• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for February 2015

TorrentLocker Ransomware Uses Email Authentication to Refine Spam Runs

  • Posted on:February 27, 2015 at 3:40 pm
  • Posted in:Malware, Ransomware, Spam
  • Author:
    Jon Oliver (Senior Architect)
0

In monitoring the ransomware TorrentLocker, we noticed a new development in its arrival vector. In previous entries, we noted that a particular wave of the crypto-ransomware was using spammed messages that were designed to evade spam filters. Our research now shows that TorrentLocker malware are using emails that are designed to pass spam filters and…

Read More
Tags: DMARCemail authenticationSpamTorrentLocker

Extended Validation Certificates: Warning Against MITM Attacks

  • Posted on:February 25, 2015 at 9:09 pm
  • Posted in:Bad Sites, Vulnerabilities
  • Author:
    Chris Bailey (General Manager, Trend Micro SSL)
0

The recent Superfish incident has raised more concerns that SSL/TLS connections of users can be intercepted, inspected, and re-encrypted using a private root certificate installed on the user system. In effect, this is a man-in-the-middle (MITM) attack carried out within the user’s own system. We believe that site owners adopting extended validation (EV) certificates would help…

Read More
Tags: MITMSSLsuperfish

2014 Spam Landscape: UPATRE Trojan Still Top Malware Attached to Spam

  • Posted on:February 25, 2015 at 1:07 pm
  • Posted in:Spam
  • Author:
    Michael Casayuran (Anti-spam Research Engineer)
0

The malware UPATRE was gained much prominence following the demise of the Blackhole Exploit kit. It was since known as one of the top malware seen attached to spammed messages and continues to be so all throughout 2014 with particularly high numbers seen in the fourth quarter of the year. We have released our annual roundup…

Read More
Tags: Spam

Arid Viper Update: Attacks Ongoing, Threat Actors on the Move

  • Posted on:February 24, 2015 at 10:46 pm
  • Posted in:Targeted Attacks
  • Author:
    Trend Micro
0

Last week, we released a research paper titled “Operation Arid Viper: Bypassing the Iron Dome” where we detailed two related campaigns. To recall, here are our key findings related to the two campaigns: Palestinian threat actors have staged a targeted attack, Operation Arid Viper, to exfiltrate data from high-profile targets in the Israeli government and have…

Read More
Tags: advtravelarid viperGazaIsraelTargeted Attack

2014 Annual Security Roundup: Magnified Losses, Amplified Need for Cyber-Attack Preparedness

  • Posted on:February 24, 2015 at 5:00 am
  • Posted in:Bad Sites, Botnets, Exploits, Malware, Targeted Attacks, Vulnerabilities
  • Author:
    Trend Micro
0

2014 was a year where cybercriminal attacks crippled both likely and unlikely targets. A year rife with destructive attacks, 2014 proved to be a difficult one for individuals and companies who were victimized by these threats. Massive data breach disclosures came one after another in 2014 in much more rapid succession than past years. The…

Read More
Tags: 2014 roundupdata breachExploitsPOSransomwaretargeted attacksVulnerabilities
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.