The first backdoor which utilizes the ‘Sony rootkit‘ was detected today. We’ve classified this malicious program as Backdoor.Win32.Breplibot.b.
We’re analyzing the progam at the moment and will have more information soon. Watch this space.
minute read
The first backdoor which utilizes the ‘Sony rootkit‘ was detected today. We’ve classified this malicious program as Backdoor.Win32.Breplibot.b.
We’re analyzing the progam at the moment and will have more information soon. Watch this space.
Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.
Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas.
Kaspersky’s GReAT experts have uncovered a new wave of cyberattacks by the ForumTroll APT group, targeting Russian political scientists and delivering the Tuoni framework to their devices.
Kaspersky discloses new tools and techniques discovered in 2025 Tomiris activities: multi-language reverse shells, Havoc and AdaptixC2 open-source frameworks, communications via Discord and Telegram.
Sony rootkit backdoor program