{
	"id": "63115ac7-0b41-47b1-a047-541f90921b1d",
	"created_at": "2026-04-06T00:15:08.138606Z",
	"updated_at": "2026-04-10T03:30:32.737351Z",
	"deleted_at": null,
	"sha1_hash": "9fe64e330619fcca78ba5e0ed90bbfe0cf0fc99f",
	"title": "Kaspersky official blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2550510,
	"plain_text": "Kaspersky official blog\r\nPublished: 2026-04-01 · Archived: 2026-04-02 10:34:46 UTC\r\nCrystalX RAT can flip your screen and steal your crypto\r\nThe new CrystalX remote access Trojan looks like the prank viruses of the 90s on the surface, but it causes a lot\r\nmore damage. It spies on all that’s happening on your computer, steals cryptocurrency and accounts, and gives the\r\nattacker full control over your device. We break down how it works, and how to avoid becoming a victim.\r\nLatest\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 1 of 17\n\nWhy AI agents need an iron curtain\r\nResearcher Niels Provos’ prototype IronCurtain architecture: a system designed to restrict the actions of AI agents\r\nthrough isolation and security policies.\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 2 of 17\n\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 3 of 17\n\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 4 of 17\n\nSurvey-based scams\r\nSpammers have figured out how to hide links to fraudulent sites within surveys created on legitimate platforms.\r\nWe’re breaking down the ruse and sharing tips on how to avoid falling for it.\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 5 of 17\n\nGamers\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 6 of 17\n\nVulnerability in Unity game engine\r\nAny game based on the popular Unity engine made in the last eight years can allow attackers to get into your\r\ncomputer or smartphone. Here’s what to do about it.\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 7 of 17\n\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 8 of 17\n\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 9 of 17\n\nGamers beware: Trojans have invaded Steam\r\nIf you still think that Steam, Google Play, and the App Store are malware-free, then read this fascinating story\r\nabout PirateFi and other hacker creations disguised as games.\r\nHow scammers attack young gamers\r\nAutumn is here, kids are going back to school and also meeting up with friends in their favorite online games.\r\nWith that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most\r\nlikely to encounter.\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 10 of 17\n\nLive hack: Apex Legends esports tournament scandal\r\nHackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more\r\nrecently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down\r\nwhat happened and how it could have been avoided.\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 11 of 17\n\nBusiness\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 12 of 17\n\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 13 of 17\n\nMalware disguised as AI agents\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 14 of 17\n\nThreat actors are promoting pages containing malicious instructions for installing AI agents intended for workflow\r\nautomation.\r\nCloudless malware attribution\r\nWhat is the purpose of a local version of the Kaspersky Threat Attribution Engine, and how to hook it up to IDA\r\nPro?\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 15 of 17\n\nTips\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 16 of 17\n\nSource: https://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nhttps://usa.kaspersky.com/blog/sas-2023-research/29254/\r\nPage 17 of 17",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"MISPGALAXY"
	],
	"references": [
		"https://usa.kaspersky.com/blog/sas-2023-research/29254/"
	],
	"report_names": [
		"29254"
	],
	"threat_actors": [
		{
			"id": "75108fc1-7f6a-450e-b024-10284f3f62bb",
			"created_at": "2024-11-01T02:00:52.756877Z",
			"updated_at": "2026-04-10T02:00:05.273746Z",
			"deleted_at": null,
			"main_name": "Play",
			"aliases": null,
			"source_name": "MITRE:Play",
			"tools": [
				"Nltest",
				"AdFind",
				"PsExec",
				"Wevtutil",
				"Cobalt Strike",
				"Playcrypt",
				"Mimikatz"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434508,
	"ts_updated_at": 1775791832,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/9fe64e330619fcca78ba5e0ed90bbfe0cf0fc99f.pdf",
		"text": "https://archive.orkl.eu/9fe64e330619fcca78ba5e0ed90bbfe0cf0fc99f.txt",
		"img": "https://archive.orkl.eu/9fe64e330619fcca78ba5e0ed90bbfe0cf0fc99f.jpg"
	}
}