Protective film suppliers have been targeted by sophisticated malware that has the potential to steal intellectual property from them, according to a new report by a security firm.
The company that uncovered the malware has since hired more than 150 security researchers to work on a new cybersecurity effort, which is to be unveiled later this year, according the security firm Kaspersky Lab.
The malware was discovered in the hands of one of the world’s largest film distributors, with sales totaling more than $400 million in 2016, according a report by Kaspersko.
Kaspersk said the distributor has since stopped buying the film, but that it has not been completely removed from its shelves.
Kaspersky also reported a new strain of malware that it said is being used to attack its customers.
It said the malicious code that is being spread is being distributed on an unnamed Chinese website.
Kansai Film & Video Co. has been the target of a new variant of the malware that is able to download and install the malicious software, according this report.
The threat is believed to have originated in China, according Kasperski, with its users reportedly paying $150 for an individual version of the code that the company believes is part of a “virus-like” attack.
KF&V said it has been unable to identify any customers affected by the malware, but Kasperskin said that some customers may have downloaded the code from an infected file-sharing website.
The firm also said it is aware of two separate attacks that targeted its clients, one in China and the other in the United States.KF&Vs customers in the U.S. were targeted by a malware that infected computers running the Windows operating system, Kasperskaya said.
It did not specify what the malware was that infected those computers.
The malware was distributed through a popular Chinese online forum and targeted people who use the forum.
In a separate report published Wednesday, KF-A Technologies said it had discovered a new version of a malware dubbed the “Bounty Hunter” that was being used by hackers in several countries.KDF-A said it discovered the malware on April 10.
KDF-TECH said that it had identified the malware as “The Bounty Hunter,” and that it was being distributed via social engineering campaigns on Twitter and Telegram.
Kdf-A is not the only firm to have been affected by a new batch of malware.
Last week, another security firm reported that a malicious variant of malware known as the “Black Shark” was also being used.
It was not immediately clear whether the new strain was being spread via the same social engineering techniques that KDFA has reported.