• HomeAbout usArticlesTRU EventsAcronis.com

TRU Security

Updates from Acronis Threat Research Unit

HomeAbout usArticlesTRU EventsAcronis.com
TRU Security
All articles
All articles
Follow us on
  • facebook
  • twitter
  • yt
  • linkedin
  • spiceworks
  • reddit
  • rss
Filter news by
Product
  • All
  • Acronis Cyber Backup
  • Acronis Snap Deploy
  • Acronis Files Connect
  • Acronis Disk Director Business
  • Acronis True Image 2021
  • Acronis Cyber Cloud
  • Acronis Cyber Infrastructure
  • Acronis Backup Advanced for vCloud
  • Acronis Monitoring Service
  • Acronis Cyber Cloud for Enterprise
  • Acronis VSS Doctor
  • Acronis Cyber Disaster Recovery
  • Acronis Disk Director
  • Acronis Cyber Notary Cloud
  • Acronis Revive
  • Acronis MassTransit
  • Acronis Cyber Files Cloud
  • Acronis Cyber Cloud Storage
  • Acronis Cyber Backup Cloud
  • Acronis Cyber Disaster Recovery Cloud
  • Acronis Cloud Manager
  • Acronis Cyber Files
  • Acronis Cloud Security
  • Acronis #CyberFit Score
  • Acronis Service Providers
  • Acronis Cloud Migration
  • Acronis AnyData Engine
  • Acronis Professional Services
  • Acronis Cyber Protect Cloud
  • Acronis Cyber Appliance
  • Acronis Cyber Protect
  • Acronis DeviceLock DLP
  • Acronis Ransomware Protection
  • Acronis Detection and Response
  • Acronis True Image
  • Acronis Cyber Protect Connect
  • Acronis Compliance Navigator
  • Acronis True Image for Home
  • Acronis Cyber Protect for Enterprise
  • Acronis Cyber Protect Home & Business
  • Acronis Cyber Protect Home & Business
  • Acronis Cyber Protect for OT
  • No data
Year
  • All
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • No data
Month
  • All
  • January
  • February
  • March
  • April
  • May
  • June
  • July
  • August
  • September
  • October
  • November
  • December
  • No data
Search by tag
Cybersecurity
Ransomware protection
Malware protection
Cyberthreats
MSP cybersecurity
Threat detection
Phishing
Email security
Search by keywords
Browse Cybersecurity Articles
March 06, 2023
IcedID (BokBot): From banking trojan to backdoor
IcedID, also known as BokBot, was initially a banking trojan when it was discovered in 2017. Now it is mostly used as an initial access broker for other malware. This malware typically uses malicious email attachments to infect victims' machines. It has been known to use various types of attachments — such as archives, Word and Excel files — but the latest attacks used OneNote files.
February 13, 2023
CaddyWiper makes Windows machines unusable
CaddyWiper is an example of data-wiping malware, whose purpose is to corrupt the operating system and leave the targeted device unusable. It was first spotted in Ukraine in mid-March 2022 by the ESET research team.
February 06, 2023
DoubleZero: A data wiper deployed against Ukraine
The DoubleZero wiper — so named for its tactic of zeroing files — was first discovered on March 17, 2022 by CERT-UA (the Computer Emergency Response Team of Ukraine). The malware was designed in order to wipe out system files, non-system files and entire registry branches, and was spread by spear phishing emails with an attached ZIP that contains the malware file.
February 02, 2023
Vawtrak: A banking trojan with a long history
Vawtrak is a banking trojan — a form of malware that attempts to steal credentials from banks. It spreads via phishing emails and spam emails that contain a malicious document, loaded with a macro. The primary target of this malware are banks and insurance companies, mainly in Germany.
January 05, 2023
Royal ransomware’s actors make high demands
Royal ransomware was first spotted in January 2022, targeting different corporations. This group does not provide ransomware-as-a-service. The attackers demand figures ranging from $250,000 to over $2 million from their victims.
December 27, 2022
AV-Comparatives: Acronis Cyber Protect certified an Advanced Threat Prevention product for enterprise
Acronis Cyber Protect with the Advanced Security pack successfully passed the rigorous test criteria established by AV-Comparatives for their Advanced Threat Protection test, and was certified as an advanced threat prevention solution recommended for use by any business, including enterprise-level companies.
December 09, 2022
KmsdBot: DDoS and cryptomining combined
On November 10, 2022, the Akamai Security Intelligence Response Team published an article with the description of the newly spotted KmsdBot, which infected their honeypot. Gaming company FiveM, which provides software for GTA V for hosting custom private servers (and happens to be Akamai’s client), became the first victim. During their investigation, researchers found many samples that were built for different architectures.
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
Engage with TRU Security (RSS Feed Reader required)
  • cpoc
  • Legal information
  • Privacy policy
  • Acronis Cookie Notice
  • Notice of collection
© 2003–2025 Acronis International GmbH.
  • Deutsch
  • English
  • Español
  • Francais
  • Italiano
  • 日本語
  • Dutch
  • Português
  • Svenska
  • No data