Vasily Kolesnikov's profile photo

Vasily Kolesnikov

Featured in:

Articles

  • Oct 26, 2023 | securelist.com | Sergey Belov |Vilen Kamalov |Sergey Lozhkin |Vasily Kolesnikov

    IntroductionIt’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. It comes equipped with a built-in TOR network tunnel for communication with command servers, along with update and delivery functionality through trusted services such as GitLab, GitHub, and Bitbucket, all using custom encrypted archives.

  • Oct 19, 2023 | securelist.com | Vladislav Tushkanov |Anna Larkina |Giampaolo Dedola |Vasily Kolesnikov

    In April of this year, the FBI published an advisory on attacks targeting government, law enforcement, and non-profit organizations. Attackers download scripts onto victims’ devices, delivering several types of malware all at once. The main aim is to utilize company resources for mining, steal data using keyloggers, and gain backdoor access to systems. According to our telemetry data, we have detected numerous scripts, executables, and associated links under this campaign since late 2022.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →