A few days ago, Trend Micro got wind of a .DLL worm detected as WORM_DOWNAD.A that exploits the MS08-067 vulnerability. Its routines have led our security analysts to postulate that it is a key component in the development of a new botnet. Initially thought to be working in conjunction with a NETWORM variant, WORM_DOWNAD.A is…
Read MorePhishers always think out of the box, thinking of ways to fool victims into falling for their phishing schemes. Now, from targeting financial institutions and banks, we’ve found a new twist – one that involves the popular fast-food chain McDonald’s. The phishing page displays a fake Member Satisfaction Survey, and for the customer to take…
Read MoreWith the Yuletide season in full swing, shoppers everywhere are busy buying items for everyone on their shopping list. While this brings profits for most retailers, there’s another group that tries to profit as well — cyber criminals. It’s well known that malware infection rates rise significantly during the last few months of the year….
Read MoreRansomware is known for holding a victim’s files “hostage” (encrypted) while the criminal perpetrator asks the victim to pay a high sum of money (ransom) in exchange for a decryption key that can be used to retrieve the encrypted files. Just recently, Trend Micro Advanced Threats Researcher Ivan Macalintal reported that a new version of…
Read MoreTrend Micro researchers received a sample of an Enterprise Information Security (EIS) program component file that exhibits easily abused rootkit capabilities. Enterprise Information Security (EIS) systems are used by companies to monitor activities within a network. This is done to make sure that security processes are followed, and that all activities done within the network…
Read More