What we detect
Who creates malware and why?
Have you ever wondered who creates malware? Or why they do it? Find out more about the people behind the threat – the script kiddies, virus writers, and cybercriminals – and what motivates them.
Trojans, viruses, worms, dialers – the programs we detect have lots of different names. Find out how Kaspersky Lab and other antivirus companies classify the many different types of programs which can harm your computer or your data.
History of Malicious Programs
Do you know the name of the first computer virus? Or perhaps you want to find out when the first email worm was created. This section covers the evolution of malicious programs from their initial appearance to the present day.
What if my computer is infected?
With the number of threats rising every day, you may find that your computer has been infected. Find out more about the symptoms of infection, and what steps you should take to clean your computer.
According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. File antivirus detected a total of 174,989,956 unique malicious and potentially unwanted objects. Read Full Article
We’ve become accustomed to seeing a steady stream of security breaches month after month; and this quarter has been no exception, including attacks on Barts Health Trust, Sports Direct, Intercontinental Hotels Group and ABTA. Read Full Article
Although the first quarter of 2017 was rather quiet compared to the previous reporting period, there were a few interesting developments. Despite the growing popularity of IoT botnets, Windows-based bots accounted for 59.81% of all attacks. Meanwhile, complex attacks that can only be repelled with sophisticated protection mechanisms are becoming more frequent. Read Full Article
Kaspersky Lab has been tracking a targeted attack actor’s activities in Japan and South Korea recently. This attacker has been using the XXMM malware toolkit, which was named after an original project path revealed through a pdb string inside the file. Read Full Article
2016 was the year of Distributed Denial of Service (DDoS) with major disruptions in terms of technology, attack scale and impact on our daily life. In fact, the year ended with massive DDoS attacks unseen before, leveraging Mirai botnet technology. Read Full Article
Interesting trend this quarter was the increased activity of DDoS botnets in Western Europe. For the first time in a year the TOP 10 most attacked countries included three Western European countries – Italy, France and Germany. Read Full Article
What is most interesting about the StrongPity APT’s more recent activity however, is their focus on users of encryption tools, peaking this past summer. In particular, the focus was on Italian and Belgian users, but the StrongPity watering holes affected systems in far more locations than those two. Read Full Article
In this article, we discuss how it is possible to take advantage of errors made in the implementation of a cryptographic scheme, and how mistakes by malware writers allow us to help users restore their encrypted data. Read Full Article
We discovered a new variant of a Brazilian-made ransomware, that is being used to infect local companies and hospitals, directly affecting innocent people, encrypting their files and asking to pay the ransom. Read Full Article