoveLetter
  • Machete
  • machine learning
  • Macros
  • Madi
  • Malicious spam
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • malware description
  • Malware Descriptions
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • marketplace
  • Mastercard
  • MBR
  • Mcrosoft Office
  • messengers
  • Methods of authentication
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Internet Explorer
  • Microsoft Office
  • Microsoft Windows
  • Microsoft Word
  • Miner
  • Mirai
  • MITM
  • Mobile Attacks
  • mobile browser
  • Mobile Malware
  • Mobile security
  • Money theft
  • Motorola
  • Mozilla Foundation
  • MSIL
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Scam
  • Nigerian Spam
  • No More Ransom
  • Non-Windows Malware
  • Novell
  • Numerology
  • Nyxem
  • Obfuscation
  • Offline Phishing
  • Onion
  • Online Games
  • open source
  • Oracle
  • OS X
  • OSX
  • P2P networks
  • PAC
  • Parental control
  • Passwords
  • Patch tuesday
  • Paypal
  • Petya
  • Phishing
  • PHP
  • Plugins
  • PlugX
  • Polymorphism
  • POS malware
  • PowerShell
  • Privacy
  • proactive protection
  • ProjectSauron
  • Proof-of-Concept
  • Public key infrastructure
  • Public transportation
  • PUPs
  • Python
  • QR code
  • Qt
  • RaaS
  • Ransomware
  • RAT Trojan
  • RDP
  • RedHat
  • Remsec
  • Reverse engineering
  • RFID
  • Rogue Security Solutions
  • Rooting Trojan
  • Rootkits
  • Router
  • RSA
  • Russian-speaking cybercrime
  • Safari
  • Sality
  • Santy
  • Sasser
  • Satellite
  • Scada
  • Scam
  • Screenshot
  • Script
  • Script Worms
  • Search Engines
  • Seculert
  • Secunia
  • secure OS
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shadow Brokers
  • Shamoon
  • Shellshock
  • Signed malware
  • Simda
  • Sinowal
  • Skype
  • Smart City
  • Smart home
  • SmartTV
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social networks
  • Sofacy
  • Software
  • Sony
  • Spam
  • Spam and the law
  • Spam Letters
  • Spam report
  • Spam Statistics
  • Spammer techniques
  • Spear-Phishing
  • Spearphishing
  • SpyEye
  • Spyware
  • SSL
  • steganography
  • Stuxnet
  • Sun Java
  • SunOS / Solaris
  • supply-chain attack
  • Surveillance
  • Syria
  • Targeted attack
  • Targeted Attacks
  • TDSS
  • TeamXRat
  • Tematic Spam
  • TheSAS2016
  • TheSAS2017
  • TLD
  • Tools
  • TOR
  • Trainings
  • Trojan
  • Trojan-Bankers
  • Trojan-clicker
  • Trusted Environment
  • Turla
  • Twitter
  • Ubuntu
  • UEFI
  • USB-token
  • VBE
  • VBMania
  • Verisign
  • Verizon
  • Virtualization
  • Virus Writers Wars
  • Virut
  • VISA
  • VMWare
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerabilities and Hackers
  • Vulnerability Statistics
  • WannaCry
  • WAP
  • Wardriving
  • Warezov
  • Watering hole attacks
  • Wearable devices
  • Weblogs
  • Website Hacks
  • WhatsApp
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Windows
  • Windows 10
  • Windows Mobile
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • XSS
  • Zafi
  • zero-day exploit
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Ztorg
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Alon, Noam
  • Alyushin, Victor
  • Amin Hasbini, Mohamad
  • Antukh, Alexander
  • Armstrong, Tim
  • Aseev, Eugene
  • Assolini, Fabio
  • Bakhmutov, Andrey
  • Bartholomew, Brian
  • Baumgartner, Kurt
  • Belov, Sergey
  • Berdnikov, Vasily
  • Bestuzhev, Dmitry
