logo
#

Latest news with #KasperskyLab

Protect your login credentials with these tips from Kaspersky
Protect your login credentials with these tips from Kaspersky

Tahawul Tech

time3 days ago

  • Tahawul Tech

Protect your login credentials with these tips from Kaspersky

In light of a recent data breach reported by Cybernews, that saw 16 billion records exposed Kaspersky has weighed in Kaspersky telemetry shows a 21% growth in password stealer attack detections globally from 2023 to 2024. Infostealer malware has become one of the most pervasive cyber threats, targeting millions of devices worldwide and compromising sensitive personal and corporate data. These malicious programs are designed to extract credentials, cookies, and other valuable information, which is then aggregated into log ­files and circulated on the dark web. '16 billion records is a figure nearly double the Earth's population, and it's hard to believe such a vast amount of information could be exposed. This 'leak' refers to a compilation of 30 user data breaches from various sources. These data sets ('logs') are primarily obtained by cybercriminals through infostealers — malicious applications that steal information — and such incidents occur daily. Cybernews researchers collected this data over six months from the start of the year. Their dataset likely contains duplicates due to the persistent issue of password reuse among users. Therefore, although it was noted that none of the databases they found had been previously reported, this doesn't mean these credentials hadn't previously leaked from other services or been collected by other infostealers. This significantly reduces the potential number of unique and new user data in this collection, though determining an exact or even approximate figure is challenging without detailed analysis', comments Alexandra Fedosimova, Digital Footprint Analyst at Kaspersky. 'Cybernews research speaks of an aggregation of several data leaks over a long period – since the start of the year. This is a reflection of a thriving cybercrime economy that has industrialised credential theft. What we're seeing is part of a well-established cybercriminal market, where credentials are harvested via infostealers, phishing campaigns, and other malware, then collected, enriched, and resold — often multiple times. These so-called 'combo lists' are continuously updated, repackaged, and monetized by various actors on the dark web — and now increasingly on publicly accessible platforms', comments Dmitry Galov, Head of Kaspersky Global Research and Analysis Team (GReAT) for Russia and CIS. 'What's notable in this case is not the fact of a large-scale breach – or several breaches – on its own, but that Cybernews claims that the datasets were temporarily publicly exposed through unsecured channels, making them accessible to anyone who happened to find them'. 'This news is a good reminder to focus on digital hygiene and give an audit to all of your digital accounts. Regularly update your passwords and activate two-factor authentication (2FA) if it's not already enabled. If attackers have already gained access to your accounts, reach out to technical support right away to regain control and assess what other data might have been exposed. Use a reliable password manager, such as Kaspersky Password Manager, to securely store your credentials', comments Anna Larkina, Web Content Analysis Expert at Kaspersky. 'Users should also stay vigilant against social engineering scams, as fraudsters may use leaked details in multiple activities'. Image Credit: Stock Image

Microsoft Windows Cyberattack Warning — Do Not Open These Files
Microsoft Windows Cyberattack Warning — Do Not Open These Files

Forbes

time08-06-2025

  • Forbes

Microsoft Windows Cyberattack Warning — Do Not Open These Files

Beware these dangerous Windows LNK files. Windows users are under attack. Yes, I know, Windows users are always under attack, it's a byproduct of there being so many of them and threat actors focusing on such big platforms that can offer the potential for significant returns. While Linux and macOS systems are far from immune to such attacks, it's Microsoft users who get the brunt of it. Which is why it's so important to install updates that fix Windows vulnerabilities, and install them quickly. But what if the threat is not only well known among the cybercriminal community, has existed for many years, and still hasn't been given a Common Vulnerabilities and Exposures identifier? Welcome to the highly dangerous world of Windows LNK file cyberattacks that are happening right now. Do not open these files. The Common Vulnerabilities and Exposures system might not be perfect, but it does provide a standard and actionable method of identifying and prioritizing security vulnerabilities wherever they occur. Security vulnerabilities such as the one that impacts LNK shortcut files in the Windows operating system, and has done for many years now. Or at least it would have had the vulnerability in question been allocated a CVE identifier, which it hasn't. Alexander Kolesnikov, a malware analyst at Kaspersky Lab, has issued a warning to all Windows users as Kaspersky's Global Research and Analysis Team revealed the most noteworthy Windows vulnerability being exploited so far in 2025. ZDI-CAN-25373, the Windows LNK file vulnerability in question, has already been seen being exploited this year in zero-day attacks by cybercriminal and state-sponsored actors according to the security researchers at Trend Micro. ZDI-CAN-25373, the Windows LNK file vulnerability in question, has already been seen being exploited in zero-day attacks by cybercriminal and state-sponsored actors, according to security researchers at Trend Micro. Now, Kolesnikov has warned that it is being actively exploited and enables threat actors to launch attacks that are obfuscated from the victim. 'The main issue is that File Explorer does not fully display the data specified as parameters in application shortcuts,' Kolesnikov explained. What this means is that attackers can apply additional characters in the target field, things like spaces and line breaks for example, so that the user only sees the legitimate-looking path and has no cause for concern that anything is amiss. That's far from the reality though, as malicious commands added, but obscured from view in File Explorer, can be used to compromise the Windows system once the LNK file is executed. 'Only the first part of the path is shown in the shortcut's properties,' Kolesnikov reiterated, adding that 'the target field might include arguments at the end of the line that trigger a request to download a payload using 'As a security best practice, we encourage customers to exercise caution when downloading files from unknown sources as indicated in security warnings, which have been designed to recognize and warn users about potentially harmful files,' a Microsoft spokesperson said.

