• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for April 2010

Amazon Spam Targets Online Shoppers

  • Posted on:April 30, 2010 at 11:33 pm
  • Posted in:Malware, Spam
  • Author:
    Gelo Abendan (Technical Communications)
1

TrendLabsSM security researchers recently noted an increase in the volume of spammed messages posing as newsletters from Amazon. These email messages even sported a supposed Amazon email address, {BLOCKED}ers@amazon.com, to make them look more credible. The messages even featured various product endorsements to fool recipients into thinking they were legitimate. Clicking the images and embedded…

Read More

Spam Poses as a Twitter Email Notification

  • Posted on:April 29, 2010 at 2:55 am
  • Posted in:Mobile, Spam
  • Author:
    Gedrick Lacson (Anti-spam Research Engineer)
2

Beware, Twitter enthusiasts! Spam posing as Twitter email notifications are currently proliferating in the wild. The spam are of two types—the first type attempts to steal personal information or login credentials while the second attempts to infect systems with malware. A legitimate Twitter notification email looks like this: It usually begins with “Hi, *name of…

Read More

PDF Exploit Becomes a Little More Sophisticated

  • Posted on:April 28, 2010 at 2:43 am
  • Posted in:Vulnerabilities
  • Author:
    Jovi Umawing (Technical Communications)
5

.PDF files—or their inherent features—have been used by cybercriminals in some of the most noteworthy attacks we have encountered. Modified versions of this file type have been especially notorious these past few months since they are capable of attacking user systems by initially exploiting inherent vulnerabilities found in Adobe Reader and Acrobat. TrendLabsSM has documented…

Read More

ZeuS/ZBOT Tries Out File Infection

  • Posted on:April 27, 2010 at 3:15 pm
  • Posted in:Botnets, Malware
  • Author:
    Cris Pantanilla (Threat Response Engineer)
2

ZeuS/ZBOT is best known for its information-stealing routines via the use of configuration files downloaded from their home sites. They are created using toolkits that allow remote control of the malware. Getting them to infect target systems is the tricky part. Cybercriminals have thus tried utilizing drive-by downloads, spammed messages, worm propagation, and many more…

Read More

Fake IT Email Notification Spreads Malicious PDF

  • Posted on:April 27, 2010 at 2:06 pm
  • Posted in:Malware, Spam
  • Author:
    Carolyn Guevarra (Technical Communications)
4

TrendLabsSM received reports of a suspicious email claiming to be an IT notification. It informs users that their mailbox settings have been changed. This email has a .PDF attachment that supposedly contains instructions that the users need to read before updating their settings. This attack is similar to many we have seen previously purporting to…

Read More
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.