The investigation of the attack technique is still ongoing, but so far Kaspersky researchers were able to identify the general infection sequence. Further, the spyware quietly transmitted private information to remote servers: including microphone recordings, photos from instant messengers, geolocation and data about a number of other activities of the owner of the infected device.
Β
Β
During the analysis, it was confirmed that there was no impact on the companyβs products, technologies and services, and no Kaspersky customer user data or critical company processes were affected. The attackers could only access data stored on the infected devices. Although not certain, it is believed that the attack was not targeted specifically at Kaspersky β the company is just the first to discover it. The following days will likely bring more clarity about the global exposure of this cyberattack.
βWhen it comes to cybersecurity, even the most secure operating systems can be compromised. As APT actors are constantly evolving their tactics and searching for new weaknesses to exploit, businesses must prioritise security of their systems.
Sign in to leave a comment.