securelist.com Open in urlscan Pro
35.173.160.135  Public Scan

URL: https://securelist.com/cloudwizard-apt/109722/
Submission: On May 22 via api from TR — Scanned from DE

Form analysis 12 forms found in the DOM

<form>
  <fieldset>
    <legend class="visuallyhidden">Consent Selection</legend>
    <div id="CybotCookiebotDialogBodyFieldsetInnerContainer">
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonNecessary"><span
            class="CybotCookiebotDialogBodyLevelButtonDescription">Notwendig</span></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper CybotCookiebotDialogBodyLevelButtonSliderWrapperDisabled"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessary"
            class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonPreferences"><span
            class="CybotCookiebotDialogBodyLevelButtonDescription">Präferenzen</span></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferences" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonPreferencesInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonStatistics"><span
            class="CybotCookiebotDialogBodyLevelButtonDescription">Statistiken</span></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatistics" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonStatisticsInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonMarketing"><span
            class="CybotCookiebotDialogBodyLevelButtonDescription">Marketing</span></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketing" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonMarketingInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
    </div>
  </fieldset>
</form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessaryInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferencesInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonPreferences"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatisticsInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonStatistics"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketingInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonMarketing" checked="checked"
    tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyContentCheckboxPersonalInformation" class="CybotCookiebotDialogBodyLevelButton"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

GET https://securelist.com/

<form class="c-page-search__form c-page-search__form--small js-wizardinfosys_autosearch_form" full_search_url="https://securelist.com/?s=%q%" action="https://securelist.com/" method="get" data-gtm-vis-has-fired-11711842_122="1"
  data-gtm-vis-has-fired-11711842_155="1">
  <div class="c-form-element c-form-element--style-fill" data-gtm-vis-has-fired-11711842_122="1">
    <div class="c-form-element__field wp_autosearch_form_wrapper" data-gtm-vis-has-fired-11711842_122="1">
      <input name="s" class="c-form-element__text wp_autosearch_input ac_input" data-webinars="" type="text" value="" placeholder="Search..." autocomplete="off" data-gtm-vis-has-fired-11711842_122="1">
    </div>
  </div>
  <button class="c-button c-button--icon wp_autosearch_submit" data-gtm-vis-has-fired-11711842_122="1"><svg class="o-icon o-svg-icon o-svg-large" data-gtm-vis-has-fired-11711842_122="1">
      <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securelist.com/wp-content/themes/securelist2020/assets/sprite/icons.svg#icon-search" data-gtm-vis-has-fired-11711842_122="1"></use>
    </svg></button>
</form>

GET https://securelist.com/

<form class="c-page-search__form js-main-search-popup js-wizardinfosys_autosearch_form" full_search_url="https://securelist.com/?s=%q%" action="https://securelist.com/" method="get" data-gtm-vis-has-fired-11711842_122="1"
  data-gtm-vis-recent-on-screen-11711842_155="623" data-gtm-vis-first-on-screen-11711842_155="623" data-gtm-vis-total-visible-time-11711842_155="100" data-gtm-vis-has-fired-11711842_155="1">
  <div class="c-form-element c-form-element--style-fill" data-gtm-vis-has-fired-11711842_122="1">
    <div class="c-form-element__field wp_autosearch_form_wrapper" data-gtm-vis-has-fired-11711842_122="1">
      <input name="s" class="c-form-element__text wp_autosearch_input ac_input" data-webinars="" type="text" value="" placeholder="Search..." autocomplete="off" data-gtm-vis-has-fired-11711842_122="1">
    </div>
  </div>
  <button class="c-button c-button--icon wp_autosearch_submit" data-gtm-vis-has-fired-11711842_122="1"><svg class="o-icon o-svg-icon o-svg-large" data-gtm-vis-has-fired-11711842_122="1">
      <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securelist.com/wp-content/themes/securelist2020/assets/sprite/icons.svg#icon-search" data-gtm-vis-has-fired-11711842_122="1"></use>
    </svg></button>
</form>

POST https://securelist.com/wp-comments-post.php

<form action="https://securelist.com/wp-comments-post.php" method="post" id="loginform" class="comment-form" data-gtm-vis-has-fired-11711842_122="1">
  <p class="comment-notes" data-gtm-vis-has-fired-11711842_122="1"><span id="email-notes" data-gtm-vis-has-fired-11711842_122="1">Your email address will not be published.</span> <span class="required-field-message"
      data-gtm-vis-has-fired-11711842_122="1">Required fields are marked <span class="required" data-gtm-vis-has-fired-11711842_122="1">*</span></span></p>
  <div class="comment-form-comment" data-gtm-vis-has-fired-11711842_122="1"><textarea id="comment" name="comment" style="width:100%" rows="8" aria-required="true" placeholder="Type your comment here"
      data-gtm-vis-has-fired-11711842_122="1"></textarea></div><!-- .comment-form-comment -->
  <p class="comment-form-author" data-gtm-vis-has-fired-11711842_122="1"><label for="author" data-gtm-vis-has-fired-11711842_122="1">Name <span class="required" data-gtm-vis-has-fired-11711842_122="1">*</span></label> <input id="author" name="author"
      type="text" value="" size="30" maxlength="245" autocomplete="name" required="required" data-gtm-vis-has-fired-11711842_122="1"></p>
  <p class="comment-form-email" data-gtm-vis-has-fired-11711842_122="1"><label for="email" data-gtm-vis-has-fired-11711842_122="1">Email <span class="required" data-gtm-vis-has-fired-11711842_122="1">*</span></label> <input id="email" name="email"
      type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" autocomplete="email" required="required" data-gtm-vis-has-fired-11711842_122="1"></p>
  <script type="text/javascript" data-gtm-vis-has-fired-11711842_122="1">
    document.addEventListener("input", function(event) {
      if (!event.target.closest("#comment")) return;
      try {
        grecaptcha.render("recaptcha-submit-btn-area", {
          "sitekey": "6LfQdrAaAAAAAEb_rTrwlbyc8z0Fa9CMjELY_2Ts",
          "theme": "standard"
        });
      } catch (error) {
        /*possible duplicated instances*/ }
    });
  </script>
  <script src="https://www.google.com/recaptcha/api.js?hl=en&amp;render=explicit" async="" defer="" data-gtm-vis-has-fired-11711842_122="1"></script>
  <div id="recaptcha-submit-btn-area" data-gtm-vis-has-fired-11711842_122="1">&nbsp;</div>
  <noscript data-gtm-vis-has-fired-11711842_122="1">
    <style type="text/css">
      #form-submit-save {
        display: none;
      }
    </style>
    <input name="submit" type="submit" id="submit-alt" tabindex="6" value="Submit Comment">
  </noscript>
  <p class="form-submit" data-gtm-vis-has-fired-11711842_122="1"><input name="submit" type="submit" id="commentsubmit" class="submit" value="Comment"
      data-gtm-vis-has-fired-11711842_122="1"><a rel="nofollow" id="cancel-comment-reply-link" href="/cloudwizard-apt/109722/#respond" style="display:none;" data-gtm-vis-has-fired-11711842_122="1">Cancel</a> <input type="hidden"
      name="comment_post_ID" value="109722" id="comment_post_ID" data-gtm-vis-has-fired-11711842_122="1">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0" data-gtm-vis-has-fired-11711842_122="1">
  </p>
  <p style="display: none;" data-gtm-vis-has-fired-11711842_122="1"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="0ebb131eb1" data-gtm-vis-has-fired-11711842_122="1"></p>
  <!-- the following input field has been added by the Honeypot Comments plugin to thwart spambots -->
  <input type="hidden" id="RO2EIQk2nTNqfV5qofRSgEEJ7" name="cHlAe7x4dRnGC9n0wMpHLPzxu" data-gtm-vis-has-fired-11711842_122="1">
  <p style="display: none !important;" data-gtm-vis-has-fired-11711842_122="1"><label data-gtm-vis-has-fired-11711842_122="1">Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"
        data-gtm-vis-has-fired-11711842_122="1"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1684721433450" data-gtm-vis-has-fired-11711842_122="1">
    <script data-gtm-vis-has-fired-11711842_122="1">
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

