Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    May 2015
    S M T W T F S
    « Apr    
     12
    3456789
    10111213141516
    17181920212223
    24252627282930
    31  
  • Email Subscription

  • About Us


    Archive for the ‘Social’ Category




    Just how effective is it for cybercriminals to keep using Google Chrome and Facebook to infect their victims with malware? We’ve already seen both platforms be used as parts of malicious social engineering schemes. Both Google and Facebook are aware of this and have taken steps to protect their users. The number of times malicious Chrome extensions have sprouted, for example, has driven Google to restrict the use of any extension not available on the Chrome Web Store. Unfortunately, initiatives like these ...

    Posted in Malware, Social |



    We've found a new phishing technique targeting online shopping sites that may significantly change the threat landscape for phishing sites. Conventional phishing sites require an attacker to replicate the targeted site; a more accurate copy is more likely to fool intended victims. This technique we found allows for the creation of nearly perfect copies - because the attacker no longer needs to create a copy of the site at all. Instead, the phishing page only contains a proxy program, which acts ...

    Posted in Bad Sites, Mobile, Social | Comments Off on New Phishing Technique Outfoxes Site Owners: Operation Huyao



    Malicious browser extensions bring about security risks as these often lead to system infection and unwanted spamming on Facebook. Based on our data, these attacks have notably affected users in Brazil. We have previously reported that cybercriminals are putting malicious browsers in the official Chrome Web store. We also came across malware that bypasses a Google security feature checks third party extensions.  For this blog entry, we performed an in-depth analysis of malicious Chrome browser extension and its evasion tactics, after receiving samples ...




    In the two previous parts of this series of blog posts, we discussed the kinds of threats that we're seeing on Twitter, as well as the scope and scale of these threats. In this part, we will discuss their motivations, and what end users can do. The first question is: why do cybercriminals bother doing this? Social media accounts are valuable in their own right. These accounts can typically be used to make money in many ways for cybercriminals; any form of ...

    Posted in Social, Spam | Comments Off on Investigating Twitter Abuse, Part 3



    In the previous blog post of this series, I introduced our paper titled  An In-Depth Analysis of Abuse on Twitter  that looked at the threats in the Twitter landscape, and explained the various kinds of malicious tweets we've seen. In this post, we look at the scope and scale of these threats. Malware Tweets Users in the United States generally click the most links that go to malicious URLs from Twitter, whether it be phishing Tweets, Tweets with shortened URLs, or traditional spam. In one category, ...

    Posted in Bad Sites, Social | Comments Off on Investigating Twitter Abuse, Part 2


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice