• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   Everything Old is New Again: Bad Ads, Cryptoransomware and the Return of Macro Viruses

Everything Old is New Again: Bad Ads, Cryptoransomware and the Return of Macro Viruses

  • Posted on:May 19, 2015
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

If there’s a phrase to sum up the threat environment that our researchers at TrendLabs have outlined for the first quarter of 2015 it’s that everything old is new again.

The three most notable threats for the first quarter aren’t new threats. Bad ads, cryptoransomware and macro malware are all well-known threats from past years. But don’t let their age fool you: these threats have come back stronger and more malicious than ever. The prevalence and success of these threats shows again that innovation isn’t restricted to developing new threats in new arenas: it’s also in taking old threats and improving them to succeed against the security protections that once thwarted them.

Take bad ads or malvertisements for example. This term refers to attacks where third-party ad servers that are used by trusted and legitimate websites have been subverted to serve up malware in addition to ads. This type of attack has been around for years. But in the first quarter of 2015 we saw attackers take up malvertisements once again with a vengeance, this time by targeting zero-day vulnerabilities using the destructive capabilities of tools like the Angler Exploit Kit. While malvertisements and zero-day vulnerabilities aren’t new problems, bringing exploit kits to bear has given these threats a new lease on life.

The same is the case with cryptoransomware. After dropping out of sight and mind in the second half of 2013, ransomware began a comeback in the last quarter of 2014 and continued it into 2015. And within the ongoing resurgence of ransomware, cryptoransomware, the most destructive form of all, rocketed to account for nearly half of all ransomware infections and marked a four-fold increase in infections compared to the first quarter of 2014.

If more proof that oldies can still be goodies from an attacker’s perspective, macro malware has made a surprising and alarming comeback. Nearly 20 years have passed since the Word Concept virus showed how macros can be used to make malware. And yet, attackers are showing that social engineering still trumps security protections by leading potential victims by the hand to assist in their own infection by bypassing security controls that have protected against this class of malware for years.

Of course these aren’t the only threats we saw in the first three months of 2015. For example malicious and high-risk apps continue to be a problem on the Android platform with more than 5 million threats found to date as of March 2015. And nine years after Bill Gates promised we would eliminate spam, it’s still a problem and worse than ever.

So far, 2015 is showing that threats are never fully eradicated. Sometimes they just need some time to evolve in the wild to adapt and thrive in the new threat environment.

Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.

Related posts:

  1. Is My Mac Secure from Malware and Viruses?
  2. Worst viruses in history: A look back at malware through the ages
  3. IRS Can’t Process My Tax Return?! Ah, Excuse Me?
  4. Macro Malware: Here’s what you need to know in 2016

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.