Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Author Archive - Leo Balante (Technical Communications)




    Cybercriminals are well-versed in preying upon anyone curious about world events.  Case in point: the upcoming 2014 FIFA World Cup in Brazil. While the world is waiting for this, cybercriminals are not wasting time and are now launching new threats that turn global followers into victims.

    Search Results Leads to Malware, Adware

    We recently found a file named Jsc Sport Live + Brazil World Cup 2014 HD.rar., which contains the file Brazil World Cup Streaming 2014.exe. This .file is a backdoor identified as BKDR_BLADABIN.AB.

    This particular backdoor is a BLADABINDI variant which is believed to have been created with nJRAT, a known remote access tool. It executes commands from a remote malicious user, effectively compromising the affected system. It can also capture screenshots, which can be used to obtain sensitive information.

    Football gaming fans are also targeted. A World Cup-related search led to a supposed key generator for the game FIFA 14. However, the supposed key generator is actually adware identified as ADW_INSTALLREX.


    Figure 1. Site hosting the fake key generator

    Phishing Attacks Spotted

    World Cup threats are not limited to malware. Last year, we saw phishing emails that used a supposed “FIFA World Cup 2014 Promotional Draw” to convince users to share personal information.

    Recently, we saw a website that tricks users into providing information, including their credit card credentials. As of this writing, the page has been taken down.


    Figure 2. Phishing page

    The Need for Constant Vigilance

    Constant vigilance remains as the biggest shield one can use as defense to such social engineering schemes. From timely spammed messages to suspicious social media posts, cybercriminals know how to bait you into becoming a victim. . Think and verify before you click on the next link that appears on your mail.

    For more tips against social engineering schemes, you may read our Digital Life e-Guide “How Social Engineering Works.”

    The Race to Security hub contains aggregated TrendLabs content on security stories related to major sporting events. We’ll soon be featuring the 2014 FIFA World Cup.

    With additional analysis from Abigail Villarin, Antonio Pangilinan II, Karla Agregado and Rika Gregorio

     
    Posted in Bad Sites, Malware, Spam | Comments Off



    With less than a week to go, Valentine’s Day is definitely around the corner. It has been proven that the holidays are a goldmine for cybercriminals, and there are many activities and threats online that could spoil one of the most anticipated seasons of lovers. This, after all, isn’t just time for chocolates and roses.

    As online shopping has become an easy go-to for most shoppers, there are a number of scams we’ve seen that users should be wary of. These messages persist all year, but become more common near special occasions.

    140210comment01

    Figure 1. Spam Message

    Take particular scam advertises a flower-delivery service. It appears to be a normal promotional e-mail, but the links actually lead to various survey scams.

    140210comment02

    Figure 2. Fake Pharmaceutical Sites

    140210comment03

    Figure 3. Watch Replica Email

    Other common threats during this period include spam messages with links to fake pharmaceutical sites and watch replica sites.

    Malware threats also arrive during this season. We recently found a new attack targeting Canadian users looking for a romantic dinner getaway. The email appears to be about a special Valentine dinner, and has an attachment.

    140210comment04

    Figure 4. Dinner “menu”

    The attachment is actually a malicious .RTF file (detected as TROJ_ARTIEF.VDY) , which opens the decoy dinner menu but also uses a vulnerability (CVE-2012-0158) to drop a backdoor onto the affected system. We detect this backdoor as BKDR_INJECT.VDY.

    Seasonal offers and deals are commonplace, but users should be able to spot what’s malicious and what is not. They should not throw caution to the wind by opening emails and clicking links from unknown sources. The biggest bargains aren’t always the biggest steal. If an offer sounds too good to be true, it probably is.

    The Trend Micro™ Smart Protection Network™ protects users from this threat by blocking the spam mails, as well as related URLs and malware.

     
    Posted in Malware, Spam | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice