The FBI has issued a warning on the dramatic increase of Business Email Compromise (BEC) scams, swindling over US$2.3 billion from companies worldwide, notably the US and Europe. The scams do not discriminate, with targets ranging from small businesses to large corporations. All the perpetrators need is the company executive’s email address (or someone close, like their personal assistant) and the ability to make a convincing fake email.Read More
Automated Teller Machines (ATM) are no longer just affected by the physical attempt of emptying the money safe. Now logical attacks on ATMs are slowly being recognized as an emerging threat by the security industry and law enforcement agencies. ATM malware had been detected by various researchers for a few years now and we have already seen incidents of their successful use. For this type of crime, malware, specifically targeting ATMs, is employed. The shift to the digital means of attack reveals a realization among criminal groups–that the use of malware is an easier and safer way to steal money and card information from ATMs. This tendency will only grow in the future and should make us mindful of the different pathways criminal groups have gained access to and have created for themselves.Read More
Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others. Just last year one of our researchers reported a Domain Name System (DNS) changer malware that redirected users to malicious pages when they visited specific websites. This enabled cyber crooks to get hold of the victims’ online credentials, such as passwords and PINs.
We have recently caught sight of a mobile ransomware distributed by fake adult websites. It not only locks the device screen and display a warning supposedly coming from law enforcement—a tactic reminiscent of the Police Trojan that plagued desktops before—it also activates the unit’s front facing camera to add to its scare tactic. However, while it has routines unique to mobile ransomware, it also has a particular set of weaknesses that stand out.Read More
Following their security advisory last April 5, 2016, Adobe has released an out of band patch today for the vulnerability CVE-2016-1019, which affects Adobe Flash Player. Trend Micro has observed active zero day attacks from the Magnitude Exploit Kit affecting users of Flash 220.127.116.116 and earlier. These attacks are not effective against users of Flash versions 18.104.22.168 and 22.214.171.124. This is because of a heap mitigation that Adobe introduced in version 126.96.36.199 and is also present in version 188.8.131.52. Users of these versions will only experience a crash in Adobe Flash when attacks attempt to exploit the vulnerability.Read More