• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for September 2011

Mobile Malware Found Disguised as Opera Mini

  • Posted on:September 29, 2011 at 1:53 pm
  • Posted in:Malware, Mobile
  • Author:
    Karla Agregado (Fraud Analyst)
13

The recent rise of mobile computing is further signaling the need for users to have good reliable mobile browsers such as Opera Mini installed in their smartphones or in any mobile device. We believe that this is why cybercriminals are currently using Opera Mobile as a mobile malware disguise. We encountered a website that seems to…

Read More

TDL4 Worm Component Employs Bitcoin Mining

  • Posted on:September 27, 2011 at 12:07 pm
  • Posted in:Botnets, Malware
  • Author:
    Roland Dela Paz (Threat Researcher)
2

In the past we reported a couple of attacks involving malware that turn infected systems into Bitcoin miners. We also said that cybercriminals will increasingly do so in the future. We recently encountered another familiar and well-known malware family—TDL4—that turns infected systems into Bitcoin miners. TDL4 is a well-known TDSS variant that evades antivirus detection…

Read More
Tags: bitcoinTDL4worm

Underground Radar: Possible Compromise of MySQL.com and Its Subdomains

  • Posted on:September 26, 2011 at 9:34 am
  • Posted in:Botnets, Exploits
  • Author:
    Maxim Goncharov (Senior Threat Researcher)
22

We recently found an interesting post in a Russian underground forum in the course of our research. People exchange information about their illegal activities in these kinds of forum. We found a user in the forum with the handle “sourcec0de” and ICQ number 291149 who currently offers root access to some of the cluster servers of…

Read More
Tags: compromisemysql

Crooks Are Looking at Your Mobile Wallet

  • Posted on:September 26, 2011 at 5:34 am
  • Posted in:Mobile
  • Author:
    David Sancho (Senior Threat Researcher)
5

I’ve read lately about the launch of Google Wallet and how it may revolutionize how we make payments. Instant payments by putting the phone near a terminal and by keying in my PIN? Sounds good. As exciting as it may be to try out new technologies, if it has to do with my wallet though,…

Read More

LURID: Attribution Isn’t Easy

  • Posted on:September 23, 2011 at 6:39 am
  • Posted in:Exploits, Malware, Targeted Attacks
  • Author:
    David Sancho and Nart Villeneuve (Senior Threat Researchers)
1

Determining who is ultimately behind targeted attacks is difficult. It requires a combination of technical and contextual analysis as well as the ability to connect disparate pieces of information together over a period of time. Moreover, any one researcher typically does not necessarily have all of these pieces of information and must interpret the available…

Read More
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.