• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: kelihos

KELIHOS Spambot Highlights Security Risk in SPF Records

  • Posted on:October 1, 2014 at 2:50 am
  • Posted in:Botnets, Malware, Spam
  • Author:
    Michael Casayuran (Anti-spam Research Engineer)
0

During the last week of August 2014, we observed a salad spam surge caused by KELIHOS spambot.  Salad spam contains gibberish words in the email body, and is usually employed by cybercriminals so as to bypass spam filters. Here are some samples we spotted: Figures 1-2: Screenshots of spammed messages Majority of this outbreak’s victims are from the…

Read More
Tags: botnetemail securityKELIHOSMalwareSpamSPFspoofing

KELIHOS Worm Emerges, Takes Advantage of Boston Marathon Blast

  • Posted on:April 16, 2013 at 11:52 pm
  • Posted in:Malware, Social, Spam
  • Author:
    Aisa Escober (Threat Response Engineer)
5

Within a short time period of less than 24 hours, cybercriminals have already taken advantage of Monday’s explosion at the Boston Marathon as a newsworthy item. My colleague Mary Ermitano-Aquino noted a spam outbreak of more than 9,000 Blackhole Exploit Kit (clarification below) spammed messages, all related to the said tragedy that killed at least three people…

Read More
Tags: boston marathon blast

A Closer Look At DYRE Malware, Part 1

  • Posted on:October 8, 2014 at 12:25 pm
  • Posted in:Malware
  • Author:
    Trend Micro Cyber Safety Solutions Team
2

We’re nearing the holiday season and some of you might be going for some early holiday shopping—checking your money to go for a shopping splurge. The holiday season also ushers in cybercrime activities that are typical this time of the year:

  • We have seen a surge of fake bank emails. We’ve also seen other forms of spammed threats, including KELIHOS, VAWTRACK, and even some forms of the 419 scam.
  • We have also witnessed the increase in BANKER malware. Variants of this malware family attempt to steal sensitive information, such as banking credentials and email account details. They employ info-stealing techniques, often times, phishing pages that mimic the official banking sites, to get a user’s bank information, such as user names, passwords, or card codes. The stolen information could then be sent to a predetermined email address, to drop zones in hosted servers or to a URL via HTTP post.
Read More
Tags: banking malwareDYRDYREMalwareparcel scamSpam

Cybercriminals Hitchhike on the News of MH17 Crash

  • Posted on:July 18, 2014 at 2:01 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Trend Micro
0

A few months after the case of the missing Malaysia Airlines Flight 370, the world was shocked again with another tragic news involving the crash of Malaysia Airlines 777 (also known as MH17) over Ukraine that killed nearly 300 passengers and crew members. As with past incidents, cybercriminals are quick to take advantage of the said…

Read More
Tags: malaysia airlinesmh17scams

Wikipedia in Your Salad (Spam)

  • Posted on:April 21, 2014 at 12:33 pm
  • Posted in:Spam
  • Author:
    Maria Manly (Anti-spam Research Engineer)
0

Spammers are constantly trying new ways to bypass filters to deliver spam. One of the more typical methods is the use of word salad spam, wherein spammed messages are filled with random words. We recently noticed a spike in salad spam that’s circulating in the wild. Aside from the sudden increase, what’s interesting about this…

Read More
Tags: SpamWikipediaword salad spam
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.