The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Nov 26 2013

Online banking faces a new threat

Neverquest supports just about every possible trick on online bank attacks. In light of Neverquest’s self-replication capabilities, the number of users attacked could increase over a short period of time.

Sep 12 2013

Staying safe from virtual robbers

The more popular online banking becomes, the more determined cybercriminals are to steal users’ money. How is money stolen with the help of malicious programs? How can you protect yourself from virtual robbery?

Apr 23 2013

Spyware. HackingTeam

This article is based on technical data from KL experts and their analysis of the Korablin and Morcut malicious programs. A number of conclusions based on open source data.

May 24 2012

The anatomy of Flashfake. Part 2

In the first part of our analysis we looked at the distribution and infection mechanisms used by the Flashfake...

Dec 12 2011

Monthly Malware Statistics: November 2011

The following statistics were compiled in November using data collected from computers running Kaspersky Lab products

Oct 13 2011

Monthly Malware Statistics: September 2011

The following statistics were compiled in September using data collected from computers running Kaspersky Lab products

Jun 27 2011

TDL4 – Top Bot

The malware detected by Kaspersky Anti-Virus as TDSS is the most sophisticated threat today.

Aug 05 2010


The TDSS rootkit first appeared in 2008. Since then, it has become far more widespread than the notorious rootkit Rustock. The rootkit’s malicious payload and the difficulties it presents for analysis are effectively similar to those of the bootkit.

Oct 09 2009

The Cash Factory

This article is a study of one spam email and illustrates the methods employed by today’s cyber criminals to create botnets and conduct mass spam mailings

Jun 09 2009

Bootkit 2009

In 2008, we wrote about Backdoor.Win32.Sinowal , a malicious program we believed to pose a serious threat, as it employed the most advanced, at the time, virus technologies.

Mar 02 2009

Kaspersky Security Bulletin: Malware evolution 2008

2008 demonstrated that the era of epidemics was already history.

Dec 18 2008

Bootkit: the challenge of 2008

The term MalWare 2.0 is often used in our reports to denote a model for the complex malicious programs which appeared at the end of 2006. The most striking examples, and the initial members of MalWare 2.0 are the Bagle, Warezov and Zhelatin worms.