Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    September 2015
    S M T W T F S
    « Aug    
  • Email Subscription

  • About Us

    Archive for the ‘Targeted Attacks’ Category

    Dr. Thamar E. Gindin didn’t know exactly why she was being targeted. She only knew that her attackers were persistent. An expert lecturer on linguistics and pre-Islamic Iranian culture, she had apparently uttered political statements that had piqued the people behind Rocket Kitten—a known attack group notorious for snooping on select high-profile individuals in the Middle East. In the middle of 2015, Dr. Gindin received numerous spear-phishing emails, one of which contained malware while three others contained links to fake login ...

    Posted in Targeted Attacks |

    We found that attackers in an active campaign have compromised a number of Japanese websites to serve as command and control (C&C) servers for the EMDIVI backdoor they’re using and are currently targeting companies not only in Japan but also in the US. EMDIVI, which first appeared in 2014, is notoriously used in targeted attacks against Japanese companies. It allows machines to be remotely controlled by attackers for malicious commands and other activities. We looked into this malware and found that ...

    Posted in Targeted Attacks |

    The security industry loves to talk about how "sophisticated" attacks can be. Usually this takes the form of us saying how advanced and sophisticated an attack is, what new methods were used to hide servers or make analysis harder, etcetera. However, it's easy to forget that not all attacks need to be technically sophisticated; instead it can be in the social engineering used and how the attack is carried out. For example, a few months ago we talked about the Arid ...

    Microsoft has released MS15-093, an out-of-band update for all supported versions of Windows. This bulletin fixes a vulnerability in Internet Explorer (designated as CVE-2015-2502) that allowed an attacker to run arbitrary code on a user's system if they visited a malicious site. A compromised site, spear phishing, and/or malicious ads could all be used to deliver exploits targeting this vulnerability to the user. This threat is already in use in limited, targeted watering hole attacks in the wild. This particular vulnerability is a memory ...

    Why would Pawn Storm, the long-running cyber-espionage campaign, set its sights on a Russian punk rock group? Sure, Pussy Riot is controversial. Members of the feminist band had previously been thrown in jail for their subversive statements against the Orthodox Church and Russian patriarchal system. But why would attackers have any interest in them? What is their connection to other targets? Earlier this year, we reported that the operators behind Pawn Storm had gone after members of the North Atlantic Treaty ...


    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice