Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    September 2015
    S M T W T F S
    « Aug    
     12345
    6789101112
    13141516171819
    20212223242526
    27282930  
  • Email Subscription

  • About Us


    Archive for the ‘Targeted Attacks’ Category




    Analysis and data by Brooks Li (Threats Analyst) and Feike Hacquebord (Senior Threat Researcher) Zero-day exploits continued to be used in targeted attacks because they are effective, given that software vendors have yet to create patches for them. Throughout our on-going investigation and monitoring of a targeted attack campaign, Operation Pawn Storm, we found suspicious URLs that hosted a newly discovered zero-day exploit in Java. This is the first time in nearly two years that a new Java zero-day vulnerability was reported. Note that ...




    Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to open the message. The email header, written in Japanese, translates as “Fw: Prevention of the Middle East Respiratory Syndrome (MERS) while the attachment file reads, ...

    Posted in Malware, Targeted Attacks |



    The Esile targeted attack campaign targeting various countries in the Southeast Asian region has been discussed in the media recently. This campaign - which was referred to by other researchers as Lotus Blossom - is believed to be the work of a nation-state actor due to the nature of the stolen information, which is more valuable to countries than either private companies or cybercriminals. The Palo Alto Networks report discussed a targeted attack campaign that has been known to Trend Micro researchers for some time. We noted ...




    In our recent research, Piercing the HawkEye, we uncovered various ways cybercriminals were able to exploit information they gathered from monitoring victims' mailboxes in order to steal money from businesses. One of the examples we shared, the "change of supplier" fraud, was one of the most notable, as this type of scheme has been known to earn cybercriminals millions of dollars of stolen money. In this post, we will flesh out the details of this particular scheme, and what makes ...

    Posted in Malware, Targeted Attacks |



    It doesn't take an advanced malware to disrupt a business operation. In fact, even a simple backdoor is enough to do it. Earlier this year the Trend Micro Forward-Looking Threat Research Team closely monitored the operations of two Nigerian cybercriminals -- identified through aliases Uche and Okiki -- who attacked small businesses from developing countries to steal information and intercept transactions with their targets' partners. All this was done through HawkEye, a simple backdoor that costs around $35. While the malware used is simple, the cybercriminal operation itself is not. ...

    Posted in Malware, Targeted Attacks |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice