Detected Objects

What we detect

threat_ill_11Who creates malware and why?
Have you ever wondered who creates malware? Or why they do it? Find out more about the people behind the threat – the script kiddies, virus writers, and cybercriminals – and what motivates them.

Trojans, viruses, worms, dialers – the programs we detect have lots of different names. Find out how Kaspersky Lab and other antivirus companies classify the many different types of programs which can harm your computer or your data.

threat_ill_13History of Malicious Programs
Do you know the name of the first computer virus? Or perhaps you want to find out when the first email worm was created. This section covers the evolution of malicious programs from their initial appearance to the present day.

threat_ill_12What if my computer is infected?
With the number of threats rising every day, you may find that your computer has been infected. Find out more about the symptoms of infection, and what steps you should take to clean your computer.


DDoS attacks in Q4 2017

Q4 2017 represented something of a lull: both the number and duration of DDoS attacks were down against the previous quarter. At the same time, the increase in the number of attacks on honeypot traps in the runup to holiday sales indicates that cybercriminals are keen to expand their botnets at the most opportune moment by pressuring owners of online resources and preventing them from making a profit. Read Full Article


IT threat evolution Q3 2017

Our growing dependence on technology, connectivity and data means that businesses present a bigger attack surface than ever. Targeted attackers have become more adept at exploiting their victims’ vulnerabilities to penetrate corporate defences while ‘flying under the radar’. Read Full Article


DDoS attacks in Q3 2017

In the third quarter of 2017, we registered a considerable increase in the number of both DDoS attacks and their targets. Traditionally, China is the country with the largest number of attack sources and targets. It was followed by the United States and South Korea. The popularity of Windows OS as a basis for creating a botnet has fallen noticeably, while the share of Linux-based botnets increased proportionally. Read Full Article


Nigerian phishing: Industrial companies under attack

In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors. As further research demonstrated, this was just part of a bigger story that began much earlier and is unlikely to end any time soon. Read Full Article