• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for July 2013

The Current State of the Blackhole Exploit Kit

  • Posted on:July 31, 2013 at 9:42 pm
  • Posted in:Bad Sites, Malware, Spam
  • Author:
    Jon Oliver (Senior Architect)
0

The Blackhole Exploit Kit is one of the most notorious exploit kits currently in circulation among the cybercriminal underground today. Thus, we continuously monitor for incidents and attacks involving the exploit kit itself. Last week we reported about the spam campaign leveraging the birth of Prince William’s and Kate Middleton’s son. Our analysis of the…

Read More
Tags: BHEKblackhole exploit kiteBayExploitsFacebookMalwareroyal babySpamTwitter

Andromeda Botnet Gets an Update

  • Posted on:July 31, 2013 at 6:37 am
  • Posted in:Botnets
  • Author:
    Trend Micro Forward-Looking Threat Research Team
0

The Andromeda botnet is still active in the wild and not yet dead. In fact, it’s about to undergo a major update real soon. This botnet was first reported back in 2011 but has recently risen to prominence due to the latest modifications in the threat. Initially, this project to update Andromeda was about to…

Read More
Tags: AndromedabotnetMalwareunderground

Trend Micro Solutions for PE_EXPIRO

  • Posted on:July 30, 2013 at 1:27 pm
  • Posted in:Malware
  • Author:
    Cyrus Ramos (Technical Support)
0

As July winds down, infection counts for PE_EXPIRO have been trending downwards recently. This file infector can infect Windows files on both 32-bit (detected as PE_EXPIRO.JX) and 64-bit (detected as PE64_EXPIRO.JX) systems. At its peak, we saw thousands of infection counts but then dropped eventually (as seen in our Smart Protection Network feedback). Because of…

Read More
Tags: EXPIROfile infectorsMalware

Malware Hijacks Social Media Accounts Via Browser Add-ons

  • Posted on:July 30, 2013 at 10:05 am
  • Posted in:Bad Sites, Social, Spam
  • Author:
    Don Ladores (Threat Response Engineer)
2

We spotted yet another threat lurking around social media sites targeting users of either Google Chrome or Mozilla Firefox. This threat uses fake extensions for both browsers to infiltrate user systems and hijack social media accounts – specifically, Facebook, Google+, and Twitter accounts. To install these fake extensions, users would see various lures on social…

Read More
Tags: ChromeF-SecureFacebookGooglemalicious browser plug-insocial media threatsTwitter

Header Spoofing Hides Malware Communication

  • Posted on:July 28, 2013 at 8:54 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Roddell Santos (Threats Analyst)
0

Spoofing – whether in the form of DNS, legitimate email notification, IP, address bar – is a common part of Web threats. We’ve seen its several incarnations in the past, but we recently found a technique known as header spoofing, which puts a different spin on evading detection. Header spoofing is when a URL appears…

Read More
Tags: botnetheader spoofingStealRat
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.