Evasive Panda APT poisons DNS requests to deliver MgBot
Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.
Your antivirus vendor’s technical support can provide help in combating threats.
If you are experiencing problems with your security solution, contact your vendor’s technical support.
If you are looking for a description of a malicious or potentially unwanted program, and cannot find it on the site, you can ask us to write and publish a description.
If you have identified a vulnerability in a Kaspersky Lab product, please send details to vulnerability@kaspersky.com.
If you have identified a vulnerability in this or any Kaspersky Lab site, please send details to websecurity@kaspersky.com.
We cannot answer any queries on how to deal with malware or product functionality.
Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.
Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas.
Kaspersky’s GReAT experts have uncovered a new wave of cyberattacks by the ForumTroll APT group, targeting Russian political scientists and delivering the Tuoni framework to their devices.
Kaspersky discloses new tools and techniques discovered in 2025 Tomiris activities: multi-language reverse shells, Havoc and AdaptixC2 open-source frameworks, communications via Discord and Telegram.