![](https://webcf.waybackmachine.org/web/20220706042110/https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2021/11/17085725/apt_soc_ksb-2021-800x450.jpg)
The end of the year is always a nice time to take a look on the main developments and incidents that took place in the cyber security industry over the preceding 12 months. To review the impact these events had on organizations and individuals, and predict what they could mean for the overall evolution of the threat landscape, Kaspersky continues its series of annual Kaspersky Security Bulletin publications.
In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.
ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’.
We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack.
This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.