• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: dropbox

PlugX RAT With ā€œTime Bombā€ Abuses Dropbox for Command-and-Control Settings

  • Posted on:June 25, 2014 at 6:05 am
  • Posted in:Targeted Attacks
  • Author:
    Maersk Menrige (Threats Analyst)
1

Monitoring network traffic is one of the meansĀ for IT administrators to determine if there is an ongoing targeted attack in the network. Ā Remote access tools or RATs, commonly seen in targeted attack campaigns, are employed to establish command-and-control (C&C) communications.Ā  Although the network traffic of these RATs, such as Gh0st, PoisonIvy, Hupigon, and PlugX, among…

Read More
Tags: lateral movementplugXtargeted attacksthreat intelligence

Social Engineering Watch: UPATRE Malware Abuses Dropbox Links

  • Posted on:June 9, 2014 at 4:56 pm
  • Posted in:Malware, Spam
  • Author:
    Maria Manly (Anti-spam Research Engineer)
0

Threats like UPATRE are continuously evolving as seen in the development of the techniques used so as to bypass security solutions. UPATRE malware are known downloaders of information stealers likeĀ ZeuS that typically spread via email attachments. We recently spotted several spam runs that use the popularĀ file hosting service Dropbox. These use embedded links lead to…

Read More
Tags: Canadian pharmacycybercrimeDropboxinformation stealerNECURSrootkitSpamspam mailsUPATREZBOTZeuS

Analysis: Abuse of Custom Actions in Windows Installer MSI to Run Malicious JavaScript, VBScript, and PowerShell Scripts

  • Posted on:April 23, 2019 at 5:13 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

We recently discovered malicious Microsoft Software Installation (MSI) files that download and execute other files, and could bypass traditional security solutions. Malicious actors can abuse custom actions in these files to execute malicious scripts and drop malware that are either capable of initiating a system shutdown or targeting financial systems located in certain locations.

Read More
Tags: JavaScriptJScriptPowershellVBScriptWindows

How Machine Learning Techniques Helped Us Find Massive Certificate Abuse by BrowseFox

  • Posted on:June 11, 2018 at 5:00 am
  • Posted in:Bad Sites, Machine Learning
  • Author:
    Jon Oliver (Senior Architect)
0

By employing machine learning algorithms, we were able to discover an enormous certificate signing abuse by BrowseFox, a potentially unwanted application (PUA) detected by Trend Micro as PUA_BROWSEFOX.SMC. BrowseFox is a marketing adware plugin that illicitly injects pop-up ads and discount deals. While it uses a legitimate software process, the adware plugin may be exploited…

Read More

OSX Malware Linked to Operation Emmental Hijacks User Network Traffic

  • Posted on:July 10, 2017 at 7:00 am
  • Posted in:Malware
  • Author:
    Rubio Wu (Threats Analyst)
0

The OSX_DOK malware showcases sophisticated features such as certificate abuse and security software evasion that affects machines using Apple’s OS X operating system. This malware, which specifically targets Swiss banking users, uses a phishing campaign to drop its payload, which eventually results in the hijacking of a user’s network traffic using a Man-in-the- Middle (MitM) attack. OSX_DOK seems to be another version of WERDLOD, which is a malware that was used during the Operation Emmental campaigns.

Read More
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.