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Brulez, Nicolas
  • Buchka, Nikita
  • Bulavas, Vladas
  • But, Andrey
  • Chebyshev, Victor
  • Coursen, Shane
  • Creus, Dani
  • Dashchenko, Vladimir
  • Davydov, Vasily
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Diaz, Vicente
  • Dolgushev, Andrey
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Emelyanova, Olga
  • Emm, David
  • Eremin, Alexander
  • Fedotov, Nikolay
  • Firsh, Alexey
  • Funk, Christian
  • Galov, Dmitry
  • Garnaeva, Maria
  • Godwood, Ben
  • Goland, Dani
  • Golovanov, Sergey
  • Golovkin, Maxim
  • Gorchakov, Denis
  • Gorobets, Oleg
  • Gostev, Alexander
  • GReAT,
  • Grachev, Igor
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Guerrero-Saade, Juan Andrés
  • Hioureas, Vasilios
  • Ibragimov, Timur
  • ICS CERT, Kaspersky Lab
  • Ignatiev, Konstantin
  • Ilganaev, Kirill
  • Ishimaru, Suguru
  • Ivanov, Anton
  • Jacoby, David
  • Janus, Marta
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kamluk, Vitaly
  • Karasovsky, Dmitry
  • Kaspersky Lab,
  • Kazantsev, Anatoly
  • Khalimonenko, Alexander
  • Khudyakov, Andrey
  • Kivva, Anton
  • Kochetova, Olga
  • Kolesnikov, Alexander
  • Kollberg, Dirk
  • Kolotinsky, Evgeny
  • Komarov, Alexey
  • Kostin, Andrey
  • Kruglov, Kirill
  • Krylova, Evgeniya
  • Krylov, Vladimir
  • Kryukov, Andrey
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Roman
  • Ladikov, Andrey
  • Larin, Boris
  • Larkina, Anna
  • Legezo, Denis
  • Liskin, Alexander
  • Lopatin, Evgeny
  • Lozhkin, Sergey
  • Lurye, Sergey
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Malanov, Alexey
  • Mamedov, Orkhan
  • Markov, Konstantin
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mineev, Sergey
  • Molsner, Michael
  • Monastyrsky, Alexey
  • Moore, Daniel
  • Muravitsky, Andrey
  • Namestnikova, Maria
  • Namestnikov, Yury
  • Naor, Ido
  • Naraine, Ryan
  • Nazarov, Denis
  • Nikishin, Andrey
  • Novikov, Sergey
  • Olsen, Bo
  • Onishchenko, Alexander
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Osipov, Alexey
  • Parinov, Denis
  • Parys, Bart
  • Pintiysky, Vladislav
  • Pomerantsev, Ilya
  • Pontiroli, Santiago
  • Preuss, Marco
  • Prokhorenko, Mikhail
  • Rid, Thomas
  • Rosén, Frans
  • Rubinstein, Maria
  • Rubin, Andrey
  • Rudina, Ekaterina
  • Rusakov, Vyacheslav
  • Saad, Ghareeb
  • Sako, Roland
  • Samekh, Mary-Beth
  • Sapronov, Konstantin
  • Schouwenberg, Roel
  • Semenchenko, Artem
  • Shabab, Noushin
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shmelev, Yaroslav
  • Shulmin, Alexey
  • Shvetsov, Dmitry
  • Shvetsov, Nikita
  • Sinitsyn, Fedor
  • Slepogin, Nikita
  • Soumenkov, Igor
  • Stepanov, Boris
  • Stolyarov, Vladislav
  • Stoyanov, Ruslan
  • Strohschneider, Jens
  • Tanase, Stefan
  • Tarakanov, Dmitry
  • Unuchek, Roman
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vinogradov, Dmitry
  • Vlasova, Victoria
  • Vlasova, Anna
  • Volodina, Anna
  • van der Wiel, Jornt
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yunakovsky, Sergey
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Sergey
  • Zelensky, Pavel
  • Zhang, Vigi
  • Zhuravlev, Maxim
  • Ziarek, Maciej
  • Zykov, Konstantin

© 2018 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective owners.

Contact us | Privacy Policy | License Agreement

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • RSS
  • Email