
The end of the year is always a nice time to take a look on the main developments and incidents that took place in the cyber security industry over the preceding 12 months. To review the impact these events had on organizations and individuals, and predict what they could mean for the overall evolution of the threat landscape, Kaspersky continues its series of annual Kaspersky Security Bulletin publications.
In this article, we discuss the tools and TTPs used in the SideWinder APT’s attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors.
Kaspersky researchers analyze EAGERBEE backdoor modules, revealing a possible connection to the CoughingDown APT actor.
While investigating an incident involving the BellaCiao .NET malware, Kaspersky researchers discovered a C++ version they dubbed “BellaCPP”.
Lazarus targets employees of a nuclear-related organization with a bunch of malware, such as MISTPEN, LPEClient, RollMid, CookieTime and a new modular backdoor CookiePlus.