• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Brooks Li and Joseph C. Chen (Threats Analysts)

Threats Analysts

Updated Sundown Exploit Kit Uses Steganography

  • Posted on:December 29, 2016
  • Posted in:Exploits, Malware, Vulnerabilities
  • Posted by:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

This year has seen a big shift in the exploit kit landscape, with many of the bigger players unexpectedly dropping out of action. The Nuclear exploit kit operations started dwindling in May, Angler disappeared around the same time Russia’s Federal Security Service made nearly 50 arrests last June, and then in September Neutrino reportedly went private and shifted focus to select clientele only. Now, the most prominent exploit kits in circulation are RIG and Sundown. Both gained prominence shortly after Neutrino dropped out of active circulation.

Read More
Tags: exploit kitsteganographySundown

New Bizarro Sundown Exploit Kit Spreads Locky

  • Posted on:November 4, 2016
  • Posted in:Bad Sites, Exploits, Ransomware
  • Posted by:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

A new exploit kit has arrived which is spreading different versions of Locky ransomware. We spotted two cases of this new threat, which is based on the earlier Sundown exploit kit. Sundown rose to prominence (together with Rig) after the then-dominant Neutrino exploit kit was neutralized.

Called Bizarro Sundown, the first version was spotted on October 5 with a second sighting two weeks later, on October 19. Users in Taiwan and Korea made up more than half of the victims of this threat. Bizarro Sundown shares some features with its Sundown predecessor but added anti-analysis features. The October 19 attack also changed its URL format to closely resemble legitimate web advertisements. Both versions were used exclusively by the ShadowGate/WordsJS campaign.

Read More
Tags: Bizarro Sundownexploit kitsLockyShadowGateSundown

Exploit Kits in 2015: Scale and Distribution

  • Posted on:March 15, 2016
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

In the first part of this series of blog posts, we discussed what new developments and changes in the exploit kit landscape were seen in 2015. In this post, we look at the scale of the exploit kit problem – how many users were affected, which exploit kits are popular, and where are the users coming from?

Read More
Tags: Anglerexploit kitmagnitude

Exploit Kits in 2015: Flash Bugs, Compromised Sites, Malvertising Dominate

  • Posted on:March 10, 2016
  • Posted in:Exploits, Malware, Vulnerabilities
  • Posted by:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

Threats never stand still, and exploits kits were no exception. 2015 saw multiple changes to this part of the threat landscape: freshly-discovered exploits were added, and compromised websites and malvertising were used to deploy and spread threats using exploit kits. Exploit kits were a key part of the threat landscape in 2015. In this series of posts,…

Read More
Tags: Adobeadobe flashexploit kitInternet ExplorerVulnerabilities

Angler and Nuclear Exploit Kits Integrate Pawn Storm Flash Exploit

  • Posted on:November 3, 2015
  • Posted in:Vulnerabilities
  • Posted by:
    Brooks Li and Joseph C. Chen (Threats Analysts)
1

When it comes to exploit kits, it’s all about the timing. Exploit kits often integrate new or zero-day exploits in the hopes of getting a larger number of victims with systems that may not be as up-to-date with their patches. We found two vulnerabilities that were now being targeted by exploit kits, with one being…

Read More
Tags: adobe flashAngler Exploit KitExploitexploit kitFlashnuclear exploit kitPawn Stormvulnerability
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.