• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2016

Olympic Vision Business Email Compromise Campaign Targets Middle East and Asia Pacific Companies

  • Posted on:March 16, 2016 at 6:12 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Ryan Flores (Threat Research Manager)
0

There’s a reason why the FBI estimates that the average loss caused by Business Email Compromise (BEC) to beĀ $130,000 per company. Employees are not familiar with current social engineering strategies, and the network setup is not equipped enough to keep the threat from getting in the network. And this same situation is clearly depicted in an ongoing BEC campaign targeting companies in the US, Middle East, and Asia.

The attack, which has been traced back to Lagos and Kuala Lumpur, targets companies from several industries such as real estate, manufacturing, and construction.

Read More
Tags: BECbusiness email compromiseCEO fraudcorporate email scaminvoice fraud

What We Can Learn From the Bangladesh Central Bank Cyber Heist

  • Posted on:March 15, 2016 at 8:30 pm
  • Posted in:Malware, Targeted Attacks
  • Author:
    Martin Roesler (Director, Threat Research)
0

The reported hacking of the Bangladesh central bank’s accounts with the U.S. Federal Reserve once again shows how bad the impact of cyberattacks to organizations, enterprises or even nation-states can be. Peel off all the other layers in this narrative for a moment—the amount of money stolen, the alleged players, the politics—and at its core, we have the same tactics and procedures any enterprising criminal will carry out against his or her intended target.

Read More
Tags: cybercrimecybercrime underground

Exploit Kits in 2015: Scale and Distribution

  • Posted on:March 15, 2016 at 5:43 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

In the first part of this series of blog posts, we discussed what new developments and changes in the exploit kit landscape were seen in 2015. In this post, we look at the scale of the exploit kit problem – how many users were affected, which exploit kits are popular, and where are the users coming from?

Read More
Tags: Anglerexploit kitmagnitude

Massive Malvertising Campaign in US Leads to Angler Exploit Kit/BEDEP

  • Posted on:March 14, 2016 at 11:31 am
  • Posted in:Bad Sites, Exploits, Vulnerabilities
  • Author:
    Joseph C Chen (Fraud Researcher)
1

Top-tier news sites, entertainment portals, and political commentary sites were among the victims of a massiveĀ malvertising campaign related to theĀ Angler Exploit Kit. This campaign isĀ targeting users in the United States and may haveĀ affected tens of thousands of users in the last 24 hours alone. Based on our monitoring, the malicious ads were delivered by a compromised ad network in theseĀ highly-visited mainstream websites. As of this writing, while the more popular portals appear to be no longer carrying the bad ad, the malvertising campaignĀ is still ongoing and thus continues to put users at risk of downloading malware into their systems.

Read More
Tags: AD networkAngler Exploit KitBEDEPCVE-2015-8651CVE-2016-0034malvertisementUnited States

Adobe Releases Flash Security Update to Patch Exploited Vulnerability

  • Posted on:March 10, 2016 at 3:05 pm
  • Posted in:Vulnerabilities
  • Author:
    Paul Oliveria (Technical Communications)
0

Following itsĀ release of a security update for Acrobat and Reader, Adobe hasĀ released another one, this time to address 23 reported vulnerabilities in Flash. In its advisory (APSB16-08), Adobe notes that this patch addresses critical vulnerabilitiesĀ that could allow an attack to gain control of an affected system. They further note that one of the vulnerabilities (CVE-2016-1010)Ā ā€œis being used in limited, targeted attacks.”

Read More
Tags: AdobeVulnerabilitiesvulnerability
Page 2 of 4 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.