• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Trend Micro Cyber Safety Solutions Team

Cyber Safety Solutions Team

Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions

  • Posted on:September 4, 2019
  • Posted in:Exploits, Malware, Vulnerabilities
  • Posted by:
    Trend Micro Cyber Safety Solutions Team
0

After looking into the recent variant of the Glupteba dropper delivered from a malvertising attack, we found that the dropper downloaded two undocumented components aside from the Glupteba malware—a browser stealer and a router exploiter. Another notable feature is that the malware can now also update its command and control server address using data from bitcoin transactions.

Read More
Tags: cryptocurrencymalvertisingrouter

New SLUB Backdoor Uses GitHub, Communicates via Slack

  • Posted on:March 7, 2019
  • Posted in:Malware
  • Posted by:
    Trend Micro Cyber Safety Solutions Team
0

We discovered a malware that uses three different online services — including Slack and GitHub– as part of its routine. Analysis of the attacker’s tools, techniques, and procedures lead us to believe that this might be a targeted attack from very capable threat actors.

Read More
Tags: backdoorCVE-2015-1701CVE-2018-8174SLUB

New Magecart Attack Delivered Through Compromised Advertising Supply Chain

  • Posted on:January 16, 2019
  • Posted in:Malware, Social
  • Posted by:
    Trend Micro Cyber Safety Solutions Team
0

On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time, we found their malicious skimming code (detected by Trend Micro as JS_OBFUS.C.) loaded on 277 e-commerce websites providing ticketing, touring, and flight booking services as well as self-hosted shopping cart websites from prominent cosmetic, healthcare, and apparel brands. Trend Micro’s machine learning and behavioral detection technologies proactively blocked the malicious code at the time of discovery (detected as Downloader.JS.TRX.XXJSE9EFF010).

The activities are unusual, as the group is known for injecting code into a few compromised e-commerce websites then keeping a low profile during our monitoring. Further research into these activities revealed that the skimming code was not directly injected into e-commerce websites, but to a third-party JavaScript library by Adverline, a French online advertising company, which we immediately contacted.

Read More
Tags: Code InjectionMagecartOnline Skimming

Perl-Based Shellbot Looks to Target Organizations via C&C

  • Posted on:November 1, 2018
  • Posted in:Botnets, Internet of Things, Malware
  • Posted by:
    Trend Micro Cyber Safety Solutions Team
0

We uncovered an operation of a hacking group, which we’re naming “Outlaw” (translation derived from the Romanian word haiduc, the hacking tool the group primarily uses), involving the use of an IRC bot built with the help of Perl Shellbot. The group distributes the bot by exploiting a common command injection vulnerability on internet of things (IoT) devices and Linux servers. Further research indicates that the threat can also affect Windows-based environments and even Android devices.

Read More
Tags: androidIOTIRC botLinuxWindows

Gathering Insights on the Reemergence and Evolution of Old Threats Through Managed Detection and Response

  • Posted on:October 31, 2018
  • Posted in:Malware, Ransomware, Spam, Vulnerabilities
  • Posted by:
    Trend Micro Cyber Safety Solutions Team
0

Smart Protection Network (SPN) data and observations from Managed Detection and Response (MDR) for the North American region show the persistence of older threats and tactics: delivery methods such as spam emails are still going strong, while ransomware attacks have seen a renewed vigor alongside newer threats such as cryptocurrency mining malware in the third quarter of 2018.

However, the prevalence of these older threats should not be misconstrued as a sign that threat actors are resting on their laurels. In fact, it should be taken as proof that they are constantly improving proven tools and techniques to get ahead in the never-ending cat-and-mouse game between cybercriminals and security providers.

Read More
Tags: cryptocurrency minersManaged Detection and ResponseransomwareVulnerabilities
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.