• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Jake Soriano (Technical Communications)

Jake Soriano

Technical Communications

Rotten Eggs: An Easter Malware Campaign

  • Posted on:April 12, 2009
  • Posted in:Malware
  • Posted by:
    Jake Soriano (Technical Communications)
6

Easter, like any other holiday, will not pass without cyber criminals attempting to exploit the occasion for their own malicious operations. Trend Micro Advanced Threats Researcher Paul Ferguson discovered websites that seem to be related to Easter, except they are malicious and were created to spew malware onto PCs. He adds that there is evidence…

Read More

Waledac Localizes Social Engineering

  • Posted on:March 16, 2009
  • Posted in:Botnets
  • Posted by:
    Jake Soriano (Technical Communications)
5

The Waledac gang continues to improve on Storm’s tried and tested spamming technique. Fake news and alarming headlines are standard Storm email contents since the botnet’s most notorious variant, NUWAR, started sending out messages warning users of looming nuclear wars. Waledac recently started a new spamming operation using that same old social engineering technique: Figures…

Read More

New DOWNAD Generates More URLs

  • Posted on:March 11, 2009
  • Posted in:Malware
  • Posted by:
    Jake Soriano (Technical Communications)
4

Trend Micro detects yet another variant of the infamous DOWNAD family, WORM_DOWNAD.KK. DOWNAD (also known as Conficker) is one of the more destructive outbreak worms in the Web threat era, with numbers matching that of giant botnets Storm and Kraken. WORM_DOWNAD.KK closely follows the trail of WORM_DOWNAD.A and WORM_DOWNAD.AD (which just late last month was…

Read More

Crack Sites Distribute VIRUX and FakeAV

  • Posted on:March 2, 2009
  • Posted in:Bad Sites
  • Posted by:
    Jake Soriano (Technical Communications)
8

Trend Micro researchers discovered that warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files. Figure 1. Crack sites are being…

Read More

Xbox Live Losers Resort to Hacking

  • Posted on:February 25, 2009
  • Posted in:Bad Sites
  • Posted by:
    Jake Soriano (Technical Communications)
2

Xbox Live users, specifically winning players, are being targeted by hackers. Researchers believe that the attacks are done so other Xbox Live users could get back at the players who beat them in a game. A BBC report explains that the tools used in this hacking attack do not target the Xbox Live network but…

Read More
Tags: Xbox Live
Page 1 of 1412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.