• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Noriaki Hayashi (Senior Threat Researcher)

Noriaki Hayashi (Senior Threat Researcher)

Senior Threat Researcher

Who’s Behind Operation Huyao?

  • Posted on:November 6, 2014
  • Posted in:Bad Sites, Malware
  • Posted by:
    Noriaki Hayashi (Senior Threat Researcher)
0

As previously discussed Operation Huyao is a well-designed phishing scheme that relys on relay/proxy sites that pull content directly from their target sites to make their phishing sites appear to be more realistic and believable. Only one such attack, targeting a well-known Japanese site, has been documented. No other sites have been targeted by this attack.Publicly available information suggests that…

Read More
Tags: JapanOperation Huyaophishingweb threats

New Phishing Technique Outfoxes Site Owners: Operation Huyao

  • Posted on:November 5, 2014
  • Posted in:Bad Sites, Mobile, Social
  • Posted by:
    Noriaki Hayashi (Senior Threat Researcher)
0

We’ve found a new phishing technique targeting online shopping sites that may significantly change the threat landscape for phishing sites. Conventional phishing sites require an attacker to replicate the targeted site; a more accurate copy is more likely to fool intended victims. This technique we found allows for the creation of nearly perfect copies –…

Read More
Tags: foxhuyaophishingproxyrelay

Chinese Underground Creates Tool Exploiting Apache Struts Vulnerability

  • Posted on:August 14, 2013
  • Posted in:Exploits, Malware, Targeted Attacks, Vulnerabilities
  • Posted by:
    Noriaki Hayashi (Senior Threat Researcher)
0

About a month ago, the Apache Software Foundation released Struts 2.3.15.1, an update to the popular Java Web application development framework. The patch was released because vulnerabilities in older versions of Struts could allow attackers to run arbitrary code on vulnerable servers. Since then, we’ve found that hackers in the Chinese underground have created an…

Read More
Tags: apacheexploit kithack toolstrutsundergroundvulnerability

KakaoTalk Targeted By Fake and Trojanized Apps

  • Posted on:July 18, 2013
  • Posted in:Malware, Mobile
  • Posted by:
    Noriaki Hayashi (Senior Threat Researcher)
0

Instant messaging apps are battling it out and trying to become the next popular means of communication that people will use. For example, in Japan, both Line and KakaoTalk – two popular chat apps – both claim to have more than 100 million users in Japan. It shouldn’t be a surprise that cybercriminals are using…

Read More
Tags: androidfake appsmobile malwareTrojanized apps

Finding Banking Trojans in Eastern Asia – Report From CeCOS VII

  • Posted on:May 10, 2013
  • Posted in:Malware, Mobile, Spam
  • Posted by:
    Noriaki Hayashi (Senior Threat Researcher)
0

Last April 23 – 25, I attended the seventh Counter eCrime Operations Summit (CeCOS VII) initiated by the Anti-Phishing Working Group (APWG). This year, the conference was held in Buenos Aires, Argentina. Security experts from Japan, Paraguay, Brazil, North America, Russia, and India flew to the South American city to discuss about the developments in…

Read More
Tags: APWGmobile phishingphishingsecurity conference
Page 1 of 412 › »

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • Microsoft November 2019 Patch Tuesday Reveals 74 Patches Before Major Windows Update
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.