Woburn, MA – October 4, 2017 – Researchers on the Kaspersky Lab Global Research and Analysis Team (GReAT) today presented findings that show sophisticated threat actors are actively hacking other attack groups in order to steal victim data, borrow tools and techniques and re-use each other’s infrastructure – making accurate threat intelligence ever harder for security researchers.
By: Elinor Mills, CNET
Researchers said today that they have noticed some new features and changes to the data-stealing malware Mahdi and have uncovered a reference to "Flame," which could potentially indicate some connection to the malware of the same name that also has numerous infections in Iran.
"Last night, we received a new version of the #Madi malware. Following the shutdown of the Madi command and control domains last week, we thought the operation is now dead. Looks like we were wrong, Nicolas Brulez of Kaspersky Labs wrote in a post on its SecureList blog.
The new version, compiled just today, contains "many interesting improvements and new features. It now has the ability to monitor VKontakte, together with Jabber conversations. It is also looking for people who visit pages containing 'USA' and 'gov' in their titles. In such cases, the malware makes screenshots and uploads them to the C2," or command-and-control server, he said. The new "USA" checks could indicate a shift in focus from targets in Israel to targets in the U.S., he speculated.
Articles related to Business News
Woburn, Mass. – October 10, 2017 – According to Kaspersky Lab research, Distributed Denial of Service (DDoS) attacks are on the rise, with over a third (33%) of organizations facing a DDoS attack in 2017, compared to just 17 percent in 2016.