POST /cloudwizard-apt/109722/#gf_68533097

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_68533097" id="gform_68533097" class="subscribe-mc gform_legacy_markup" action="/cloudwizard-apt/109722/#gf_68533097" data-gtm-vis-has-fired-11711842_122="1">
  <div class="gform-content-wrapper" data-gtm-vis-has-fired-11711842_122="1">
    <div class="gform_body gform-body" data-gtm-vis-has-fired-11711842_122="1">
      <ul id="gform_fields_68533097" class="gform_fields top_label form_sublabel_below description_below" data-gtm-vis-has-fired-11711842_122="1">
        <li id="field_11_1" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-gtm-vis-has-fired-11711842_122="1">
          <div class="ginput_container ginput_container_email" data-gtm-vis-has-fired-11711842_122="1">
            <div class="fl-wrap fl-wrap-input"><label class="gfield_label screen-reader-text fl-label" for="input_68533097_1" data-gtm-vis-has-fired-11711842_122="1">Email</label><input name="input_1" id="input_68533097_1" type="text" value=""
                class="medium fl-input" placeholder="Email" aria-required="true" aria-invalid="false" data-placeholder="Email" data-gtm-vis-has-fired-11711842_122="1"></div>
          </div>
        </li>
        <li id="field_11_3" class="gfield js-kaspersky-gform-recaptcha-placeholder gform_hidden field_sublabel_below field_description_below gfield_visibility_hidden" data-gtm-vis-has-fired-11711842_122="1">
          <div class="ginput_container ginput_container_text" data-gtm-vis-has-fired-11711842_122="1"><input name="input_3" id="input_68533097_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""
              data-gtm-vis-has-fired-11711842_122="1"></div>
        </li>
        <li id="field_11_2" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-gtm-vis-has-fired-11711842_122="1"><label
            class="gfield_label screen-reader-text gfield_label_before_complex" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required gfield_required_asterisk"
                data-gtm-vis-has-fired-11711842_122="1">*</span></span></label>
          <div class="ginput_container ginput_container_checkbox" data-gtm-vis-has-fired-11711842_122="1">
            <ul class="gfield_checkbox" id="input_68533097_2" data-gtm-vis-has-fired-11711842_122="1">
              <li class="gchoice gchoice_11_2_1" data-gtm-vis-has-fired-11711842_122="1">
                <input class="gfield-choice-input" name="input_2.1" type="checkbox" value="I agree" id="choice_68533097_11_2_1" data-gtm-vis-has-fired-11711842_122="1">
                <label for="choice_68533097_11_2_1" id="label_68533097_11_2_1" data-gtm-vis-has-fired-11711842_122="1">I agree to provide my email address to “AO Kaspersky Lab” to receive information about new posts on the site. I understand that I
                  can withdraw this consent at any time via e-mail by clicking the “unsubscribe” link that I find at the bottom of any e-mail sent to me for the purposes mentioned above.</label>
              </li>
            </ul>
          </div>
        </li>
      </ul>
    </div>
    <div class="gform_footer top_label" data-gtm-vis-has-fired-11711842_122="1"> <button type="submit" class="gform_button button" id="gform_submit_button_68533097" value="Sign up" data-gtm-vis-has-fired-11711842_122="1">
        <svg class="o-icon o-svg-icon o-svg-large" data-gtm-vis-has-fired-11711842_122="1">
          <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securelist.com/wp-content/themes/securelist2020/assets/sprite/icons.svg#icon-envelope" data-gtm-vis-has-fired-11711842_122="1"></use>
        </svg> <span data-gtm-vis-has-fired-11711842_122="1">Subscribe</span>
      </button>
      <input type="hidden" name="gform_ajax" value="form_id=11&amp;title=&amp;description=&amp;tabindex=0" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="is_submit_11" value="1" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_submit" value="11" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_unique_id" value="" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="state_11" value="WyJbXSIsImIwODQwZTA2ZGQ0NzYwODcyOTBkZjNmZDM1NDk2Y2ZkIl0=" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_target_page_number_11" id="gform_target_page_number_68533097_11" value="0" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_source_page_number_11" id="gform_source_page_number_68533097_11" value="1" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" name="gform_random_id" value="68533097" data-gtm-vis-has-fired-11711842_122="1"><input type="hidden" name="gform_field_values" value="securelist_2020_form_location=sidebar" data-gtm-vis-has-fired-11711842_122="1">
    </div>
  </div>
  <p style="display: none !important;" data-gtm-vis-has-fired-11711842_122="1"><label data-gtm-vis-has-fired-11711842_122="1">Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"
        data-gtm-vis-has-fired-11711842_122="1"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="1684721433451" data-gtm-vis-has-fired-11711842_122="1">
    <script data-gtm-vis-has-fired-11711842_122="1">
      document.getElementById("ak_js_2").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

POST /cloudwizard-apt/109722/#gf_807730522

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_807730522" id="gform_807730522" class="subscribe-mc gform_legacy_markup" action="/cloudwizard-apt/109722/#gf_807730522" data-gtm-vis-has-fired-11711842_122="1">
  <div class="gform-content-wrapper" data-gtm-vis-has-fired-11711842_122="1">
    <div class="gform_body gform-body" data-gtm-vis-has-fired-11711842_122="1">
      <ul id="gform_fields_807730522" class="gform_fields top_label form_sublabel_below description_below" data-gtm-vis-has-fired-11711842_122="1">
        <li id="field_11_1" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-gtm-vis-has-fired-11711842_122="1"><label class="gfield_label screen-reader-text" for="input_807730522_1"
            data-gtm-vis-has-fired-11711842_122="1">Email<span class="gfield_required" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required gfield_required_asterisk" data-gtm-vis-has-fired-11711842_122="1">*</span></span></label>
          <div class="ginput_container ginput_container_email" data-gtm-vis-has-fired-11711842_122="1">
            <input name="input_1" id="input_807730522_1" type="text" value="" class="medium" placeholder="Email" aria-required="true" aria-invalid="false" data-gtm-vis-has-fired-11711842_122="1">
          </div>
        </li>
        <li id="field_11_3" class="gfield js-kaspersky-gform-recaptcha-placeholder gform_hidden field_sublabel_below field_description_below gfield_visibility_hidden" data-gtm-vis-has-fired-11711842_122="1">
          <div class="ginput_container ginput_container_text" data-gtm-vis-has-fired-11711842_122="1"><input name="input_3" id="input_807730522_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""
              data-gtm-vis-has-fired-11711842_122="1"></div>
        </li>
        <li id="field_11_2" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-gtm-vis-has-fired-11711842_122="1"><label
            class="gfield_label screen-reader-text gfield_label_before_complex" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required gfield_required_asterisk"
                data-gtm-vis-has-fired-11711842_122="1">*</span></span></label>
          <div class="ginput_container ginput_container_checkbox" data-gtm-vis-has-fired-11711842_122="1">
            <ul class="gfield_checkbox" id="input_807730522_2" data-gtm-vis-has-fired-11711842_122="1">
              <li class="gchoice gchoice_11_2_1" data-gtm-vis-has-fired-11711842_122="1">
                <input class="gfield-choice-input" name="input_2.1" type="checkbox" value="I agree" id="choice_807730522_11_2_1" data-gtm-vis-has-fired-11711842_122="1">
                <label for="choice_807730522_11_2_1" id="label_807730522_11_2_1" data-gtm-vis-has-fired-11711842_122="1">I agree to provide my email address to “AO Kaspersky Lab” to receive information about new posts on the site. I understand that I
                  can withdraw this consent at any time via e-mail by clicking the “unsubscribe” link that I find at the bottom of any e-mail sent to me for the purposes mentioned above.</label>
              </li>
            </ul>
          </div>
        </li>
      </ul>
    </div>
    <div class="gform_footer top_label" data-gtm-vis-has-fired-11711842_122="1"> <button class="gform_button button" type="submit" id="gform_submit_button_807730522" value="Sign up" data-gtm-vis-has-fired-11711842_122="1">
        <svg class="o-icon o-svg-icon o-svg-large u-hidden u-inline-block@sm" data-gtm-vis-has-fired-11711842_122="1">
          <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securelist.com/wp-content/themes/securelist2020/assets/sprite/icons.svg#icon-envelope" data-gtm-vis-has-fired-11711842_122="1"></use>
        </svg> <span class="u-hidden u-inline@sm" data-gtm-vis-has-fired-11711842_122="1">Subscribe</span>
        <span class="u-hidden@sm" data-gtm-vis-has-fired-11711842_122="1"><svg class="o-icon o-svg-icon o-svg-right" data-gtm-vis-has-fired-11711842_122="1">
            <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securelist.com/wp-content/themes/securelist2020/assets/sprite/icons.svg#icon-arrow" data-gtm-vis-has-fired-11711842_122="1"></use>
          </svg></span>
      </button>
      <input type="hidden" name="gform_ajax" value="form_id=11&amp;title=&amp;description=&amp;tabindex=0" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="is_submit_11" value="1" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_submit" value="11" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_unique_id" value="" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="state_11" value="WyJbXSIsImIwODQwZTA2ZGQ0NzYwODcyOTBkZjNmZDM1NDk2Y2ZkIl0=" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_target_page_number_11" id="gform_target_page_number_807730522_11" value="0" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_source_page_number_11" id="gform_source_page_number_807730522_11" value="1" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" name="gform_random_id" value="807730522" data-gtm-vis-has-fired-11711842_122="1"><input type="hidden" name="gform_field_values" value="securelist_2020_form_location=" data-gtm-vis-has-fired-11711842_122="1">
    </div>
  </div>
  <p style="display: none !important;" data-gtm-vis-has-fired-11711842_122="1"><label data-gtm-vis-has-fired-11711842_122="1">Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"
        data-gtm-vis-has-fired-11711842_122="1"></textarea></label><input type="hidden" id="ak_js_3" name="ak_js" value="1684721433474" data-gtm-vis-has-fired-11711842_122="1">
    <script data-gtm-vis-has-fired-11711842_122="1">
      document.getElementById("ak_js_3").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

