Apr 23 2013
This article is based on technical data from KL experts and their analysis of the Korablin and Morcut malicious programs. A number of conclusions based on open source data.
May 24 2012
In the first part of our analysis we looked at the distribution and infection mechanisms used by the Flashfake...
Dec 12 2011
The following statistics were compiled in November using data collected from computers running Kaspersky Lab products
Oct 13 2011
The following statistics were compiled in September using data collected from computers running Kaspersky Lab products
Jun 27 2011
The malware detected by Kaspersky Anti-Virus as TDSS is the most sophisticated threat today.
Aug 05 2010
The TDSS rootkit first appeared in 2008. Since then, it has become far more widespread than the notorious rootkit Rustock. The rootkit’s malicious payload and the difficulties it presents for analysis are effectively similar to those of the bootkit.
Oct 09 2009
This article is a study of one spam email and illustrates the methods employed by today’s cyber criminals to create botnets and conduct mass spam mailings
Jun 09 2009
In 2008, we wrote about Backdoor.Win32.Sinowal , a malicious program we believed to pose a serious threat, as it employed the most advanced, at the time, virus technologies.
Mar 02 2009
2008 demonstrated that the era of epidemics was already history.
Dec 18 2008
The term MalWare 2.0 is often used in our reports to denote a model for the complex malicious programs which appeared at the end of 2006. The most striking examples, and the initial members of MalWare 2.0 are the Bagle, Warezov and Zhelatin worms.
Sep 24 2008
One of the most notable malicious programs during the first half of 2008 was, undoubtedly, the Storm worm (classified by Kaspersky Lab as Zhelatin). It remains in the vanguard of Malware 2.0.
Feb 26 2008
The year 2007 can be dubbed “the year of online-world fraud” or perhaps “the year of exploiting poor gamers”.