Kaspersky researchers presented a comprehensive investigation into all the recent updates introduced into FinSpy spyware for Windows, Mac OS, Linux, and its installers. The research, which took eight months to complete, uncovers four-layer obfuscation and advanced anti-analysis measures employed by the spyware’s developers, as well as the employment of a UEFI bootkit to infect victims. The findings suggest high emphasis on defense evasion, making FinFisher one of the hardest-to-detect spywares to date.
To put gamers firmly in the driving seat, global cybersecurity company, Kaspersky, combined efforts with world-renowned gamers: Ali-A, Yammy XOX, and Boaster to bring fearless gaming to the rapidly growing gamer community and drive awareness about cybersecurity.
Kaspersky researchers have discovered an advanced Trojan, dubbed the BloodyStealer, sold on darknet forums and used to steal gamers’ accounts on popular gaming platforms such as Steam, Epic Games Store, and EA Origin. With features to avoid analysis and detection, a low subscription price, and some interesting capabilities, BloodyStealer is a prime example of the type of threat online gamers face. This, alongside an overview of the game-related products stolen and sold on the darknet, can be found in Kaspersky’s latest report on game-related data threats.
According to a new Kaspersky study, 70% of people are changing their attitude towards social media, due to its potential negative impact on mental health. As achieving a digital balance becomes a priority for more people, Kaspersky has partnered with Neil Tranter, a mindfulness teacher, to develop a dedicated meditation course: “Overcoming digital stress and smartphone addiction”, that provides users with the right knowledge and tools to navigate their digital lives more mindfully.
Committed to greater transparency, the global cybersecurity company has publicly shared information on requests received from government and law enforcement agencies, and users for data and technical expertise in 2020 and H1 2021.
In six in ten (63%) cyberattacks investigated by the Kaspersky Global Emergency Response team, adversaries used password brute force and vulnerability exploitation as initial vectors to compromise the organization’s environment.