APT reports

DarkUniverse – the mysterious APT framework #27


Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium


The cake is a lie! Uncovering the secret world of malware-like cheats in video games


Steam-powered scammers


Data collectors

APT reports

APT trends report Q3 2019

Malware reports

IoT: a malware story


A glimpse into the present state of security in robotics

Authors Categories Tags
  • Subscribe

  • Reports

    Meet the GoldenJackal APT group. Don’t expect any howls

    GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and South Asia. The main feature of this group is a specific toolset of .NET malware, JackalControl, JackalWorm, JackalSteal, JackalPerInfo and JackalScreenWatcher.

    APT trends report Q1 2023

    For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports.

    Tomiris called, they want their Turla malware back

    We continued to track Tomiris as a separate threat actor over three new attack campaigns between 2021 and 2023, and our telemetry allowed us to shed light on the group. In this blog post, we’re excited to share what we now know of Tomiris with the broader community, and discuss further evidence of a possible connection to Turla.

    Subscribe to our weekly e-mails

    The hottest research right in your inbox