Head of Global Research & Analysis Team, DACHChristian Funk has been head of the German Research and Analysis Team at Kaspersky since 2014. He joined the company in 2007 and was appointed as a Virus Analyst for Central Europe one year later. His areas of expertise include malware trends, mobile threats, IoT technologies, social networking and observing the online gaming black market. His other responsibilities include conducting employee training and compiling IT security statistics. In addition, he is a regular keynote speaker at national and international technology trade shows and IT security events. Christian Funk studied computer science with a focus on information management at the University of Applied Sciences in Ingolstadt.
VileRAT is a Python implant, part of an evasive and highly intricate attack campaign against foreign exchange and cryptocurrency trading companies.
Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly.
Kaspersky ICS CERT experts detected a wave of targeted attacks in several East European countries, as well as Afghanistan. Of the six backdoors identified on infected systems, five have been used earlier in attacks attributed to APT TA428.
This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q2 2022.