We have been closely monitoring developments on the DUQU malware since our initial blog post when the threat broke the news. And just recently, the Hungary-based security laboratory that initially reported about DUQU released more information that sheds more light into the nature of the said threat. Their report indicates that a Microsoft Word document…
Read MoreKarl Dominguez
Threat Response Engineer
The security industry is currently buzzing with talks about a threat dubbed as the precursor to the next STUXNET. According to a Symantec analysis, portions of the code are very similar to STUXNET, and was likely written by the same cybercriminals as the well-known threat. Unlike STUXNET, however, Duqu does not have code that suggests…
Read MoreNewer and more complicated Android malware variants are expected to emerge, along with the rising number of malicious Android apps. A new backdoor that we were able to analyze proves just that. Malware targeting the Android platform are continuously improving in performance as well as using new techniques to thwart analysis and to avoid detection….
Read MoreTrend Micro recently came across a botnet that turns an infected system into an involuntary Bitcoin miner. Bitcoin is a digital currency that uses peer-to-peer (P2P) networks to track and verify transactions. Bitcoins are generated by a free Bitcoin miner application. The malware, detected as BKDR_BTMINE.MNR, installs the mining software in systems. It uses the…
Read MoreWe recently reported about a blackhat search engine optimization (SEO) campaign that targeted not only Windows but Mac users as well. It has just been a few weeks since the role of Mac users as potential victims in the threat landscape has been increasingly established but more and more threats targeting Mac users are being found. FAKEAV for…
Read More