Kaspersky
  • Multimedia content

  • Images (2)
    • Pierre Delcher, Senior Security Researcher at Kaspersky’s Global Research and Analysis team
    • Map of organisations targeted by SessionManager campaign
  • All (2)
Source: Kaspersky |

Kaspersky Discovers a New Backdoor Targeting Governments and NGOs across the Middle East, Turkey and Africa

First leveraged in late March 2021, the newly discovered backdoor has hit governmental institutions and NGOs across the globe with victims in eight countries from the Middle East, Turkey and Africa region, including Kuwait, Saudi Arabia, Nigeria, Kenya and Turkey

Kaspersky (https://www.Kaspersky.co.za/) experts have brought to light a poorly detected SessionManager backdoor that was set up as a malicious module within the Internet Information Services (IIS), a popular web server edited by Microsoft. Once propagated, SessionManager enables a wide range of malicious activities, starting from collecting emails to complete control over…

Kaspersky
Source: Kaspersky |

Don’t push them: Unbidden push notifications plague is detected on 100,000 devices in a month in Africa

Egypt has become the most targeted country with 34,654 targeted users and 302,963 attacks

Kaspersky (www.Kaspersky.co.za.) analysis of threats prevented in South Africa, Kenya, Nigeria, Namibia, Rwanda, Ethiopia, and Egypt in May 2020 has demonstrated that in just a month 100,414 users in these countries were subjected to the unwanted push notification appearance. All in all, such notifications were prevented from appearing 727,162 times during…

Kaspersky
Source: Kaspersky |

Internet of Things (IoT) under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019

This figure is around nine times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses

Kaspersky (www.Kaspersky.co.za) honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. This figure is around nine times more than the number found in…

Source: Kaspersky |

Kaspersky Lab to Open Office in Kigali, Rwanda to Boost its Presence in East Africa

The Kigali office will serve the requirements of the growing number of partners and customers in the region

Kaspersky Lab (www.Kaspersky.co.za) has announced plans to open a new office in Kigali, Rwanda, to support the rapid growth of its business in East Africa. This strategic move will provide more room for development as well as closer proximity to new partners in the region, allowing Kaspersky Lab to continue…

Source: Kaspersky |

SIM swap fraud: A New Wave of Attacks Targeting Financial Services and online services in Africa

In South Africa this type of fraud more than double in the last year, according a report of South African Banking Risk Information Centre (SABRIC)

During Kaspersky Lab’s (www.Kaspersky.co.za) annual Cyber Security Weekend that took place in Cape Town, South Africa, Kaspersky Lab experts discussed the wide spread growth of mobile payments across the globe and the many cyber risks that surround such technology. Especially the recent SIM swap fraud wave, which have become very…

Source: Kaspersky |

SneakyPastes: basic but effective operation by Gaza Cybergang hits Middle East related targets in 39 countries

The campaign, named SneakyPastes made use of disposable email addresses to spread the infection through phishing

In 2018, the Gaza Cybergang, now known to comprise several groups of varying sophistication launched a cyberespionage operation targeting individuals and organisations with a Middle-Eastern political interest. The campaign, named SneakyPastes made use of disposable email addresses to spread the infection through phishing, before downloading the malware in chained stages…

Source: Kaspersky |

Kaspersky Lab announces 4% revenue growth to $726 million in 2018

The leading multinational cybersecurity vendor continues to deliver stable and positive dynamics

Kaspersky Lab (www.Kaspersky.co.za) continued to deliver stable growth in 2018 and increased its global unaudited IFRS revenue to a total of USD 726 million*, representing a 4% YOY revenue increase. During a year of evolving market conditions and continuous geopolitical pressure, the company achieved success as a result of the…

Source: Kaspersky |

Kaspersky Lab shares Middle East, Turkey and Africa (META) 2018 Financial Insights and Predictions for 2019

Kaspersky Lab recorded a 4-fold increase in cryptomining attacks in the Middle East, Turkey and Africa (META) region from 3.5 million in 2017 to 13 million in 2018

The past year has been extremely eventful in terms of the digital threats faced by financial institutions: cybercrime groups have used new infiltration techniques, and the geography of attacks has become more extensive. According to the KSN statistics by Kaspersky Lab (www.Kaspersky.com), the Middle East, Turkey and Africa (META) region…

Kaspersky
Source: Kaspersky |

International study shows that people and organisations don’t fully trust anyone when it comes to their online data

From cybercriminals to their own government, employers and even family, people worry about who could access their online life

A new study of mid-size businesses and consumers reveals that many are confused and lack trust when it comes to the privacy and security of their online data and behaviour. The research, which covered six countries in Europe and North America, found that people worry that hackers, their own and…

Source: Kaspersky |

Africa & Middle East: Slingshot, the spy that came in from the router

So far, researchers have seen around 100 victims of Slingshot and its related modules, located in Kenya, Yemen, Afghanistan, Libya, Congo, Jordan, Turkey, Iraq, Sudan, Somalia and Tanzania

Kaspersky Lab (www.Kaspersky.co.za) researchers have uncovered a sophisticated threat used for cyber-espionage in the Middle East and Africa from at least 2012 until February 2018. The malware, which researchers have called ‘Slingshot’, attacks and infects victims through compromised routers and can run in kernel mode, giving it complete control over…