• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for July 2016

Self-Promoting App in Google Play Cashes In on Pokémon Go

  • Posted on:July 31, 2016 at 11:36 pm
  • Posted in:Bad Sites, Mobile
  • Author:
    Shawn Xing and Ecular Xu (Mobile Threat Response Engineers)
0

The location-based, augmented reality mobile game Pokémon Go is taking the world by storm. Released to much fanfare on July 6th, the app has already overtaken the Facebook app in terms of usage on Android devices, and has been reported by Apple to be the most downloaded app ever during its first week of release. Unsurprisingly, scammers and cybercriminals are quick to cash in on its massive popularity, creating malicious versions of the game and related help apps that lock screens and deliver scareware and adware, even a remote access trojan.

We came across another how-to app in Google Play, touting its ability to help players easily earn Pokécoins, the app’s in-game currency (earned via gameplay or purchased with real-world money). It is in fact a scam.

Read More
Tags: gamingmalicious appsMobilePokemon Go

Law Enforcement and the Deep Web: Willing, but Underfunded

  • Posted on:July 28, 2016 at 4:55 am
  • Posted in:Deep Web
  • Author:
    Martin Roesler (Director, Threat Research)
0

As everyone knows by now, recently there have been some attacks in Germany that have people worried about their security. One question that comes up is – how were the attackers able to obtain their weapons?

In the recent Munich shooting, the attacker obtained his gun (a Glock 17 pistol) from an underground market. I was recently interviewed by the Handelblatt newspaper about underground markets.

Read More
Tags: Deep Webinvestigationlaw enforcement

Economics Behind Ransomware as a Service: A Look at Stampado’s Pricing Model

  • Posted on:July 26, 2016 at 8:15 am
  • Posted in:Malware, Ransomware
  • Author:
    Homer Pacag (Threat Response Engineer)
0

Ransomware have become such a big income earner for cybercriminals that every bad guy wants a piece of the pie. The result? More tech-savvy criminals are offering their services to newbies and cybercriminal wanna-bes in the form of do-it-yourself (DIY) kits—ransomware as a service (RaaS).

Read More
Tags: Brazilian cybercriminal undergroundRaaSrusssian undeground marketStampadounderground market

Courier Scammers Intercept Text Messages, Leave Traces on Google Play

  • Posted on:July 25, 2016 at 3:27 am
  • Posted in:Malware, Mobile
  • Author:
    Ju Zhu (Mobile Threats Analyst)
0

In the first quarter of 2016, Singaporeans were targeted by phone calls that pretended to be from various courier services. These automated phone calls would say that the victim had received a package, and asked them to provide sensitive personal information such as their name, address, National Registration Identity Card (NRIC) number, passport number, and bank account details.

Read More

CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps

  • Posted on:July 20, 2016 at 1:57 am
  • Posted in:Bad Sites, Exploits, Ransomware
  • Author:
    Trend Micro
0

They say imitation is the sincerest form of flattery. Take the case of CrypMIC—detected by Trend Micro as RANSOM_CRYPMIC—a new ransomware family that mimics CryptXXX in terms of entry point, ransom notes and payment site UIs. CrypMIC’s perpetrators are possibly looking for a quick buck owing to the recent success of CryptXXX.

Read More
Tags: CrypMICCryptXXXNeutrino
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.