• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for April 2011

DLL-Based FAKEAV Returns, in the Wild Again

  • Posted on:April 25, 2011 at 6:57 am
  • Posted in:Malware
  • Author:
    Roland Dela Paz (Threat Researcher)
10

In our previous FAKEAV white paper, we presented how Trend Micro researchers tracked down the evolution of FAKEAV and followed its development behaviorwise from one generation to the next. One of the earlier generations (fourth, to be exact) in the paper comprises DLL-based FAKEAV—fake antivirus that use a .DLL file to perform all of their malicious routines to primarily avoid easy…

Read More

Yahoo! PH Purple Hunt 2.0 Ad Compromised

  • Posted on:April 24, 2011 at 11:32 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Maharlito Aquino (Threat Research)
10

Earlier the other day, I was browsing through the Yahoo! PH site and the Yahoo! Purple Hunt 2.0 ad caught my attention. Curious, I clicked the ad and found my browser downloading a suspicious file named com.com. Apparently, this ad redirected me to a randomly generated URL similar to the following, which unfortunately led to the…

Read More

Epsilon Security Connect Tool Steals More Information from Users

  • Posted on:April 21, 2011 at 8:43 am
  • Posted in:Malware
  • Author:
    JM Hipolito (Technical Communications)
5

We were recently made aware of attacks leveraging the recent data breach that involved Epsilon. According to reports, the attack involves a Web page that looks very similar to the press release issued by Epsilon concerning the breach. The page also instructs the recipients to click a link at the bottom of the post in…

Read More

Despite the Headlines, SLAAC Does Not Represent a Zero-Day Attack Vector

  • Posted on:April 18, 2011 at 6:17 pm
  • Posted in:Bad Sites
  • Author:
    Douglas Otis (Senior Threat Researcher)
7

SLAAC is a mnemonic for IPv6 StateLess Address AutoConfiguration, which follows attempts at obtaining router information that happens only after the interface has established an IPv6 address for the local link. IPv6 does not use Ethernet broadcasting, which imposes scaling limitations on the devices supported on a local link. Instead, IPv6 multicasting divides devices into 16.7…

Read More

Facebook Events, Credits, and Passwords Being Used for Attacks

  • Posted on:April 18, 2011 at 1:41 am
  • Posted in:Bad Sites, Malware, Spam
  • Author:
    Paul Pajares (Fraud Analyst)
11

Facebook has expanded its range of service offerings, making the site so much more than a place where users can interact with one another. It has been said several times that Facebook is bound to replace email as a means of communication, as it provides a more convenient way for users to send messages. This convenience, however, was also leveraged by cybercriminals…

Read More
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.