In October 2025, Kaspersky reported a new wave of phishing attacks linked to a group known as Operation ForumTroll, specifically targeting Russian scholars. These attackers are using fake emails that appear to come from a legitimate eLibrary service to lure victims into providing sensitive information. This shift from targeting organizations in the spring to focusing on individuals in the fall raises concerns about the attackers' evolving strategies. The origins of the threat actor remain unclear, but the targeted approach suggests a calculated effort to exploit the academic community. Such incidents can lead to significant data breaches and have serious implications for both personal and institutional security.
Articles tagged "Kaspersky"
Found 22 articles
Securelist
Kaspersky's GReAT team has reported an increase in cyberattacks from the ForumTroll APT group, which is specifically targeting Russian political scientists. The attackers are using a tool known as the Tuoni framework to infiltrate their devices. This situation is concerning as it shows a focused attempt to compromise the devices of individuals involved in political research, potentially to gather sensitive information or disrupt their work. The targeting of political scientists indicates a strategic move to influence or monitor political discourse in Russia. These incidents serve as a reminder of the ongoing risks faced by academics and researchers in politically sensitive environments.
A Kaspersky expert has assessed the Zigbee wireless protocol, commonly used in industrial environments, and identified two specific application-level attack vectors. These vulnerabilities can allow attackers to remotely turn Zigbee-enabled devices on and off without authorization. This could potentially disrupt operations in environments relying on Zigbee for automation or monitoring. Given Zigbee's wide adoption in industrial settings, this poses a significant risk to the integrity and reliability of these systems. Organizations utilizing Zigbee should be aware of these vulnerabilities and consider implementing security measures to protect their devices from unauthorized control.
The Kaspersky Security Bulletin for 2025 provides insights into various cyberthreats observed from November 2024 to October 2025, leveraging anonymized data from Kaspersky users. This report highlights trends and statistics that can inform users about the evolving landscape of cybersecurity threats.
The article discusses the ToddyCat APT attacks that target corporate email systems, highlighting the use of advanced tools like TomBerBil, TCSectorCopy, and XstReader. The severity of these attacks lies in their method of stealing access tokens from Outlook, posing significant risks to corporate security.
The Tsundere botnet, targeting Windows users, is expanding and capable of executing arbitrary JavaScript code from a command-and-control server. This poses a significant threat to users, as the botnet's propagation methods remain unclear, indicating a potential for widespread exploitation.
Kaspersky GReAT experts have identified the Tsundere botnet, which utilizes Node.js-based bots to exploit web3 smart contracts. The campaign poses a significant cybersecurity threat as it spreads through MSI installers and PowerShell scripts, indicating a sophisticated method of propagation.