• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2013

Malware Phishes With Fake Facebook Security Check Page

  • Posted on:March 31, 2013 at 10:58 pm
  • Posted in:Bad Sites, Malware, Social
  • Author:
    Anthony Joe Melgarejo (Threat Response Engineer)
3

Facebook’s enduring popularity means that cybercriminals find it a tempting lure for their malicious misdeeds. A newly-spotted phishing scam is no exception. We came across a malware sample, which we detected as TSPY_MINOCDO.A. The goal is to redirect users who visit Facebook to a spoofed page, which claims to be a part of the social networking…

Read More
Tags: Facebookphishingsecurity check

Black Hat Europe 2013 in Amsterdam

  • Posted on:March 31, 2013 at 4:20 pm
  • Posted in:Bad Sites
  • Author:
    Rainer Link (Senior Threat Researcher)
0

Black Hat Europe is a series of highly technical security conferences that gathers professionals, researchers, and leaders of the infosec industry. Below are some of my thoughts about the interesting discussions I attended, which include a compelling talk by Trend Micro threat researcher Kyle Wilhoit about ICS/SCADA. Day 1 My colleague Kyle and I joined…

Read More
Tags: BlackHatSCADAsecurity conference

When Hacktivism Meets Crime

  • Posted on:March 29, 2013 at 3:14 am
  • Posted in:Bad Sites
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
1

Hacktivism and crime is a toxic combination for the health of the Internet. This was shown once again in the recent DDOS attack against Spamhaus.org that peaked at 300 Gbit/s. Spamhaus is a non-profit anti-spam organization that helps to filter spam for millions of Internet users. When Spamhaus goes down a lot of inboxes will…

Read More

Summary of March 20 Korea MBR Wiper

  • Posted on:March 27, 2013 at 12:03 pm
  • Posted in:Malware, Targeted Attacks
  • Author:
    Trend Micro
0

Our investigation and analysis of last week’s MBR wiper attacks in South Korea is still ongoing. This post summarizes our results and available protection. The MBR wiper arrives as a dropper file (detected as TROJ_KILLMBR.SM), which drops four files onto the system: Agentbase.exe –the actual MBR wiper, also detected as TROJ_KILLMBR.SM ~pr1.tmp – a UNIX…

Read More

Backdoor Uses Evernote as Command-and-Control Server

  • Posted on:March 27, 2013 at 8:15 am
  • Posted in:Malware
  • Author:
    Nikko Tamaña (Threat Response Engineer)
1

With its rich functionality and accessibility, Evernote is a popular note-taking tool for its many users. Unfortunately, it may also provide the perfect cover for cybercriminals’ tracks. We recently uncovered a malware that appears to be using Evernote as a communication and control (C&C) server. Detected as BKDR_VERNOT.A, the malware attempts to connect to Evernote…

Read More
Tags: evernote
Page 1 of 612 › »

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • Microsoft November 2019 Patch Tuesday Reveals 74 Patches Before Major Windows Update
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.