In Kazakhstan National Computer Emergency Response Team (KZ-CERT) was founded in 2011.
- monitoring and detection of internet resources violationg law of the Republic of Kazakhstan;
- elaboration of propositions and recommendations on guarding the interests of person, society and state in information space;
- provide information security consulting services;
- fast and thorough gathering of information about cyber attacks or other suspicious activities.
- coordination of public and telecommunication operators’ cyber security units and other actors of national information infrastructure in the issues regarding prevention of violations in information and communication technologies;
- collection, analysis and storing information concerning existing threats to cybersecurity and effectiveness of implemented security measures
29 January 2015
The source code of the Trojan RAT-Njw0rm used to create new malware
According to the researchers Trend Micro, malware developers use source code RAT-Trojan Njw0rm to create new malicious programs that can give an attacker full access to the PC victims.
Njw0rm represents the modified version of the RAT-Trojan njRAT. In July 2014 Microsoft specialists conducted an operation aimed at neutralization both versions of malicious programs. Even then they said that cybercriminals are free to create their own version of this malicious software, because the necessary...
27 January 2015
KZ-CERT enters to the Organization of Islamic Countries – Computer Emergency Response Team (OIC-CERT)
In January 26, 2015 Kazakhstan Computer Emergency Response Team (KZ-CERT) enters to the Organization of Islamic Countries – Computer Emergency Response Team (OIC-CERT) as a national response team.
The membership in OIC-CERT gives the possibility to develop tight cooperation with the computer emergency response teams of following countries: Azerbaijan, Bangladesh, Brunei, Egypt, Indonesia, Iran, Jordanian, Livia, Malaysia, Morocco, Nigeria, Oman, Saudi Arabia, Pakistan, Sudan, Syria,...
26 January 2015
New self-propagating ransomware is detected
Experts of international antivirus company ESET detected new type of ransomware with unique infection technique – Win32/Virlock.
Win32/Virlock is a new type of ransomware that not only locks the screen and encrypts existing files, but it also behaves as a polymorphic parasitic virus that infects files on the user’s machine.
Win32/Virlock looks for host files of most popular formats: .exe, .doc, .xls, .zip, .rar, .pdf, .ppt, .mp3, .png, .gif, .jpg etc. Virlock compromises files...