When compared to Q3 2020, the total number of Distributed Denial of Service (DDoS) attacks increased by nearly 24%, while the total number of smart attacks (advanced DDoS attacks that are often targeted) increased by 31% when compared to the same period last year. Some of the most notable targets were tools to fight the pandemic, government organizations, game developers, and well-known cybersecurity publications.
Kaspersky researchers have discovered an advanced Trojan, dubbed the BloodyStealer, sold on darknet forums and used to steal gamers’ accounts on popular gaming platforms such as Steam, Epic Games Store, and EA Origin. With features to avoid analysis and detection, a low subscription price, and some interesting capabilities, BloodyStealer is a prime example of the type of threat online gamers face. This, alongside an overview of the game-related products stolen and sold on the darknet, can be found in Kaspersky’s latest report on game-related data threats.
The number of users attacked with QakBot – a powerful banking Trojan, in the first seven months of 2021 grew by 65% in comparison to the same period in 2020 and reached 17,316 users worldwide, demonstrating that this threat is increasingly affecting internet users.
Kaspersky has achieved ‘Champion’ status, for the second consecutive year, in the 2021 Cybersecurity Leadership Matrix by Canalys, a renowned global technology market analyst firm with a distinct channel focus.
No More Ransom – the initiative started in 2016 by law enforcement and IT security companies to help victims of ransomware restore their files – turns five today. The anniversary is marked by more than 900 million US dollars of illegal profit prevented, and more than 6 million people downloading free decryption tools.
Kaspersky’s international study on dating and the impact of technology on relationships has found that the majority of users positively perceive the role of smart algorithms in dating services – 44% would trust the matchmaking choice of AI, and 64% noted that the recommendations of the algorithms fully correspond to their preferences.