Microsoft Email To Windows Users Includes A ‘Nasty Surprise'
Microsoft Email To Windows Users Includes A ‘Nasty Surprise'

Forbes

time27-05-2025

  • Forbes

Microsoft Email To Windows Users Includes A ‘Nasty Surprise'

Delete this email immediately. Microsoft Windows users are being urged to watch out for 'a genuine Microsoft email with a nasty surprise inside,' as a new wave of attacks is launched at PC owners. This type of attack has already hit Google's Gmail users and is now expanding. If you see one of these emails, you must delete it immediately. The warning comes courtesy of the research team at Kaspersky, which has discovered 'a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.' This works by hijacking genuine Microsoft purchase notifications, inserting custom text, and then forwarding to potential victims at scale. If you receive the email, which will come from 'noreply@ it will thank you for a recent purchase that you will not recognize. It's likely to target you at work, panicking you that there's a large, unauthorized expense you need to handle. 'One more time, just so we're clear,' Kaspersky says, 'this is an honest-to-goodness email from Microsoft. The contents match a typical purchase confirmation. In the screenshot below, the company thanks the recipient for buying 55 Microsoft 365 Apps for Business subscriptions worth a total of $587.95.' Microsoft email includes a 'nasty surprise' The attackers replace the usual billing information within the original Microsoft email with their own phone number that a recipient can call for assistance — just what you will likely do when hit with a huge, unexpected bill. There is no email alternative, 'the victim is left with little choice but to call the phone number provided.' If you do call the number, you're likely to be asked to install some software to investigate and then resolve the issue. That download will be malware and will lead to all kinds of much more serious problems than a surprise $600 bill. According to user reports, the call handler may also ask you to log into your online back to facilitate a refund. This simply provides account details and credentials to the attacker. Kaspersky says the method deployed by the attackers to hijack a Microsoft email address 'is still something of a mystery,' but could be 'stolen credentials or trial versions to access Microsoft 365. By using BCC or simply entering the victim's email address when purchasing a subscription, they can send [the] messages… Whichever is true, the attackers' goal is to replace the billing information — the only part of the Microsoft notification they can alter — with their own phone number.' This almost exactly replicates the well-publicized fake Google emails doing the rounds from their own 'no-reply' email address. The Google advice was that they would never reach out with an account issue. This is smarter, a purchase email from a genuine address. But it's the same pattern — tricking users into calling scammers. Most such scams are tech support lures, which Guardio warns have already surged 137% in 2025. However, just as with Google, don't call the number provided and use standard, publicly available channels instead of you want to contact the company. If you don't recognize the transaction and there is no record in your account, then delete it right away.

Kaspersky reaffirms 100% anti-tampering protection in latest AV-Comparatives test
Kaspersky reaffirms 100% anti-tampering protection in latest AV-Comparatives test

Zawya

time18-05-2025

  • Zawya

Kaspersky reaffirms 100% anti-tampering protection in latest AV-Comparatives test

Kaspersky Next EDR Foundations – represented by Kaspersky Endpoint Security – once again demonstrated 100% tamper protection in the latest focus penetration test by AV-Comparatives. Attackers often attempt to disable security tools as an initial step in compromising business infrastructure. This makes tamper protection a key mechanism for preventing further compromise of the system. It safeguards the product from end-user and third-party changes, and protects services, processes, files, registry entries, and more from any unauthorized control attempts – even in the context of a privileged user (high or system integrity level). The Kaspersky solution met the strict certification requirements by successfully preventing all tampering attempts during testing. The Anti-Tampering Test was conducted on Windows 11 to identify weaknesses that could allow adversaries to disable or modify endpoint protection solutions. Participating vendors were not informed in advance about the attack techniques. Only those products that successfully blocked 100% of the attempts received certification and had their reports published. Kaspersky submitted Kaspersky Endpoint Security for assessment in April 2025 and earned the certification for the second consecutive time. The product effectively blocked all attempts by adversaries to disable, uninstall, or reconfigure the security software in order to prevent updates or enable attacker tools. "We continuously engage in independent testing to ensure our technologies withstand the latest threats while delivering a seamless experience,' says Alexander Liskin, Head of Threat Research at Kaspersky. 'The Anti-Tampering test is of great value since it puts stress on the product without prior knowledge of attack vectors. We take pride in knowing that Kaspersky Endpoint Security, as part of Kaspersky Next EDR Foundations, has once again achieved top scores.' Andreas Clementi, Founder and CEO of AV-Comparatives, added: "Our focus tests aim to highlight areas within the product worthy of improvement. Kaspersky has, again and again, displayed excellent resistance against agnostic approaches to tampering, reestablishing itself among the most secure endpoint solutions." To see the full AV-Comparatives Anti-Tampering test report 2025, please follow the link, and to learn more about the results of 2023, visit this link. Read more about Kaspersky Next on the website. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store