• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2008

ZLOB Enters The Search Engine Market

  • Posted on:August 7, 2008 at 4:37 am
  • Posted in:Bad Sites
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
1

More than a year ago, Trend Micro threat researchers uncovered a network of over 900 rogue DNS (Domain Name System) servers related to the ZLOB Trojan family. We gave examples showing that these rogue DNS servers are part of click fraud and leakage of personal information. Just recently, however, we discovered that this network is…

Read More
Tags: DNSrogue dns serverssearch enginezlob

‘Anjelina’ Spam Follows Through, Unfortunately

  • Posted on:August 5, 2008 at 7:32 pm
  • Posted in:Malware, Spam
  • Author:
    Arman Capili (Technical Communications)
0

There appeared a timely follow-up to the Angelina Nude Movie spam run last month just as the coveted first pictures of the so-called Brangelina’s twins (offspring of actor couple Brad Pitt and Angelina Jolie) came out in celebrity magazines. Trend Micro has just received reports of a new spam email message using the same social…

Read More
Tags: Angelina JolieSpam

Storm Uses Old Bait

  • Posted on:August 5, 2008 at 12:21 pm
  • Posted in:Malware, Spam
  • Author:
    JM Hipolito (Technical Communications)
1

The Storm gang is casting its net once again, using “postcards” as bait in a recently discovered spam run, Trend Micro Senior Advanced Threats Researcher Paul Ferguson has reported. Below is a screenshot of an email sample: Clicking the link embedded in the message connects the user to any of the following domains: hxxp:// {BLOCKED}cardAdvertising.com/…

Read More
Tags: postcardsStorm

Nepal’s Supreme Court Web Site Compromised

  • Posted on:August 5, 2008 at 12:18 pm
  • Posted in:Bad Sites
  • Author:
    Aivee Cortez (Fraud Analyst)
0

These days, it seems that it can happen to almost anyone — Web site compromises are really, really out of control, and virtually anyone can be victimized when proper security measures are not taken. Very recently, another government site became a victim of an SQL injection or XSS attack (possibly enabled by the site’s use…

Read More
Tags: compromised site

Got Skype Fraud

  • Posted on:August 4, 2008 at 9:41 pm
  • Posted in:Mobile
  • Author:
    Fatima Bancod (Fraud Analyst)
2

Skype is one of the most widely used (and wildly popular) Voice over IP (VoIP) software applications used on the Internet, so phishers occasionally attempt to profit from its popularity. And today is no different. The Trend Micro Content Security Team discovered an active Skype phishing page, and as can be seen in the screen…

Read More
Page 6 of 7 « ‹ 567 ›

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.