• Roaming Mantis Detected, Beware Especially Smartphone Users in Asia

    Kaspersky Lab researchers have discovered a new Android malware distributed through a domain name system (DNS) hijacking technique and targeting smartphones, mostly in Asia. The campaign, dubbed Roaming Mantis remains highly active and is designed to steal user information including credentials and to provide attackers with full control over the compromised Android device. Between February and April 2018, researchers detected the malware in over 150 user networks, mainly in South Korea, Bangladesh, and Japan, but there are likely to be many more victims. Researchers believe a cybercriminal group looking for financial gain is behind the operation.

  • Hotbeds in Asia, Middle East

    During the first three months of the year, Kaspersky Lab researchers discovered a wave of new APT activity based mainly in Asia – more than 30% of Q1 reports were dedicated to threat operations in this region. A peak of activity was also observed in the Middle East with a number of new techniques used by actors. These and other trends are covered in Kaspersky Lab’s latest quarterly threat intelligence summary. In the first quarter of 2018, Kaspersky Lab researchers continued to detect cyber activities by advanced persistent threat (APT) groups speaking languages including Russian, Chinese, English and Korean, among others. And while some well-known actors didn’t show any noteworthy…

  • Saving The World.

    As it celebrates its 20-year anniversary, global cybersecurity company Kaspersky Lab has seen one man’s mission grow into a global crusade against cybercrime. With innovation and vision at its heart, this year will see Kaspersky Lab take its fight to new heights – launching key initiatives such as the adaptive Kaspersky Security Cloud and the Kaspersky OS – to empower businesses and consumers to protect themselves from ever-evolving threats. From its Earth 2050 project, revealing what the future cyberthreat landscape might look like, through to its Sound of Safety experiment, which investigates the sounds people associate with the feeling of safety, Kaspersky Lab remains one step ahead of criminals, and…

  • Spring Dragon, a.k.a. LotusBlossom

    A security alert issued by Kaspersky Lab team on Spring Dragon, also known as LotusBlossom, targeting at countries around the South China Sea, hint, us too. Check out the release for more details. In early 2017, Kaspersky Lab researchers noted increased activity by an APT called Spring Dragon (also known as LotusBlossom). The attacks involved new and evolved tools and techniques and targeted countries around the South China Sea. Kaspersky Lab’s experts have published their analysis of the attackers’ toolset over time in order to help organizations better understand the nature of the threat and protect themselves. Spring Dragon is a long-running threat actor that has been targeting high profile…

  • ATM Theft.

    Hmm, should you been to South Korea during this period, then take note. Following a detailed malware analysis, Kaspersky Lab researchers have connected a 2016 cyberespionage attack on South Korea’s defense agency with a later attack that infected 60 ATMs and stole the data from over 2,000 credit cards. Further, the malicious code and techniques used in both attacks share similarities with earlier attacks widely attributed to the infamous Lazarus group, responsible for series of devastating attacks against commercial and government organizations around the world. In August 2016, a cyberattack on South Korea’s Ministry of National Defense infected around 3,000 hosts. The Defense Agency reported (Korean) the incident publically in…