Remove Architecture Remove Data collection Remove Spyware Remove Technology
article thumbnail

FinSpy: unseen findings

SecureList

Kaspersky has been tracking deployments of this spyware since 2011. Based on the data collected by the Post-Validator, it is most likely that: The Post-Validator is deployed to ensure that the infected victim is the intended one. This script determines the victim machine architecture. The Trojan Loader.

article thumbnail

APT trends report Q2 2023

SecureList

Following this, we released the first of a series of additional reports describing the final payload in the infection chain: a highly sophisticated spyware implant that we dubbed “TriangleDB” Operating in memory, this implant periodically communicates with the C2 (command and control) infrastructure to receive commands.

Malware 88
article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. The next WannaCry Fortunately for us, a new cyber epidemic did not happen. Verdict: prediction not fulfilled ❌ 4.

Hacking 116