![]() ![]() Our ongoing analysis revealed the existence of another generation of Icefog backdoors – this time, a Java version of the malware that we called ‘Javafog’. However, we continued to monitor the operation by sinkholing domains and analyzing victim connections. The campaign, operational since at least 2011, involved the use of a series of different versions of the malware, including one aimed at Mac OS.įollowing publication of our report, Icefog operations ceased and the attackers closed down all of the known command-and-control servers. By contrast, the attackers behind Icefog focused on their victims one at a time, in short-lived, precise hit-and-run attacks designed to steal specific data. Most APT campaigns are sustained over months or years, continuously stealing data from their victims. In September 2013 we reported on a targeted attack called Icefog, focused mainly on targets in South Korea and Japan. Overview Targeted attacks/APT The fog clears further A total of 135 227 372 unique malicious and potentially unwanted objects were identified in these incidents. Kaspersky Lab’s antivirus solutions detected 645 809 230 virus attacks on users’ computers. ![]() 39% of web attacks neutralized by Kaspersky Lab products were carried out using malicious web resources located in the US and Russia.81 736 783 unique URLs were recognized as malicious by web antivirus.Kaspersky Lab’s web antivirus detected 29 122 849 unique malicious objects: scripts, exploits, executable files, etc.Kaspersky Lab solutions repelled 353 216 351 attacks launched from online resources located all over the world.According to KSN data, Kaspersky Lab products blocked a total of 1 131 000 866 malicious attacks on computers and mobile devices in the first quarter of 2014. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |