• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for September 2010

Stuxnet Used in Blackhat SEO Campaign

  • Posted on:September 30, 2010 at 12:28 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Bernadette Irinco (Technical Communications)
13

As expected, criminals are now taking advantage of the notoriety of Stuxnet as a mechanism to deploy malicious code. Senior Threats Researcher Ivan Macalintal found poisoned search results that leveraged on this notorious malware threat. Some of the search strings used in this blackhat SEO campaign include “stuxnet SCADA,” “stuxnet removal tool,” “stuxnet cleanup,” “stuxnet…

Read More

ZeuS Now Bypasses Two-Factor Authentication

  • Posted on:September 29, 2010 at 6:06 am
  • Posted in:Malware
  • Author:
    Jonathan Leopando (Technical Communications)
9

Trend Micro has been alerted that certain ZeuS/ZBOT variants are now able to break into users’ bank accounts in spite of two-factor authentication systems. These are frequently used to enhance bank security. These ZeuS variants can specifically use mobile malware to defeat systems that rely on text messages sent via mobile phones on Symbian OSs….

Read More

World of Warcraft Scams: Free Gifts and Fake Account Suspension Threats

  • Posted on:September 28, 2010 at 10:21 am
  • Posted in:Bad Sites, Malware, Mobile
  • Author:
    Menard Osena (Senior Product Manager)
20

Blizzard’s World of Warcraft (more popularly known as WoW) is one of the most popular massively multiplayer online role-playing games (MMORPGs) in the world. With more than 11.5 million subscribers as of 2008, WoW is plagued by a thriving underground online gaming economy. The most common scam in WoW that Trend Micro has seen uses…

Read More

ZeuS Trojan Now Uses False Configuration URLs

  • Posted on:September 27, 2010 at 7:32 pm
  • Posted in:Malware
  • Author:
    Roland Dela Paz (Threat Researcher)
13

One of the “standard” behaviors of the ZeuS/ZBOT Trojans is that it downloads a configuration file. This configuration file contains details on its bot routines such as what sites to target, what URLs to access to download an updated copy of itself, what URLs to send stolen information to, and what URLs to access to…

Read More

New Azvhan Bot Family Revealed

  • Posted on:September 24, 2010 at 5:27 am
  • Posted in:Bad Sites, Malware
  • Author:
    Patrick Estavillo (Threats Analyst)
19

A new bot family was found in the wild around April this year. This family was named “Avzhan.” Avzhan malware, detected by Trend Micro as Mal_Scar-1, mostly affected Asia where most of the affected users resided. Avzhan bots install themselves onto the Windows system directory using the file name  {six random lower-case letters}.exe. After installation,…

Read More
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.