• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2007

Fake Google Web Page and an IM WORM

  • Posted on:August 29, 2007 at 4:14 am
  • Posted in:Bad Sites
  • Author:
    Jonell Baltazar (Senior Threat Researcher)
2

We all are familiar with IM worms and how they used different techniques in order to be downloaded and executed into a target machine.One of which is the WORM_SOHANAD (a.k.a worm_sohanat, worm_imaut, worm_autoit) which leverages on the MS06-014 MDAC vulnerability. There’s a previous blog entry regarding this malware here. Today, I would like to show…

Read More

Another NUWAR caught on video

  • Posted on:August 29, 2007 at 4:10 am
  • Posted in:Bad Sites
  • Author:
    Jovi Umawing (Technical Communications)
1

After ECARD.EXE, PATCH.EXE and MSDATAACCESS.EXE now comes VIDEO.EXE. Trend Micro Senior Threat Research Consultant Ivan Macalintal says it was just a matter of time. He reports of receiving in his inbox what could be a rehash of the infamous Storm Trojan, a.k.a. NUWAR, which raged during the first quarter of this year and which has…

Read More

More Russian Uprising: New IFrames and n404 Web Threat Kit

  • Posted on:August 29, 2007 at 4:05 am
  • Posted in:Bad Sites
  • Author:
    Carolyn Guevarra (Technical Communications)
0

TrendLabs has identified more Web pages that have been compromised to contain an IFRAME tag that redirects users to a malicious IP address, leading to the downloading of malicious files. The compromised Web pages, which Trend Micro detects as HTML_IFRAME.GN, point to news articles regarding new technologies and, ironically, about the latest malware threats. The…

Read More

Seeing double

  • Posted on:August 24, 2007 at 7:07 am
  • Posted in:Bad Sites
  • Author:
    Dianne Lagrimas (Technical Communications)
1

Last month, a suspicious domain was found to be associated with a certain malware: vvindowsupdate.com. Notice the double Vs used to replace the W–an obvious way to trick users into thinking that this is the real Windows Update link. Well, phishers are picking up where this month-old tactic left off to dupe users into giving…

Read More

Here There Be (Monsters) Trojans

  • Posted on:August 22, 2007 at 7:22 am
  • Posted in:Bad Sites
  • Author:
    Jasper Pimentel (Advanced Threats Researcher)
0

Job seekers are likely to be familiar with monster.com, a popular job search and online recruitment web site that is the second largest job search engine in the US, with roughly 42 million job seekers per month posting their resumes on the website-that is about 42 million people willingly providing their contact details and additional…

Read More
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.