National Computer Emergency Response Team has been established in Kazakhstan (KZ-CERT):
- monitoring and detection of internet resources violationg law of the Republic of Kazakhstan;
- elaboration of propositions and recommendations on guarding the interests of person, society and state in information space;
- provide information security consulting services;
- fast and thorough gathering of information about cyber attacks or other suspicious activities.
- coordination of public and telecommunication operators’ cyber security units and other actors of national information infrastructure in the issues regarding prevention of violations in information and communication technologies;
- collection, analysis and storing information concerning existing threats to cybersecurity and effectiveness of implemented security measures
23 April 2014
Q1 2014 sees surge in reflection-based DDoS attacks
In Q1 2014, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification techniques. Instead of using a network of zombie computers, the newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. We believe this approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.
New reflection and amplification attack tools can deliver a powerful punch. Q1 saw a 39 percent increase...
21 April 2014
Trojan-SMS.AndroidOS.Stealer.a Is One of the Most Widespread Mobile Trojans
Kaspersky Labs experts have revealed that, in the first quarter of 2014, Trojan-SMS.AndroidOS.Stealer.a accounted for almost a quarter of attempted infections on Android devices which have the company’s security solutions installed on them. Most of the infections have been spotted in Russia, but researchers have determined that Trojan-SMS.AndroidOS.Stealer.a is capable of targeting users from numerous countries, including Belgium, France, Latvia, Lithuania, Ukraine, Belarus,...
18 April 2014
Win32/RBrute attacks Facebook and Google users
Security researchers from ESET detected the new component of notorious Win32/Sality, which was first seen at the end of October 2013. Unlike the other known elements of botnet it hijack the primary DNS address of routers.
In the first part of an attack, a component detected by ESET as Win32/RBrute.A scans the Web for various router models. The list includes D-Link, Cisco, Huawei, ZTE and TP-Link routers. Most targeted models are from TP-Link.
When one of these routers is identified, the...