• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for January 2014

Does the Twitter Follower Scam Actually Work?

  • Posted on:January 30, 2014 at 1:35 am
  • Posted in:Social
  • Author:
    Paul Pajares (Fraud Analyst)
1

We’ve seen “get Twitter followers” scams in the past, but a recent one stood out for a very good reason: it actually delivers what it promises—and then some. This scam tries to attract potential victims by using tweets with the phrase “GET MORE F0LL0WERS” and a URL that is apparently from Google. (In this particular…

Read More
Tags: followersscamsocial mediaTwitter

Eyeing SpyEye

  • Posted on:January 29, 2014 at 1:19 am
  • Posted in:Malware
  • Author:
    Loucif Kharouni (Senior Threat Researcher)
0

Earlier this week, it was announced by the United States Department of Justice that the creator of the notorious SpyEye banking malware, Aleksandr Andreevich Panin (also known as Gribodemon or Harderman), had pleaded guilty before a federal court to charges related to creating and distributing SpyEye. Trend Micro was a key part of this investigation…

Read More
Tags: BendelladjcybercriminalGribodemonlaw enforcementPaninSpyEyeZBOTZeuS

Defending Against Tor-Using Malware, Part 1

  • Posted on:January 28, 2014 at 11:48 pm
  • Posted in:Malware
  • Author:
    Jay Yaneza (Threats Analyst)
0

In the past few months,  the Tor anonymity service as been in the news for various reasons. Perhaps most infamously, it was used by the now-shuttered Silk Road underground marketplace. We delved into the topic of the Deep Web in a white paper titled Deepweb and Cybercrime. In our 2014 predictions, we noted that cybercriminals would go deeper…

Read More
Tags: best practicesnetwork administratorsTor

File Infectors and ZBOT Team Up, Again

  • Posted on:January 28, 2014 at 2:52 am
  • Posted in:Malware
  • Author:
    Nikko Tamaña (Threat Response Engineer)
0

File infectors and ZBOT don’t usually go together, but we recently saw a case where these two kinds of threats did. This particular file infector – PE_PATNOTE.A (MD5 871246d00caffdbed56b1374975c368e) – appends its code to all executable files on the infected system, like so: Figure 1. Before infection Figure 2. After infection What does this code…

Read More
Tags: file infectorinfostealerZBOTZeuS

Fake Adobe Flash Update Aimed At Turkish Users

  • Posted on:January 27, 2014 at 6:04 pm
  • Posted in:Bad Sites, Malware, Social, Spam
  • Author:
    Arabelle Mae Ebora (Fraud Analyst)
0

Fake Flash player scams have been around for a long time, but remarkably they still haven’t gone away. Now, they’re targeting users in Turkey. A recent attack that we found starts off with a video link sent to users via Facebook’s messaging system (sent in Turkish). This “video” prompts users to install a Flash Player…

Read More
Tags: Adobe Flash PlayerFacebookGoogle ChromeTurkeyTwitter
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.