POST /cloudwizard-apt/109722/#gf_2310387515

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2310387515" id="gform_2310387515" class="subscribe-mc gform_legacy_markup" action="/cloudwizard-apt/109722/#gf_2310387515" data-gtm-vis-has-fired-11711842_122="1">
  <div class="gform-content-wrapper" data-gtm-vis-has-fired-11711842_122="1">
    <div class="gform_body gform-body" data-gtm-vis-has-fired-11711842_122="1">
      <ul id="gform_fields_2310387515" class="gform_fields top_label form_sublabel_below description_below" data-gtm-vis-has-fired-11711842_122="1">
        <li id="field_11_1" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-gtm-vis-has-fired-11711842_122="1">
          <div class="ginput_container ginput_container_email" data-gtm-vis-has-fired-11711842_122="1">
            <div class="fl-wrap fl-wrap-input"><label class="gfield_label screen-reader-text fl-label" for="input_2310387515_1" data-gtm-vis-has-fired-11711842_122="1">Email</label><input name="input_1" id="input_2310387515_1" type="text" value=""
                class="medium fl-input" placeholder="Email" aria-required="true" aria-invalid="false" data-placeholder="Email" data-gtm-vis-has-fired-11711842_122="1"></div>
          </div>
        </li>
        <li id="field_11_3" class="gfield js-kaspersky-gform-recaptcha-placeholder gform_hidden field_sublabel_below field_description_below gfield_visibility_hidden" data-gtm-vis-has-fired-11711842_122="1">
          <div class="ginput_container ginput_container_text" data-gtm-vis-has-fired-11711842_122="1"><input name="input_3" id="input_2310387515_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""
              data-gtm-vis-has-fired-11711842_122="1"></div>
        </li>
        <li id="field_11_2" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-gtm-vis-has-fired-11711842_122="1"><label
            class="gfield_label screen-reader-text gfield_label_before_complex" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required" data-gtm-vis-has-fired-11711842_122="1"><span class="gfield_required gfield_required_asterisk"
                data-gtm-vis-has-fired-11711842_122="1">*</span></span></label>
          <div class="ginput_container ginput_container_checkbox" data-gtm-vis-has-fired-11711842_122="1">
            <ul class="gfield_checkbox" id="input_2310387515_2" data-gtm-vis-has-fired-11711842_122="1">
              <li class="gchoice gchoice_11_2_1" data-gtm-vis-has-fired-11711842_122="1">
                <input class="gfield-choice-input" name="input_2.1" type="checkbox" value="I agree" id="choice_2310387515_11_2_1" data-gtm-vis-has-fired-11711842_122="1">
                <label for="choice_2310387515_11_2_1" id="label_2310387515_11_2_1" data-gtm-vis-has-fired-11711842_122="1">I agree to provide my email address to “AO Kaspersky Lab” to receive information about new posts on the site. I understand that
                  I can withdraw this consent at any time via e-mail by clicking the “unsubscribe” link that I find at the bottom of any e-mail sent to me for the purposes mentioned above.</label>
              </li>
            </ul>
          </div>
        </li>
      </ul>
    </div>
    <div class="gform_footer top_label" data-gtm-vis-has-fired-11711842_122="1"> <button type="submit" class="gform_button button" id="gform_submit_button_2310387515" value="Sign up" data-gtm-vis-has-fired-11711842_122="1">
        <svg class="o-icon o-svg-icon o-svg-large" data-gtm-vis-has-fired-11711842_122="1">
          <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securelist.com/wp-content/themes/securelist2020/assets/sprite/icons.svg#icon-envelope" data-gtm-vis-has-fired-11711842_122="1"></use>
        </svg> <span data-gtm-vis-has-fired-11711842_122="1">Subscribe</span>
      </button>
      <input type="hidden" name="gform_ajax" value="form_id=11&amp;title=&amp;description=&amp;tabindex=0" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="is_submit_11" value="1" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_submit" value="11" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_unique_id" value="" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="state_11" value="WyJbXSIsImIwODQwZTA2ZGQ0NzYwODcyOTBkZjNmZDM1NDk2Y2ZkIl0=" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_target_page_number_11" id="gform_target_page_number_2310387515_11" value="0" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" class="gform_hidden" name="gform_source_page_number_11" id="gform_source_page_number_2310387515_11" value="1" data-gtm-vis-has-fired-11711842_122="1">
      <input type="hidden" name="gform_random_id" value="2310387515" data-gtm-vis-has-fired-11711842_122="1"><input type="hidden" name="gform_field_values" value="securelist_2020_form_location=sidebar" data-gtm-vis-has-fired-11711842_122="1">
    </div>
  </div>
  <p style="display: none !important;" data-gtm-vis-has-fired-11711842_122="1"><label data-gtm-vis-has-fired-11711842_122="1">Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"
        data-gtm-vis-has-fired-11711842_122="1"></textarea></label><input type="hidden" id="ak_js_4" name="ak_js" value="1684721433525" data-gtm-vis-has-fired-11711842_122="1">
    <script data-gtm-vis-has-fired-11711842_122="1">
      document.getElementById("ak_js_4").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

Text Content

Powered by Cookiebot
 * Zustimmung
 * Details
 * [#IABV2SETTINGS#]
 * Über Cookies


DIESE WEBSEITE VERWENDET COOKIES

Wir verwenden Cookies, um Inhalte und Anzeigen zu personalisieren, Funktionen
für soziale Medien anbieten zu können und die Zugriffe auf unsere Website zu
analysieren. Außerdem geben wir Informationen zu Ihrer Verwendung unserer
Website an unsere Partner für soziale Medien, Werbung und Analysen weiter.
Unsere Partner führen diese Informationen möglicherweise mit weiteren Daten
zusammen, die Sie ihnen bereitgestellt haben oder die sie im Rahmen Ihrer
Nutzung der Dienste gesammelt haben.
Consent Selection
Notwendig

Präferenzen

Statistiken

Marketing

Details zeigen
Notwendig 17

Notwendige Cookies helfen dabei, eine Webseite nutzbar zu machen, indem sie
Grundfunktionen wie Seitennavigation und Zugriff auf sichere Bereiche der
Webseite ermöglichen. Die Webseite kann ohne diese Cookies nicht richtig
funktionieren.
Adobe
1
Erfahren Sie mehr über diesen Anbieter
demdexÜber eine eindeutige ID, die für semantische Inhaltsanalyse verwendet
wird, wird die Navigation des Benutzers auf der Website registriert und mit
Offline-Daten aus Umfragen und ähnlichen Registrierungen verknüpft, um gezielte
Werbung anzuzeigen.
Ablauf: 179 TageTyp: HTTP
Cookiebot
2
Erfahren Sie mehr über diesen Anbieter
CookieConsent [x2]Speichert den Zustimmungsstatus des Benutzers für Cookies auf
der aktuellen Domäne.
Ablauf: 1 JahrTyp: HTTP
Google
3
Erfahren Sie mehr über diesen Anbieter
test_cookieVerwendet, um zu überprüfen, ob der Browser des Benutzers Cookies
unterstützt.
Ablauf: 1 TagTyp: HTTP
rc::aDieser Cookie wird verwendet, um zwischen Menschen und Bots zu
unterscheiden. Dies ist vorteilhaft für die webseite, um gültige Berichte über
die Nutzung ihrer webseite zu erstellen.
Ablauf: PersistentTyp: HTML
rc::cDieser Cookie wird verwendet, um zwischen Menschen und Bots zu
unterscheiden.
Ablauf: SessionTyp: HTML
Kaspersky Lab
6
Erfahren Sie mehr über diesen Anbieter
AMCV_# [x2]Einmalige Benutzer-ID, welche den Anwender bei wiederkehrenden
Besuchen erkennt
Ablauf: 399 TageTyp: HTTP
AMCVS_#AdobeOrg [x2]Anstehend
Ablauf: SessionTyp: HTTP
test [x2]Wird verwendet, um festzustellen, ob der Besucher die
Marketingkategorie im Cookie-Banner akzeptiert hat. Dieser Cookie ist notwendig
für die Einhaltung der DSGVO der Webseite.
Ablauf: SessionTyp: HTTP
Marketo
2
Erfahren Sie mehr über diesen Anbieter
__cf_bmDieser Cookie wird verwendet, um zwischen Menschen und Bots zu
unterscheiden. Dies ist vorteilhaft für die webseite, um gültige Berichte über
die Nutzung ihrer webseite zu erstellen.
Ablauf: 1 TagTyp: HTTP
BIGipServer#Verwendet, um Verkehr auf der Website auf mehreren Servern zu
verteilen, um die Antwortzeiten zu optimieren.
Ablauf: SessionTyp: HTTP
Solarwinds
1
Erfahren Sie mehr über diesen Anbieter
pa_enabledBestimmt das Gerät, mit dem auf die Webseite zugegriffen wird. Dadurch
kann die Webseite entsprechend formatiert werden.
Ablauf: PersistentTyp: HTML
play.google.com
youtube.com

