• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for December 2009

From KOOBFACE with Love

  • Posted on:December 31, 2009 at 9:38 am
  • Posted in:Botnets, Malware
  • Author:
    Robert McArdle (Senior Threat Researcher)
1

We have received a lot of positive feedback for our three-part paper on KOOBFACE (I, II, III) from all parts of the IT industry, but how the malware authors themselves have chimed in. The KOOBFACE gang (who are attempting to make people believe that they are a legitimate company) have left a Christmas message on each…

Read More

Malicious JavaScript Infects Websites

  • Posted on:December 31, 2009 at 9:36 am
  • Posted in:Bad Sites, Malware
  • Author:
    Bernadette Irinco (Technical Communications)
2

Trend Micro threat analysts were alerted to the discovery of several compromised websites inserted with a JavaScript. The JavaScript is detected by Trend Micro as JS_AGENT.AOEQ. When executed, JS_AGENT.AOEQ uses a defer attribute, which enables it to delay executing its routine, that is, redirecting the user to several malicious websites. This is done so users will…

Read More

Christmas Greetings from Spammers

  • Posted on:December 25, 2009 at 8:30 pm
  • Posted in:Malware, Spam
  • Author:
    Mary Bagtas (Anti-spam Research Engineer)
12

Spammers are clearly putting the holidays to good use, as they have made Christmas just another reason to spread malware. Trend Micro threat analysts recently received a spammed message purporting to come from 123greetings.com, a legitimate site that users can access to send e-cards to family and friends. The email message even sported the site’s…

Read More

PH: Mayon Volcano Eruption Spews Out SEO Attack

  • Posted on:December 24, 2009 at 4:58 am
  • Posted in:Bad Sites, Malware
  • Author:
    Joseph Pacamarra (Threats Analyst)
3

While scouting the Web for the latest threats, Trend Micro threat analysts stumbled upon FAKEAV variants riding on the impending eruption of the Mayon Volcano. Renowned for its “perfect cone” shape, the Mayon Volcano became one of the candidates for inclusion in the New 7 Wonders of Nature list. It is not surprising, therefore, that…

Read More

News on Brittany Murphy’s Death Lead to FAKEAV

  • Posted on:December 21, 2009 at 11:45 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Det Caraig (Technical Communications)
3

Cybercriminals have been found riding on Brittany Murphy’s sudden death to scare people into buying FAKEAV. Searching for keywords like “brittany murphy’s death” on Google resulted in at least two suspicious URLs: http://{BLOCKED}erracing.net/vwb.php?sell=brittany%20murphy%20death http://{BLOCKED}x.net/icd.php?go=brittany%20murphy%20death The spike in searches on Murphy’s death has become the theme for the latest blackhat search engine optimization (SEO) attack, which…

Read More
Page 1 of 512 › »

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Going In-depth with Emotet: Multilayer Operating Mechanisms
  • February Patch Tuesday: Batch Includes 77 Updates That Cover Flaws in Internet Explorer, Exchange Server, and DHCP Server
  • Various Google Play ‘Beauty Camera’ Apps Send Users Pornographic Content, Redirect Them to Phishing Websites and Collect Their Pictures
  • Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
  • Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.