• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2011

Analysis of BKDR_SOGU.A, Database-Accessing Malware

  • Posted on:August 4, 2011 at 8:18 pm
  • Posted in:Malware, Targeted Attacks
  • Author:
    Marco Dela Vega (Threats Researcher)
3

Last week, there was ample coverage of the SK Comms data breach, which involved one of the more popular service providers in South Korea that offers social networking and instant-messaging (IM) as well as mobile phone services. The breach affected the user accounts of the NATE portal and Cyworld, both SK Comms offerings. Within the same…

Read More

More Spying Tools Being Seen in Application Markets

  • Posted on:August 3, 2011 at 2:18 pm
  • Posted in:Mobile
  • Author:
    Julius Dizon (Research Engineer)
2

More and more spying tools are being sold in app stores, specifically those catering to Android users. One of those that has gotten some attention from the media goes beyond the typical routines of known spying tools, which include text message forwarding and GPS information transfer. In addition to the said routines, this particular spying…

Read More

Counting Down to Another Half-Year of Threats

  • Posted on:August 3, 2011 at 12:38 pm
  • Posted in:Bad Sites
  • Author:
    Det Caraig (Technical Communications)
3

The first half of 2011 was marred by a spate of data breaches, vulnerability exploit attacks, the proliferation of more and more Android malware, improved social networking scams, and notable developments in traditional system infections. As our security experts predicted, enterprises suffered from a slew of data breaches of never-before-seen magnitude. This spelled disaster not only for attack targets…

Read More

Cybercriminals Use Amazon Web Services (AWS) to Host Malware

  • Posted on:August 1, 2011 at 7:16 pm
  • Posted in:Malware
  • Author:
    Paul Ferguson (Senior Threat Researcher)
9

As our colleague Jorge Mieres over at Kaspersky recently noted, cybercriminals appear to be using Amazon Web Services (AWS) to host quite a large volume of SpyEye Trojans and exploit kits. In fact, another colleague in my group, Ranieri Romera, recently collected approximately 22Mb of malware hosted on AWS for analysis and detection. My advice is…

Read More
Page 5 of 5 « ‹ 45

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.