2
CONSENT [x2]Wird verwendet, um festzustellen, ob der Besucher die
Marketingkategorie im Cookie-Banner akzeptiert hat. Dieser Cookie ist notwendig
für die Einhaltung der DSGVO der Webseite.
Ablauf: 2 JahreTyp: HTTP
Präferenzen 1

Präferenz-Cookies ermöglichen einer Webseite sich an Informationen zu erinnern,
die die Art beeinflussen, wie sich eine Webseite verhält oder aussieht, wie z.
B. Ihre bevorzugte Sprache oder die Region in der Sie sich befinden.
Cookiebot
1
Erfahren Sie mehr über diesen Anbieter
CookieConsentBulkSetting-#Aktiviert die Zustimmung zur Cookie-Nutzung für
mehrere Webseiten
Ablauf: PersistentTyp: HTML
Statistiken 16

Statistik-Cookies helfen Webseiten-Besitzern zu verstehen, wie Besucher mit
Webseiten interagieren, indem Informationen anonym gesammelt und gemeldet
werden.
Google
9
Erfahren Sie mehr über diesen Anbieter
collectWird verwendet, um Daten zu Google Analytics über das Gerät und das
Verhalten des Besuchers zu senden. Erfasst den Besucher über Geräte und
Marketingkanäle hinweg.
Ablauf: SessionTyp: Pixel
_ga [x2]Registriert eine eindeutige ID, die verwendet wird, um statistische
Daten dazu, wie der Besucher die Website nutzt, zu generieren.
Ablauf: 399 TageTyp: HTTP
_ga_# [x2]Sammelt Daten dazu, wie oft ein Benutzer eine Website besucht hat,
sowie Daten für den ersten und letzten Besuch. Von Google Analytics verwendet.
Ablauf: 399 TageTyp: HTTP
_gat [x2]Wird von Google Analytics verwendet, um die Anforderungsrate
einzuschränken
Ablauf: 1 TagTyp: HTTP
_gid [x2]Registriert eine eindeutige ID, die verwendet wird, um statistische
Daten dazu, wie der Besucher die Website nutzt, zu generieren.
Ablauf: 1 TagTyp: HTTP
Kaspersky Lab
6
Erfahren Sie mehr über diesen Anbieter
_cs_mk [x2]Registriert die Geschwindigkeit und Leistung der Webseite. Diese
Funktion kann im Zusammenhang mit Statistiken und Lastenausgleich verwendet
werden.
Ablauf: 1 TagTyp: HTTP
_gd# [x2]Anstehend
Ablauf: SessionTyp: HTTP
s_cc [x2]Verwendet, um zu überprüfen, ob der Browser des Benutzers Cookies
unterstützt.
Ablauf: SessionTyp: HTTP
Solarwinds
1
Erfahren Sie mehr über diesen Anbieter
paRegistriert die Geschwindigkeit und Leistung der Webseite. Diese Funktion kann
im Zusammenhang mit Statistiken und Lastenausgleich verwendet werden.
Ablauf: PersistentTyp: HTML
Marketing 23

Marketing-Cookies werden verwendet, um Besuchern auf Webseiten zu folgen. Die
Absicht ist, Anzeigen zu zeigen, die relevant und ansprechend für den einzelnen
Benutzer sind und daher wertvoller für Publisher und werbetreibende
Drittparteien sind.
Meta Platforms, Inc.
3
Erfahren Sie mehr über diesen Anbieter
fbssls_# [x2]Sammelt Daten über die Nutzung des Kommentarsystems auf der Website
durch den Besucher, außerdem registriert es, welche Blogs/Artikel der Besucher
gelesen hat - dies kann für Marketingzwecke verwendet werden.
Ablauf: SessionTyp: HTML
_fbpWird von Facebook genutzt, um eine Reihe von Werbeprodukten anzuzeigen, zum
Beispiel Echtzeitgebote dritter Werbetreibender.
Ablauf: 3 MonateTyp: HTTP
BrightTalk
1
Erfahren Sie mehr über diesen Anbieter
ga_clientIdWird verwendet, um Daten zu Google Analytics über das Gerät und das
Verhalten des Besuchers zu senden. Erfasst den Besucher über Geräte und
Marketingkanäle hinweg.
Ablauf: PersistentTyp: HTML
Google
6
Erfahren Sie mehr über diesen Anbieter
IDEVerwendet von Google DoubleClick, um die Handlungen des Benutzers auf der
Webseite nach der Anzeige oder dem Klicken auf eine der Anzeigen des Anbieters
zu registrieren und zu melden, mit dem Zweck der Messung der Wirksamkeit einer
Werbung und der Anzeige zielgerichteter Werbung für den Benutzer.
Ablauf: 1 JahrTyp: HTTP
pagead/landing [x2]Sammelt Daten zum Besucherverhalten auf mehreren Webseiten,
um relevantere Werbung zu präsentieren - Dies ermöglicht es der Webseite auch,
die Anzahl der Anzeige der gleichen Werbung zu begrenzen.
Ablauf: SessionTyp: Pixel
ads/ga-audiencesUsed by Google AdWords to re-engage visitors that are likely to
convert to customers based on the visitor's online behaviour across websites.
Ablauf: SessionTyp: Pixel
_gcl_au [x2]Wird von Google AdSense zum Experimentieren mit Werbungseffizienz
auf Webseiten verwendet, die ihre Dienste nutzen.
Ablauf: 3 MonateTyp: HTTP
Marketo
1
Erfahren Sie mehr über diesen Anbieter
_mkto_trkEnthält Daten zum Besucherverhalten und zur Webseite-Interaktion. Dies
wird im Zusammenhang mit dem E-Mail-Marketingdienst Marketo.com verwendet, der
es der Webseite ermöglicht, Besucher per E-Mail anzusprechen.
Ablauf: 399 TageTyp: HTTP
Meta Platforms, Inc.
1
Erfahren Sie mehr über diesen Anbieter
frWird von Facebook genutzt, um eine Reihe von Werbeprodukten anzuzeigen, zum
Beispiel Echtzeitgebote dritter Werbetreibender.
Ablauf: 3 MonateTyp: HTTP
YouTube
11
Erfahren Sie mehr über diesen Anbieter
nWC1Uzs7EIAnstehend
Ablauf: SessionTyp: HTML
VISITOR_INFO1_LIVEVersucht, die Benutzerbandbreite auf Seiten mit integrierten
YouTube-Videos zu schätzen.
Ablauf: 179 TageTyp: HTTP
YSCRegistriert eine eindeutige ID, um Statistiken der Videos von YouTube, die
der Benutzer gesehen hat, zu behalten.
Ablauf: SessionTyp: HTTP
ytidb::LAST_RESULT_ENTRY_KEYSpeichert die Benutzereinstellungen beim Abruf eines
auf anderen Webseiten integrierten Youtube-Videos
Ablauf: PersistentTyp: HTML
yt-remote-cast-availableSpeichert die Benutzereinstellungen beim Abruf eines auf
anderen Webseiten integrierten Youtube-Videos
Ablauf: SessionTyp: HTML
yt-remote-cast-installedSpeichert die Benutzereinstellungen beim Abruf eines auf
anderen Webseiten integrierten Youtube-Videos
Ablauf: SessionTyp: HTML
yt-remote-connected-devicesSpeichert die Benutzereinstellungen beim Abruf eines
auf anderen Webseiten integrierten Youtube-Videos
Ablauf: PersistentTyp: HTML
yt-remote-device-idSpeichert die Benutzereinstellungen beim Abruf eines auf
anderen Webseiten integrierten Youtube-Videos
Ablauf: PersistentTyp: HTML
yt-remote-fast-check-periodSpeichert die Benutzereinstellungen beim Abruf eines
auf anderen Webseiten integrierten Youtube-Videos
Ablauf: SessionTyp: HTML
yt-remote-session-appSpeichert die Benutzereinstellungen beim Abruf eines auf
anderen Webseiten integrierten Youtube-Videos
Ablauf: SessionTyp: HTML
yt-remote-session-nameSpeichert die Benutzereinstellungen beim Abruf eines auf
anderen Webseiten integrierten Youtube-Videos
Ablauf: SessionTyp: HTML
Nicht klassifiziert 0
Nicht klassifizierte Cookies sind Cookies, die wir gerade versuchen zu
klassifizieren, zusammen mit Anbietern von individuellen Cookies.

Wir nutzen diese Cookie-Typen nicht.

Domainübergreifende Zustimmung2 Ihre Einwilligung trifft auf die folgenden
Domains zu:
Liste der Domains, für die Ihre Zustimmung gilt: securelist.lat securelist.com
Die Cookie-Erklärung wurde das letzte Mal am 15.05.23 von Cookiebot aktualisiert


[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]

Cookies sind kleine Textdateien, die von Webseiten verwendet werden, um die
Benutzererfahrung effizienter zu gestalten.

