Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    June 2015
    S M T W T F S
    « May    
     123456
    78910111213
    14151617181920
    21222324252627
    282930  
  • Email Subscription

  • About Us


    Archive for the ‘Targeted Attacks’ Category




    Trend Micro has recently reached an important milestone: we have vetted our 500 millionth "good file" towards the end of 2014. This means that we have a strong and vast repository of files to competently decide whether any given file is non-malicious or otherwise. Securing Single-Purpose Systems Whitelisting is increasingly being seen as a key component of modern solutions to dealing with today's threat landscape. Recent attacks on PLCs (ICS/SCADA) and PoS systems demonstrate how effective locking down systems (enabled via application control) can ...

    Posted in Malware, Targeted Attacks | Comments Off on 5 Years, 500 Million Good Files and Counting



    Last year, we detected some new PoS malware just before the holiday season.  At that time, we omitted mentioning one fact - that the file was digitally signed with a valid certificate. Our research shows that these attacks targeting PoS malware are growing in sophistication, with code signing and improved encryption becoming more commonplace. We were also able to connect this PoS malware to the group involved with the Anunak malware—which is related to the Carbanak gang as posted by our colleagues over ...



    Feb15
    7:09 pm (UTC-7)   |    by

    Today, Trend Micro publishes a research report on an ongoing malware campaign that targets Israeli victims and leverages network infrastructure in Germany. The campaign has strong attribution ties to Arab parties located in the Gaza Strip and elsewhere. We have uncovered two separate, but heavily interconnected campaigns: Operation Arid Viper: This is a highly-targeted attack on high-value Israeli targets that links back to attackers located in Gaza, Palestine. The campaign’s modus operandi involves using spear-phishing emails with an attachment containing malware disguised as a ...




    Recently, both HP's Zero Day Initiative (ZDI) and Google's Project Zero published vulnerabilities in Microsoft products (specifically, Internet Explorer and Windows 8.1) because Redmond did not fix them within 90 days of the vulnerabilities being reported. This has resulted in an argument between security researchers and software vendors on how vulnerabilities should be disclosed. A case where a vulnerability was disclosed without a patch has mixed results for end users: It pushes vendors to respond more quickly when vulnerabilities are disclosed to them in ...

    Posted in Targeted Attacks, Vulnerabilities | Comments Off on Vulnerability Research and Disclosure: Evolving To Meet Targeted Attacks



    In our continued research on Operation Pawn Storm, we found one interesting poisoned pawn—spyware specifically designed for espionage on iOS devices. While spyware targeting Apple users is highly notable by itself, this particular spyware is also involved in a targeted attack. Trend Micro™ Mobile Security detects and removes this threat. Download the app from the App Store: Trend Micro Mobile Security – Privacy & Lost Device Protection for your iPhone, iPad, and iPod Touch. Background of Operation Pawn Storm Operation Pawn Storm is an active ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice