Articles tagged "Kaspersky"

Found 22 articles

In October 2025, Kaspersky reported a new wave of phishing attacks linked to a group known as Operation ForumTroll, specifically targeting Russian scholars. These attackers are using fake emails that appear to come from a legitimate eLibrary service to lure victims into providing sensitive information. This shift from targeting organizations in the spring to focusing on individuals in the fall raises concerns about the attackers' evolving strategies. The origins of the threat actor remain unclear, but the targeted approach suggests a calculated effort to exploit the academic community. Such incidents can lead to significant data breaches and have serious implications for both personal and institutional security.

Impact: Russian scholars, academic institutions
Remediation: Users should verify email sources before clicking links or providing personal information and consider using security training to recognize phishing attempts.
Read Original

Kaspersky's GReAT team has reported an increase in cyberattacks from the ForumTroll APT group, which is specifically targeting Russian political scientists. The attackers are using a tool known as the Tuoni framework to infiltrate their devices. This situation is concerning as it shows a focused attempt to compromise the devices of individuals involved in political research, potentially to gather sensitive information or disrupt their work. The targeting of political scientists indicates a strategic move to influence or monitor political discourse in Russia. These incidents serve as a reminder of the ongoing risks faced by academics and researchers in politically sensitive environments.

Impact: Devices of Russian political scientists, potentially including personal computers and academic networks.
Remediation: N/A
Read Original

A Kaspersky expert has assessed the Zigbee wireless protocol, commonly used in industrial environments, and identified two specific application-level attack vectors. These vulnerabilities can allow attackers to remotely turn Zigbee-enabled devices on and off without authorization. This could potentially disrupt operations in environments relying on Zigbee for automation or monitoring. Given Zigbee's wide adoption in industrial settings, this poses a significant risk to the integrity and reliability of these systems. Organizations utilizing Zigbee should be aware of these vulnerabilities and consider implementing security measures to protect their devices from unauthorized control.

Impact: Zigbee-enabled industrial devices
Remediation: Organizations should implement security measures to protect Zigbee devices; specific patches or updates were not mentioned.
Read Original

The Kaspersky Security Bulletin for 2025 provides insights into various cyberthreats observed from November 2024 to October 2025, leveraging anonymized data from Kaspersky users. This report highlights trends and statistics that can inform users about the evolving landscape of cybersecurity threats.

Impact: N/A
Remediation: N/A
Read Original

The article discusses the ToddyCat APT attacks that target corporate email systems, highlighting the use of advanced tools like TomBerBil, TCSectorCopy, and XstReader. The severity of these attacks lies in their method of stealing access tokens from Outlook, posing significant risks to corporate security.

Impact: Corporate email systems, Outlook
Remediation: N/A
Read Original

Kaspersky GReAT experts have identified the Tsundere botnet, which utilizes Node.js-based bots to exploit web3 smart contracts. The campaign poses a significant cybersecurity threat as it spreads through MSI installers and PowerShell scripts, indicating a sophisticated method of propagation.

Impact: Node.js, web3 smart contracts, MSI installers, PowerShell scripts
Remediation: Implement security measures to monitor and restrict the use of MSI installers and PowerShell scripts. Regularly update and patch Node.js environments and web3 applications.
Read Original
PreviousPage 2 of 2