Laut Gesetz können wir Cookies auf Ihrem Gerät speichern, wenn diese für den
Betrieb dieser Seite unbedingt notwendig sind. Für alle anderen Cookie-Typen
benötigen wir Ihre Erlaubnis.

Diese Seite verwendet unterschiedliche Cookie-Typen. Einige Cookies werden von
Drittparteien platziert, die auf unseren Seiten erscheinen.

Sie können Ihre Einwilligung jederzeit von der Cookie-Erklärung auf unserer
Website ändern oder widerrufen.

Erfahren Sie in unserer Datenschutzrichtlinie mehr darüber, wer wir sind, wie
Sie uns kontaktieren können und wie wir personenbezogene Daten verarbeiten.

Bitte geben Sie Ihre Einwilligungs-ID und das Datum an, wenn Sie uns bezüglich
Ihrer Einwilligung kontaktieren.



Meine persönlichen Daten nicht verkaufen oder weitergeben
Nur notwendige Cookies Auswahl erlauben Anpassen

Cookies zulassen
Powered by Cookiebot by Usercentrics


Solutions for:

 * Home Products
 * Small Business 1-50 employees
 * Medium Business 51-999 employees
 * Enterprise 1000+ employees

by Kaspersky
 * CompanyAccount
 * Get In Touch
 * Dark mode off
 * English
   * Russian
   * Spanish


 * Solutions
   * * Hybrid Cloud Security
       
       Learn More
     
     * Internet of Things & Embedded Security
       
       Learn More
     
     * Threat Management and Defense
       
       Learn More
     
     * Industrial Cybersecurity
       
       Learn More
     
     * Fraud Prevention
       
       Learn More
   
   * * OTHER SOLUTIONS
     
     * Blockchain Security
     * Kaspersky for Security Operations Center
 * Industries
   * * National Cybersecurity
       
       Learn More
     
     * Industrial Cybersecurity
       
       Learn More
     
     * Finance Services Cybersecurity
       
       Learn More
     
     * Healthcare Cybersecurity
       
       Learn More
     
     * Transportation Cybersecurity
       
       Learn More
     
     * Retail Cybersecurity
       
       Learn More
   
   * * OTHER INDUSTRIES
     
     * Telecom Cybersecurity
     * Blockchain Security
     * View all
 * Products
   * * KasperskyEndpoint Security for Business
       
       Learn More
     
     * KasperskyEndpoint Detection and Response (EDR)
       
       Learn More
     
     * KasperskyEDR Optimum
       
       Learn More
     
     * KasperskyAnti Targeted Attack Platform
       
       Learn More
     
     * KasperskyManaged Detection and Response
       
       Learn More
     
     * KasperskySandbox
       
       Learn More
   
   * * OTHER PRODUCTS
     
     * Kaspersky Security for Mail Server
     * Kaspersky Security for Internet Gateway
     * Kaspersky Embedded Systems Security
     * Kaspersky Hybrid Cloud Security for AWS
     * Kaspersky Hybrid Cloud Security for Azure
     * View All
 * Services
   * * KasperskyCybersecurity Services
       
       Learn More
     
     * KasperskyAdaptive Online Training
       
       Learn More
     
     * KasperskyPremium Support
       
       Learn More
     
     * KasperskyThreat Intelligence
       
       Learn More
     
     * KasperskyAPT Intelligence Reporting
       
       Learn More
     
     * KasperskyTargeted Attack Discovery
       
       Learn More
   
   * * OTHER SERVICES
     
     * Kaspersky Professional Services
     * Kaspersky Incident Response
     * Kaspersky Cybersecurity Training
     * Kaspersky Incident Communications
     * Kaspersky Security Awareness
     * View All
 * Resource Center
   * Case Studies
   * White Papers
   * Datasheets
   * Technologies
   * MITRE ATT&CK
 * About Us
   * Transparency
   * Corporate News
   * Press Center
   * Careers
   * Innovation Hub
   * Sponsorship
   * Policy Blog
   * Contacts
 * GDPR

 * Subscribe Dark mode off Login
 * Securelist menu
 * English
   * Russian
   * Spanish
 * Existing Customers
   * Personal
     * My Kaspersky
     * Renew your product
     * Update your product
     * Customer support
   * Business
     * KSOS portal
     * Kaspersky Business Hub
     * Technical Support
     * Knowledge Base
     * Renew License
 * Home
   * Products
   * Trials&Update
   * Resource Center
 * Business
   * Small Business (1-50 employees)
   * Medium Business (51-999 employees)
   * Enterprise (1000+ employees)
 * 
 * Securelist
 * Threats
   * Financial threats
   * Mobile threats
   * Web threats
   * Secure environment (IoT)
   * Vulnerabilities and exploits
   * Spam and Phishing
   * Industrial threats
 * Categories
   * APT reports
   * Incidents
   * Research
   * Malware reports
   * Spam and phishing reports
   * Publications
   * Kaspersky Security Bulletin
 * Archive
 * All Tags
 * APT Logbook
 * Webinars
 * Statistics
 * Encyclopedia
 * Threats descriptions
 * KSB 2021
 * 
 * About Us
   * Company
   * Transparency
   * Corporate News
   * Press Center
   * Careers
   * Sponsorships
   * Policy Blog
   * Contacts
 * Partners
   * Find a Partner
   * Partner Program


Content menu Close

Subscribe

by Kaspersky
Dark mode off

Threats

Threats

 * APT (Targeted attacks)
 * Secure environment (IoT)
 * Mobile threats
 * Financial threats
 * Spam and phishing
 * Industrial threats
 * Web threats
 * Vulnerabilities and exploits

Categories

Categories

 * APT reports
 * Malware descriptions
 * Security Bulletin
 * Malware reports
 * Spam and phishing reports
 * Security technologies
 * Research
 * Publications

Other sections

 * Archive
 * All tags
 * Webinars
 * APT Logbook
 * Statistics
 * Encyclopedia
 * Threats descriptions
 * KSB 2022

APT reports


CLOUDWIZARD APT: THE BAD MAGIC STORY GOES ON

APT reports

19 May 2023

11 minute read

Table of Contents

 * Initial findings
 * Digging into the orchestrator
 * Encryption and communication
 * Module arsenal
 * Back to 2017
 * Attribution magic
 * So what?
 * Indicators of compromise

Authors

 * Leonid Bezvershenko
 * Georgy Kucherin
 * Igor Kuznetsov

In March 2023, we uncovered a previously unknown APT campaign in the region of
the Russo-Ukrainian conflict that involved the use of PowerMagic and CommonMagic
implants. However, at the time it was not clear which threat actor was behind
the attack. Since the release of our report about CommonMagic, we have been
looking for additional clues that would allow us to learn more about this actor.
As we expected, we have been able to gain a deeper insight into the “bad magic”
story.

While looking for implants bearing similarities with PowerMagic and CommonMagic,
we identified a cluster of even more sophisticated malicious activities
originating from the same threat actor. What was most interesting about it is
that its victims were located not only in the Donetsk, Lugansk and Crimea
regions, but also in central and western Ukraine. Targets included individuals,
as well as diplomatic and research organizations. The newly discovered campaign
involved using a modular framework we dubbed CloudWizard. Its features include
taking screenshots, microphone recording, keylogging and more.

Over the years, the infosec community has discovered multiple APTs operating in
the Russo-Ukrainian conflict region – Gamaredon, CloudAtlas, BlackEnergy and
many others. Some of these APTs have long been forgotten in the past – such as
Prikormka (Operation Groundbait), discovered by ESET in 2016. While there have
been no updates about Prikormka or Operation Groundbait for a few years now, we
discovered multiple similarities between the malware used in that campaign,
CommonMagic and CloudWizard. Upon further investigation, we found that
CloudWizard has a rich and interesting history that we decided to dig into.


INITIAL FINDINGS

Our investigation started with telemetry data coming from an active infection,
with malware running as a suspicious Windows service named “syncobjsup”. This
service was controlled by a DLL with an equally suspicious path
“C:\ProgramData\Apparition Storage\syncobjsup.dll”. Upon execution, we found
this DLL to decrypt data from the file mods.lrc that is located in the same
directory as the DLL. The cipher used for decryption was RC5, with the key 88 6A
3F 24 D3 08 A3 85 E6 21 28 45 77 13 D0 38. However, decryption of the file with
the standard RC5 implementation yielded only junk data. A closer look into the
RC5 implementation in the sample revealed that it was faulty:

for (i = 0; i < 4; i += 2) { A = buf[i]; B = buf[i + 1]; for (j = 12; j > 0;
--j) { v2 = rotate_right(B - S[2 * i + 1], A); B = A ^ v2; A ^= v2 ^
rotate_right(A - S[2 * i], A ^ v2); } }
1
2
3
4
5
6
7
8
9
10
11
for (i = 0; i < 4; i += 2)
{
    A = buf[i];
    B = buf[i + 1];
    for (j = 12; j > 0; --j)
    {
        v2 = rotate_right(B - S[2 * i + 1], A);
        B = A ^ v2;
        A ^= v2 ^ rotate_right(A - S[2 * i], A ^ v2);
    }
}

The bug is in the inner loop: it uses the variable i instead of j.

