• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Jay Yaneza (Threats Analyst)

Jay Yaneza

Threats Analyst

Brute Force RDP Attacks Plant CRYSIS Ransomware

  • Posted on:February 9, 2017
  • Posted in:Malware, Ransomware
  • Posted by:
    Jay Yaneza (Threats Analyst)
0

In September 2016, we noticed that operators of the updated CRYSIS ransomware family (detected as RANSOM_CRYSIS) were targeting Australia and New Zealand businesses via remote desktop (RDP) brute force attacks. Since then, brute force RDP attacks are still ongoing, with both SMEs and large enterprises across the globe affected. In fact, the volume of these attacks doubled in January 2017 from a comparable period in late 2016. While a wide variety of sectors have been affected, the most consistent target has been the healthcare sector in the United States.

Read More

New GamaPoS Malware Piggybacks on Andromeda Botnet; Spreads in 13 US States

  • Posted on:July 16, 2015
  • Posted in:Botnets, Malware
  • Posted by:
    Jay Yaneza (Threats Analyst)
1

We discovered GamaPoS, a new breed of point-of-sale (PoS) threat currently spreading across the United States and Canada through the Andromeda botnet. GamaPoS is the latest in a long list of threats that scrape off credit card data from PoS systems. Compared to its predecessors, GamaPoS uses malware coded using the .NET framework—a first in PoS…

Read More
Tags: AndromedabotnetGamaPoSPOS malware

Trend Micro Discovers MalumPoS; Malware Targeting Hotels and other US Industries

  • Posted on:June 5, 2015
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Jay Yaneza (Threats Analyst)
2

We first discovered MalumPoS, a new attack tool that threat actors can reconfigure to breach any PoS system they wish to target. Currently, it is designed to collect data from PoS systems running on Oracle® MICROS®, a platform popularly used in the hospitality, food and beverage, and retail industries. Oracle claims that MICROS is used in…

Read More
Tags: MalumPOSPOS malwareUnited States

Identifying and Dividing Networks and Users

  • Posted on:May 8, 2015
  • Posted in:Targeted Attacks
  • Posted by:
    Jay Yaneza (Threats Analyst)
0

Proper network segmentation is the most critical proactive step in protecting networks against targeted attacks.  It is also important for organization to properly identify and categorize their own users and the networks they access. This is an important task as it allows an administrator to properly segment both user privileges and network traffic. Some users will…

Read More
Tags: network segmentationrisk managementthreat assessment

Macro Malware: When Old Tricks Still Work, Part 2

  • Posted on:May 7, 2015
  • Posted in:Malware
  • Posted by:
    Jay Yaneza (Threats Analyst)
0

In the first part of this series, we discussed about the macro malware we have recently seen in the threat landscape. This second entry will delve deeper into the techniques or routines of macro malware. Unintended consequences Let us put things into perspective – by itself, macros are not harmful to the user. Its intended function is…

Read More
Tags: macromacro malware
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.