The end of the year is always a nice time to take a look on the main developments and incidents that took place in the cyber security industry over the preceding 12 months. To review the impact these events had on organizations and individuals, and predict what they could mean for the overall evolution of the threat landscape, Kaspersky continues its series of annual Kaspersky Security Bulletin publications.
All the statistics used in the reports were obtained using Kaspersky Security Network (KSN), a distributed network that works with various anti-malware protection components. The anonymized data was collected from KSN users who agreed to provide it.
This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.
We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a full-featured backdoor.
At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how it is connected to APT41.
It appears that BlueNoroff shifted focus from hitting banks and SWIFT-connected servers to solely cryptocurrency businesses as the main source of the group’s illegal income.