A search for this incorrect implementation revealed a GitHub gist of the code
that has been likely borrowed by the implant’s developers. In the comments to
this gist, GitHub users highlight the error:



What is also interesting is that the key from the gist is the same as the one
used in the syncobjsup.dll library.

The decrypted file looked to us like a virtual file system (VFS), containing
multiple executables and their JSON-encoded configurations:



Each entry in this VFS contains magic bytes (‘CiCi’), a ROR6 hash of the entry
name, as well as the entry size and contents.

Inside mods.lrc, we found:

 * Three DLLs (with export table names Main.dll, Crypton.dll and Internet.dll);
 * A JSON configuration of these DLLs.

The syncobjsup.dll DLL iterates over VFS entries, looking for an entry with the
name “Main” (ROR6 hash: 0xAA23406F). This entry contains CloudWizard’s Main.dll
orchestrator library, which is reflectively loaded and launched by invoking its
SvcEntry export.


DIGGING INTO THE ORCHESTRATOR



Upon launching, the orchestrator spawns a suspended WmiPrvSE.exe process and
injects itself into it. From the WmiPrvSE.exe process, it makes a backup of the
VFS file, copying mods.lrc to mods.lrs. It then parses mods.lrs to obtain all
the framework module DLLs and their configurations. As mentioned above,
configurations are JSON files with dictionary objects:

{ "Screenshot": { "type": "3", "intervalSec": "4", "numberPack": "24",
"winTitle": [ "SKYPE", "VIBER" ] }, "Keylogger": { "bufSize": "100" },
"Microphone": { "intervalSec": "500", "acousticStart": "1" } }
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
{
    "Screenshot": {
        "type": "3",
        "intervalSec": "4",
        "numberPack": "24",
        "winTitle": [
            "SKYPE",
            "VIBER"
        ]
    },
    "Keylogger": {
        "bufSize": "100"
    },
    "Microphone": {
        "intervalSec": "500",
        "acousticStart": "1"
    }
}

The orchestrator itself contains a configuration with parameters such as:

 * Victim ID (e.g., 03072020DD);
 * Framework version (latest observed version is 5.0);
 * Interval between two consecutive heartbeats.

After launching modules, the orchestrator starts communicating with the
attackers by sending heartbeat messages. Each heartbeat is a JSON file with
victim information and a list of loaded modules:

{ "name": "<victim_id>", "romoID": "2", "bitOS": "64", "version": "5.0",
"serial": "<infection_timestamp>", "keyID": "<key_id>", "ip": "0.0.0.0",
"state": [ "Main","Crypton","Internet","Screenshot", "USB","Keylogger","Gmail"
], "state2": [ {"Module": "Main","time_mode": "2","Version": "4.7"}, {"Module":
"Crypton","time_mode": "2","Version": "1.0"}, {"Module": "Internet","time_mode":
"2","Version": "0.07"}, {"Module": "Screenshot","time_mode": "2","Version":
"0.01"}, {"Module": "USB","time_mode": "2","Version": "0.01"}, {"Module":
"Keylogger","time_mode": "2","Version": "0.01"}, {"Module": "Gmail","time_mode":
"2","Version": "0.06"} ] }
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
{
      "name": "<victim_id>",
"romoID": "2",
"bitOS": "64",
"version": "5.0",
"serial": "<infection_timestamp>",
"keyID": "<key_id>",
"ip": "0.0.0.0",
"state": [
"Main","Crypton","Internet","Screenshot",
"USB","Keylogger","Gmail"
],
"state2": [
     {"Module": "Main","time_mode": "2","Version": "4.7"},
     {"Module": "Crypton","time_mode": "2","Version": "1.0"},
     {"Module": "Internet","time_mode": "2","Version": "0.07"},
     {"Module": "Screenshot","time_mode": "2","Version": "0.01"},
     {"Module": "USB","time_mode": "2","Version": "0.01"},
     {"Module": "Keylogger","time_mode": "2","Version": "0.01"},
     {"Module": "Gmail","time_mode": "2","Version": "0.06"}
]
}      

This JSON string is encrypted with the cryptography module (Crypton.dll from the
VFS) and sent to the attackers with the internet communication module
(Internet.dll).

In response to the heartbeats, the orchestrator receives commands allowing it to
perform module management: install, start, stop, delete modules or change their
configurations. Each command contains magic bytes (DE AD BE EF) and a JSON
string (e.g., {“Delete”: [“Keylogger”, “Screenshot”]}), optionally followed by a
module DLL file.




ENCRYPTION AND COMMUNICATION

As we have mentioned above, two modules (Crypton.dll and Internet.dll) are
bundled with every installation of the CloudWizard framework. The Crypton module
performs encryption and decryption of all communications. It uses two encryption
algorithms:

 * Heartbeat messages and commands are encrypted with AES (the key is specified
   in the JSON configuration VFS file)
 * Other data (e.g., module execution results) is encrypted with a combination
   of AES and RSA. First, the data is encrypted with a generated pseudorandom
   AES session key, and then the AES key is encrypted with RSA.

if ( buffers->results.lenstr && buffers->results.str ) { v10 =
RSA_Encrypt(AES_KEY, 32, &v8, &v7, pubKey, pubKeySize); if (v10) { free(v8);
return v10; } v10 = AES_Encrypt(buffers->results.str, buffers->results.lenstr,
&v4, &v6, AES_KEY); if (v10) goto LABEL_11; } if (buffers->state.lenstr &&
buffers->state.str) { v10 = AES_Encrypt(buffers->state.str,
buffers->state.lenstr, &v3, &v5, phpKey); if (v10) goto LABEL_11; }
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
if ( buffers->results.lenstr && buffers->results.str ) {
v10 = RSA_Encrypt(AES_KEY, 32, &v8, &v7, pubKey, pubKeySize);
if (v10) {
   free(v8);
   return v10;
}
v10 = AES_Encrypt(buffers->results.str,
                        buffers->results.lenstr,
                        &v4, &v6, AES_KEY);
if (v10)
   goto LABEL_11;
}
if (buffers->state.lenstr && buffers->state.str) {
   v10 = AES_Encrypt(buffers->state.str,  
                        buffers->state.lenstr,
                        &v3, &v5, phpKey);
   if (v10)
     goto LABEL_11;
}

The internet connection module relays the encrypted data to the malware
operators. It supports four different communication types:



 * Cloud storages: OneDrive, Dropbox, Google Drive
 * Web-based C2 server

The primary cloud storage is OneDrive, while Dropbox and Google Drive are used
if OneDrive becomes inaccessible. The module’s configuration includes OAuth
tokens required for cloud storage authentication.

As for the web server endpoint, it is used when the module can’t access any of
the three cloud storages. To interact with it, it makes a GET request to the URL
specified in its configuration, getting new commands in response. These commands
likely include new cloud storage tokens.

While examining the strings of the network module, we found a string containing
the directory name from the developer’s machine:
D:\Projects\Work_2020\Soft_Version_5\Refactoring.


MODULE ARSENAL

Information gathering is performed through auxiliary DLL modules that have the
following exported functions:

Export function Description Start Starts the module Stop Stops the module Whoami
Returns JSON-object with information about module
(e.g., {“Module”:”Keylogger “,”time_mode”:”2″,”Version”:”0.01″}).
The time_mode value indicates whether the module is persistent (1 – no, 2 –
yes). GetResult Returns results of module execution (e.g. collected screenshots,
microphone recordings, etc.). Most modules return results in the form of ZIP
archives (that are stored in memory) GetSettings Returns module configuration

Modules can persist upon reboot (in this case they are saved in the mods.lrs VFS
file) or executed in memory until the machine is shut down or the module is
deleted by the operator.

In total, we found nine auxiliary modules performing different malicious
activities such as file gathering, keylogging, taking screenshots, recording the
microphone and stealing passwords.

The module that looked most interesting to us is the one that performs email
exfiltration from Gmail accounts. In order to steal, it reads Gmail cookies from
browser databases. Then, it uses the obtained cookies to access the Gmail web
interface in legacy mode by making a GET request to 
https://mail.google.com/mail/u/<account ID>/?ui=html&zy=h. When legacy mode is
accessed for the first time, Gmail prompts the user to confirm whether they
really wants to switch to legacy mode, sending the following webpage in
response:



If the module receives such a prompt, it simulates a click on the “I’d like to
use HTML Gmail” button by making a POST request to a URL from the prompt’s HTML
code.



Having obtained access to the legacy web client, the module exfiltrates activity
logs, the contact list and all the email messages.
What’s also interesting is that the code for this module was partially borrowed
from the leaked Hacking Team source code.


