• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for April 2015

Latest Flash Exploit in Angler EK Might Not Really Be CVE-2015-0359

  • Posted on:April 22, 2015 at 8:59 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Peter Pi (Threats Analyst)
1

We have found an interesting discrepancy in how the Angler exploit kit targets Adobe Flash. The Angler exploit kit is known for its use of various Adobe Flash Player exploits. Reports have indicated that Angler has started targeting CVE-2015-0359, a vulnerability that was fixed in Adobe’s April 2015 update. CVE-2015-0359 is a race condition vulnerability that occurs because ByteArray::Write is…

Read More
Tags: adobe flashAnglerCVE-2015-0359exploit kitUAF

IIS At Risk: The HTTP Protocol Stack Vulnerability

  • Posted on:April 22, 2015 at 1:58 am
  • Posted in:Vulnerabilities
  • Author:
    Virendra Bisht (Vulnerability Researcher)
0

Unpatched versions of Microsoft’s Internet Information Services (IIS) web server are vulnerable to a remote denial of service attack that can prove to be very threatening if set against critical systems. The vulnerability, which was fixed by Microsoft in MS15-034 as part of the April 2015 Patch Tuesday cycle, can trigger the blue screen of death or more commonly known as…

Read More
Tags: HTTPIISweb server

Resurrection of the Living Dead: The “Redirect to SMB” Vulnerability

  • Posted on:April 21, 2015 at 4:10 pm
  • Posted in:Vulnerabilities
  • Author:
    Trend Micro Deep Security Labs
0

An 18-year-old vulnerability called Redirect to SMB has been resurrected with a new attack vector. This vulnerability can be used to redirect a victim to a malicious Server Message Block (SMB) server, without any direct action from the user except visiting a website. If the SMB security policy is not secure enough, the SMB client will try to make an authenticated…

Read More
Tags: redirect to SMB

Without a Trace: Fileless Malware Spotted in the Wild

  • Posted on:April 20, 2015 at 1:03 pm
  • Posted in:Malware
  • Author:
    Michael Marcos (Threat Response Engineer)
0

With additional analysis from David Agni Improvements in security file scanners are causing malware authors to deviate from the traditional malware installation routine. It’s no longer enough for malware to rely on dropping copies of themselves to a location specified in the malware code and using persistence tactics like setting up an autostart feature to…

Read More
Tags: filelessfileless malwareMalwarePhasebotPOWELIKSXswDownloader

Fiesta Exploit Kit Spreading Crypto-Ransomware – Who Is Affected?

  • Posted on:April 20, 2015 at 2:56 am
  • Posted in:Malware, Ransomware
  • Author:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

Exploits kits have long been used to deliver threats to users, but they seem to have gone retro: it was recently being used to deliver fake antivirus malware. We closely monitor exploit kit activity because of their widespread use (we discussed their use in malvertising recently), so it was no great surprise to see the Fiesta…

Read More
Tags: crypto-ransomwarefake antivirusFiesta exploit kit
Page 2 of 5 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.