• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for November 2008

DOWNAD: Gearing Up For A Botnet

  • Posted on:November 30, 2008 at 10:27 am
  • Posted in:Botnets, Malware
  • Author:
    Arman Capili (Technical Communications)
2

A few days ago, Trend Micro got wind of a .DLL worm detected as WORM_DOWNAD.A that exploits the MS08-067 vulnerability. Its routines have led our security analysts to postulate that it is a key component in the development of a new botnet. Initially thought to be working in conjunction with a NETWORM variant, WORM_DOWNAD.A is…

Read More
Tags: BotnetsMalwareMicrosoftvulnerability

Getting a Taste of McDonald’s Phish Fillet

  • Posted on:November 29, 2008 at 2:35 pm
  • Posted in:Mobile
  • Author:
    Aivee Cortez (Fraud Analyst)
3

Phishers always think out of the box, thinking of ways to fool victims into falling for their phishing schemes. Now, from targeting financial institutions and banks, we’ve found a new twist – one that involves the popular fast-food chain McDonald’s. The phishing page displays a fake Member Satisfaction Survey, and for the customer to take…

Read More
Tags: McDonald'ssurvey

Holidays for Hackers

  • Posted on:November 29, 2008 at 2:29 pm
  • Posted in:Bad Sites
  • Author:
    Jonathan Leopando (Technical Communications)
0

With the Yuletide season in full swing, shoppers everywhere are busy buying items for everyone on their shopping list. While this brings profits for most retailers, there’s another group that tries to profit as well — cyber criminals. It’s well known that malware infection rates rise significantly during the last few months of the year….

Read More
Tags: HolidayZBOT

New GPcode Trojan Holds Victim’s Files Hostage

  • Posted on:November 28, 2008 at 8:27 pm
  • Posted in:Malware
  • Author:
    Bernadette Irinco (Technical Communications)
4

Ransomware is known for holding a victim’s files “hostage” (encrypted) while the criminal perpetrator asks the victim to pay a high sum of money (ransom) in exchange for a decryption key that can be used to retrieve the encrypted files. Just recently, Trend Micro Advanced Threats Researcher Ivan Macalintal reported that a new version of…

Read More
Tags: ransom

Suspicious Rootkit Lurks in EIS Software

  • Posted on:November 27, 2008 at 8:21 am
  • Posted in:Bad Sites
  • Author:
    JM Hipolito (Technical Communications)
3

Trend Micro researchers received a sample of an Enterprise Information Security (EIS) program component file that exhibits easily abused rootkit capabilities. Enterprise Information Security (EIS) systems are used by companies to monitor activities within a network. This is done to make sure that security processes are followed, and that all activities done within the network…

Read More
Tags: corporate networksEISrootkitsSonyUSB
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.