BACK TO 2017

After obtaining the CloudWizard’s orchestrator and its modules, we were still
missing one part of the infection chain: the framework installer. While
searching through older telemetry data, we were able to identify multiple
installers that were used from 2017 to 2020. The version of the implant
installed at that time was 4.0 (as we wrote above, the most recent version we
observed is 5.0).

The uncovered installer is built with NSIS. When launched, it drops three files:

 * C:\ProgramData\Microsoft\WwanSvc\WinSubSvc.exe
 * C:\ProgramData\Microsoft\MF\Depending.GRL (in other versions of the
   installer, this file is also placed under
   C:\ProgramData\Microsoft\MF\etwdrv.dll)
 * C:\ProgramData\System\Vault\etwupd.dfg

Afterwards, it creates a service called “Windows Subsystem Service” that is
configured to run the WinSubSvc.exe binary on every startup.

It is worth noting that the installer displays a message with the text “Well
done!” after infection:



This may indicate that the installer we discovered is used to deploy CloudWizard
via physical access to target machines, or that the installer attempts to mimic
a Network Settings (as displayed in the window title) configurator.

The old (4.0) and new (5.0) CloudWizard versions have major differences, as
outlined in the table below:

Version 4.0 Version 5.0 Network communication and cryptography modules are
contained within the main module Network communication and cryptography modules
are separate from each other Framework source file compilation directory:
D:\Projects\Work_2020\Soft_Version_4\Service Framework source file compilation
directory:  D:\Projects\Work_2020\Soft_Version_5\Refactoring Uses RC5
(hard-coded key: 7Ni9VnCs976Y5U4j) from the RC5Simple library for C2 server
traffic encryption and decryption Uses RSA and AES for C2 server traffic
encryption and decryption (the keys are specified in a configuration file)


ATTRIBUTION MAGIC

After spending considerable time researching CloudWizard, we decided to look for
clues that would allow us to attribute it to an already known actor. CloudWizard
reminded us of two campaigns observed in Ukraine and reported in public:
Operation Groundbait and Operation BugDrop. Operation Groundbait was first
described by ESET in 2016, with the first implants observed in 2008. While
investigating Operation Groundbait, ESET uncovered the Prikormka malware, which
is  “the first publicly known Ukrainian malware that is being used in targeted
attacks”. According to ESET’s report, the threat actors behind Operation
Groundbait “most likely operate from within Ukraine”.

As for Operation BugDrop, it is a campaign discovered by CyberX in 2017. In
their report, CyberX claims (without providing strong evidence) that Operation
BugDrop has similarities with Operation Groundbait. And indeed, we have
discovered evidence confirming this:

 * Prikormka USB DOCS_STEALER module (MD5:
   7275A6ED8EE314600A9B93038876F853B957B316) contains the PDB path
   D:\My\Projects_All\2015\wallex\iomus1_gz\Release\iomus.pdb;
 * BugDrop USB stealer module (MD5: a2c27e73bc5dec88884e9c165e9372c9) contains
   the PDB path D:\My\Projects_All\2016\iomus0_gz\Release\usdlg.pdb.

The following facts allow us to conclude with medium to high confidence that the
CloudWizard framework is operated by the actor behind Operation Groundbait and
Operation BugDrop:

 * ESET researchers found the loader of CloudWizard version 4.0 dll (with the
   export name LCrPsdNew.dll) to be similar to a Prikormka DLL. The similarity
   between these two files has been noted in the Virus Bulletin 2019 talk ‘Rich
   headers: leveraging the mysterious artifact of the PE format’ (slide 42)
   
   
   
   Slide 42 of the VB2019 ‘Rich headers: leveraging the mysterious artifact of
   the PE format’ talk

 * ESET detects a loader of a CloudWizard v. 4 sample (MD5:
   406494bf3cabbd34ff56dcbeec46f5d6, PDB path:
   D:\Projects\Work_2017\Service\Interactive Service_system\Release\Service.pdb)
   as Win32/Prikormka.CQ.
 * According to our telemetry data, multiple infections with the Prikormka
   malware ended with a subsequent infection with the CloudWizard framework
 * Implementation of several modules of CloudWizard resembles the corresponding
   one from the Prikormka and BugDrop modules, though rewritten from C to C++:
   * USB stealer modules retrieve the serial numbers and product IDs of
     connected USB devices via the IOCTL_STORAGE_QUERY_PROPERTY system call. The
     default fallback value in case of failure is the same, “undef”.
     
     
     
     Retrieval of USB device serial number and product ID in BugDrop (MD5:
     F8BDE730EA3843441A657A103E90985E)
     
     
     
     Retrieval of USB device serial number and product ID in CloudWizard (MD5:
     39B01A6A025F672085835BD699762AEC)
     
     
     
     Assignment of the ‘undef’ string in BugDrop (left) and CloudWizard (right)
     in the samples above
   
   * The modules for taking screenshots use the same list of window names that
     trigger an increase in the frequency of screenshot taking: ‘Skype’ and
     ‘Viber’. CloudWizard and Prikormka share the same default value for the
     screenshot taking interval (15 minutes).
     
     
     
     Comparison of the window title text in Prikormka (MD5:
     16793D6C3F2D56708E5FC68C883805B5)
     
     
     
     Addition of the ‘SKYPE’ and ‘VIBER’ string to a set of window titles in
     CloudWizard (MD5: 26E55D10020FBC75D80589C081782EA2)
   
   * The file listing modules in both Prikormka and CloudWizard samples have the
     same name: Tree. They also use the same format string for directory
     listings: “\t\t\t\t\t(%2.2u,%2.2u.%2.2u.%2.2u)\n”.
     
     
     
     
     
     Use of the same format string for directory listings in Prikormka (above,
     MD5: EB56F9F7692F933BEE9660DFDFABAE3A) and CloudWizard (below, MD5:
     BFF64B896B5253B5870FE61221D9934D)
   
   * Microphone modules record sound in the same way: first making a WAV
     recording using Windows Multimedia API and then converting it to MP3 using
     the LAME library. While this pattern is common in malware, the strings used
     to specify settings for the LAME library are specific: 8000 Hz and 16 Kbps.
     Both Prikormka and CloudWizard modules extract integers from these strings,
     using them in the LAME library.
   * A similar order of extensions is used in extension lists found in Prikormka
     and CloudWizard modules:
     
     
     
     
     Extension lists in Prikormka (left, MD5: EB56F9F7692F933BEE9660DFDFABAE3A)
     and CloudWizard (right, MD5: BFF64B896B5253B5870FE61221D9934D)
 * In Prikormka, the names of files to be uploaded to the C2 server have the
   name format mm.yy_hh.mm.ss.<extension>. In CloudWizard, the files have the
   name format dd.mm.yyyy_hh.mm.ss.ms.dat. The date substituted into the name
   format strings is retrieved from the GetLocalTime API function.
 * The C2 servers of both Prikormka and CloudWizard are hosted by Ukrainian
   hosting services. Additionally, there are similarities between BugDrop and
   CloudWizard in terms of exfiltrating files to the Dropbox cloud storage.
 * Victims of Prikormka, BugDrop and CloudWizard are located in western and
   central Ukraine, as well as the area of conflict in Eastern Europe.

As for the similarities between CloudWizard and CommonMagic, they are as
follows:

 * The code that performs communication with OneDrive is identical in both
   frameworks. We did not find this code to be part of any open-source library.
   This code uses the same user agent: “Mozilla/5.0 (Windows NT 10.0)
   AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36
   Edge/12.10136”.



The same strings in the internet communication module of CloudWizard (left, MD5:
84BDB1DC4B037F9A46C001764C115A32) and CommonMagic (right, MD5:
7C0E5627FD25C40374BC22035D3FADD8)

 * Both frameworks, CloudWizard (version 4) and CommonMagic use the RC5Simple
   library for encryption. Files encrypted with RC5Simple start with a 7-byte
   header, which is set to ‘RC5SIMP’ in the library source code. However, this
   value has been changed in the malicious implants: DUREX43 in CloudWizard and
   Hwo7X8p in CommonMagic. Additionally, CloudWizard and CommonMagic use the
   RapidJSON library for parsing JSON objects.
 * Names of files uploaded to the C2 server in CommonMagic have the format mm.dd
   _hh.mm.ss.ms.dat (in CloudWizard, the name format is
   dd.mm.yyyy_hh.mm.ss.ms.dat).
 * Victim IDs extracted from CloudWizard and CommonMagic samples are similar:
   they contain a date followed by the two same letters, e.g. 03072020DD,
   05082020BB in CloudWizard and WorkObj20220729FF in CommonMagic.
 * Victims of CommonMagic and CloudWizard are located in the area of conflict in
   Eastern Europe.




SO WHAT?

