• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2012

Luckycat Redux: Inside an APT Campaign

  • Posted on:March 29, 2012 at 7:49 pm
  • Posted in:Targeted Attacks
  • Author:
    Nart Villeneuve (Senior Threat Researcher)
11

Today, we published our paper titled Luckycat Redux, which looked into the activities of the Luckycat campaign. First documented earlier this month by our friends at Symantec, our investigation has significantly improved the available knowledge about not just this attack specifically, but about how targeted attacks unfold. Here are some of our findings: To understand…

Read More
Tags: advanced persistent threatAPTLuckycat

Game Change: Mac Users Now Also Susceptible to Targeted Attacks

  • Posted on:March 28, 2012 at 11:37 am
  • Posted in:Bad Sites, Mac, Malware, Targeted Attacks
  • Author:
    Ivan Macalintal (Threat Research Manager)
5

After our previous finding involving a targeted attack whose payload were OS-dependent, we encountered a more recent run that leads to a malicious file specifically affecting Mac OSX. The said malware, detected as TROJ_MDROPR.LB, is a Trojan being used in Pro-Tibetan targeted campaigns, as initially described by Alienvault. In investigating the campaign, we found that…

Read More

[INFOGRAPHIC] Follow the Money Trail

  • Posted on:March 27, 2012 at 9:33 am
  • Posted in:Malware
  • Author:
    Danielle Veluz (Technical Communications)
0

Last month, we published an infographic Know Your Enemies, which illustrated the different cybercrooks users may “meet” firsthand in the virtual neighborhood. Interestingly, a question was raised to us about the differences between the prices of user information. There are indeed discrepancies between the prices of credit cards between regions. The question, however, is why….

Read More
Tags: cybercrimeFakeAVinfographic

News of Malicious Email Campaign Used As Social Engineering Bait

  • Posted on:March 26, 2012 at 11:50 am
  • Posted in:Exploits, Malware, Spam, Targeted Attacks
  • Author:
    Ivan Macalintal (Threat Research Manager)
0

In an ironic twist of events, the news about the malicious email campaign that leverages political issues related to Tibet is now being used in a separate campaign resulting to malware infection. So far, we have encountered two email campaigns using this particular social engineering technique. The first one, according to reports, has a spoofed…

Read More

[INFOGRAPHIC] A Look into the Most Notorious Mac Threats

  • Posted on:March 22, 2012 at 10:36 am
  • Posted in:Mac, Malware
  • Author:
    Abigail Pichel (Technical Communications)
2

The mass appeal of Apple products is undeniable. Every product or software release is often anticipated and greeted with much fanfare. Its latest release, the OS X Mountain Lion, is no exception. Although the software has yet to be released, there have already been articles written about its features. One of the more-touted features of…

Read More
Tags: Flashbackflashback backdoorflashback malwareflashback trojaninfographicMacmac malwaremac securitymac threats
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.