We initiated our investigation back in 2022, starting with simple malicious
PowerShell scripts deployed by an unknown actor and ended up discovering and
attributing two large related modular frameworks: CommonMagic and CloudWizard.
As our research demonstrates, their origins date back to 2008, the year the
first Prikormka samples were discovered. Since 2017, there have been no traces
of Groundbait and BugDrop operations. However, the actor behind these two
operations has not ceased their activity, and has continued developing their
cyberespionage toolset and infecting targets of interest for more than 15 years.




INDICATORS OF COMPROMISE

NSIS installer

MD5 0edd23bbea61467f144d14df2a5a043e
SHA256 177f1216b55058e30a3ce319dc1c7a9b1e1579ea3d009ba965b18f795c1071a4

Loader (syncobjsup.dll)

MD5 a2050f83ba2aa1c4c95567a5ee155dca
SHA256 041e4dcdc0c7eea5740a65c3a15b51ed0e1f0ebd6ba820e2c4cd8fa34fb891a2

Orchestrator (Main.dll)

MD5 0ca329fe3d99acfaf209cea559994608
SHA256 11012717a77fe491d91174969486fbaa3d3e2ec7c8d543f9572809b5cf0f2119

Domains and IPs

91.228.147[.]23
curveroad[.]com

 * APT
 * Backdoor
 * Cloud services
 * CloudWizard
 * CommonMagic
 * Malware
 * Malware Descriptions
 * Malware Technologies
 * Targeted attacks

Authors

 * Leonid Bezvershenko
 * Georgy Kucherin
 * Igor Kuznetsov

CloudWizard APT: the bad magic story goes on

Your email address will not be published. Required fields are marked *



Name *

Email *

 

Cancel



Δ

Table of Contents

 * Initial findings
 * Digging into the orchestrator
 * Encryption and communication
 * Module arsenal
 * Back to 2017
 * Attribution magic
 * So what?
 * Indicators of compromise

GReAT webinars

13 May 2021, 1:00pm


GREAT IDEAS. BALALAIKA EDITION

 * Boris Larin
 * Denis Legezo

26 Feb 2021, 12:00pm


GREAT IDEAS. GREEN TEA EDITION

 * John Hultquist
 * Brian Bartholomew
 * Suguru Ishimaru
 * Vitaly Kamluk
 * Seongsu Park
 * Yusuke Niwa
 * Motohiko Sato

17 Jun 2020, 1:00pm


GREAT IDEAS. POWERED BY SAS: MALWARE ATTRIBUTION AND NEXT-GEN IOT HONEYPOTS

 * Marco Preuss
 * Denis Legezo
 * Costin Raiu
 * Kurt Baumgartner
 * Dan Demeter
 * Yaroslav Shmelev

26 Aug 2020, 2:00pm


GREAT IDEAS. POWERED BY SAS: THREAT ACTORS ADVANCE ON NEW FRONTS

 * Ivan Kwiatkowski
 * Maher Yamout
 * Noushin Shabab
 * Pierre Delcher
 * Félix Aime
 * Giampaolo Dedola
 * Santiago Pontiroli

22 Jul 2020, 2:00pm


GREAT IDEAS. POWERED BY SAS: THREAT HUNTING AND NEW TECHNIQUES

 * Dmitry Bestuzhev
 * Costin Raiu
 * Pierre Delcher
 * Brian Bartholomew
 * Boris Larin
 * Ariel Jungheit
 * Fabio Assolini

From the same authors


NOT JUST AN INFOSTEALER: GOPURAM BACKDOOR DEPLOYED THROUGH 3CX SUPPLY CHAIN
ATTACK


BAD MAGIC: NEW APT FOUND IN THE AREA OF RUSSO-UKRAINIAN CONFLICT


HOW TO TRAIN YOUR GHIDRA


ONIONPOISON: INFECTED TOR BROWSER INSTALLER DISTRIBUTED THROUGH POPULAR YOUTUBE
CHANNEL


TWO MORE MALICIOUS PYTHON PACKAGES IN THE PYPI

SUBSCRIBE TO OUR WEEKLY E-MAILS

The hottest research right in your inbox

 * Email
 * 
 * *
    * I agree to provide my email address to “AO Kaspersky Lab” to receive
      information about new posts on the site. I understand that I can withdraw
      this consent at any time via e-mail by clicking the “unsubscribe” link
      that I find at the bottom of any e-mail sent to me for the purposes
      mentioned above.

Subscribe

Δ

In the same category


APT TRENDS REPORT Q1 2023


TOMIRIS CALLED, THEY WANT THEIR TURLA MALWARE BACK


FOLLOWING THE LAZARUS GROUP BY TRACKING DEATHNOTE CAMPAIGN


NOT JUST AN INFOSTEALER: GOPURAM BACKDOOR DEPLOYED THROUGH 3CX SUPPLY CHAIN
ATTACK


BAD MAGIC: NEW APT FOUND IN THE AREA OF RUSSO-UKRAINIAN CONFLICT





LATEST POSTS

Publications


NEW RANSOMWARE TRENDS IN 2023

 * GReAT

Malware descriptions


NOT QUITE AN EASTER EGG: A NEW FAMILY OF TROJAN SUBSCRIBERS ON GOOGLE PLAY

 * Dmitry Kalinin

SOC, TI and IR posts


MANAGED DETECTION AND RESPONSE IN 2022

 * Kaspersky Security Services

Research


WHAT DOES CHATGPT KNOW ABOUT PHISHING?

 * Vladislav Tushkanov

LATEST WEBINARS

Cyberthreat talks

28 Mar 2023, 5:00pm 60 min


CRYPTOCURRENCY THREAT LANDSCAPE TRENDS IN 2023

 * Vitaly Kamluk
 * Dan Demeter

Cyberthreat talks

22 Mar 2023, 5:00pm 40 min


RANSOMWARE GROUPS NEGOTIATION TACTICS: WHAT YOU NEED TO KNOW

 * Marc Rivero

Technologies and services

15 Feb 2023, 5:00pm 80 min


CHATGPT – GOOD OR EVIL? AI IMPACT ON CYBERSECURITY

 * Vladislav Tushkanov
 * Maher Yamout
 * Victor Sergeev

Cyberthreat talks

07 Feb 2023, 5:00pm 75 min


CRIMEWARE AND FINANCIAL PREDICTIONS FOR 2023

 * Marc Rivero
 * Dan Demeter
 * Dmitry Galov

REPORTS


CLOUDWIZARD APT: THE BAD MAGIC STORY GOES ON

Kaspersky analysis of the CloudWizard APT framework used in a campaign in the
region of the Russo-Ukrainian conflict.


APT TRENDS REPORT Q1 2023

For more than five years, the Global Research and Analysis Team (GReAT) at
Kaspersky has been publishing quarterly summaries of advanced persistent threat
(APT) activity. These summaries are based on our threat intelligence research;
and they provide a representative snapshot of what we have published and
discussed in greater detail in our private APT reports.


TOMIRIS CALLED, THEY WANT THEIR TURLA MALWARE BACK

We continued to track Tomiris as a separate threat actor over three new attack
campaigns between 2021 and 2023, and our telemetry allowed us to shed light on
the group. In this blog post, we’re excited to share what we now know of Tomiris
with the broader community, and discuss further evidence of a possible
connection to Turla.


FOLLOWING THE LAZARUS GROUP BY TRACKING DEATHNOTE CAMPAIGN

The Lazarus group is a high-profile Korean-speaking threat actor with multiple
sub-campaigns. In this blog, we’ll focus on an active cluster that we dubbed
DeathNote.



SUBSCRIBE TO OUR WEEKLY E-MAILS

The hottest research right in your inbox

 * Email*
   
 * 
 * *
    * I agree to provide my email address to “AO Kaspersky Lab” to receive
      information about new posts on the site. I understand that I can withdraw
      this consent at any time via e-mail by clicking the “unsubscribe” link
      that I find at the bottom of any e-mail sent to me for the purposes
      mentioned above.

Subscribe

Δ



Threats

Threats

 * APT (Targeted attacks)
 * Secure environment (IoT)
 * Mobile threats
 * Financial threats
 * Spam and phishing
 * Industrial threats
 * Web threats
 * Vulnerabilities and exploits

Categories

Categories

 * APT reports
 * Malware descriptions
 * Security Bulletin
 * Malware reports
 * Spam and phishing reports
 * Security technologies
 * Research
 * Publications

Other sections

 * Archive
 * All tags
 * Webinars
 * APT Logbook
 * Statistics
 * Encyclopedia
 * Threats descriptions
 * KSB 2022



© 2023 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective
owners.

 * Privacy Policy
 * License Agreement
 * Cookies

SUBSCRIBE TO OUR WEEKLY E-MAILS

The hottest research right in your inbox

 * Email
 * 
 * *
    * I agree to provide my email address to “AO Kaspersky Lab” to receive
      information about new posts on the site. I understand that I can withdraw
      this consent at any time via e-mail by clicking the “unsubscribe” link
      that I find at the bottom of any e-mail sent to me for the purposes
      mentioned above.

Subscribe

Δ

Notifications