• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Kervin Alintanahin (Threats Analyst)

Kervin Alintanahin

Threats Analyst

Operation Tropic Trooper: Old Vulnerabilities Still Pack a Punch

  • Posted on:May 13, 2015
  • Posted in:Targeted Attacks
  • Posted by:
    Kervin Alintanahin (Threats Analyst)
0

Major government sectors and corporations in both Taiwan and the Philippines have become the latest targets in an ongoing attack campaign in the Asia Pacific region. The threat actors behind Operation Tropic Trooper—we named specifically for its choice of targets—aim to steal highly classified information from several Taiwanese government ministries and heavy industries as well…

Read More
Tags: Operation Tropic Troopertargeted attacks

Targeted Attacks: Stealing Information Through Google Drive

  • Posted on:October 21, 2014
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Kervin Alintanahin (Threats Analyst)
0

Using cloud-based sharing sites is not a new routine for bad guys. Aside from providing free storage for their malicious files, these legitimate sites are used to evade security vendors and researchers. We have seen malware that have taken advantage of these sites, such as DropBox, Sendspace, and Evernote. We can now include Google Drive to…

Read More
Tags: golangGoogle DriveMalware

KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support”

  • Posted on:July 2, 2014
  • Posted in:Bad Sites, Malware, Targeted Attacks
  • Posted by:
    Kervin Alintanahin (Threats Analyst)
0

In announcing the release of the 64-bit version for Chrome last month, Google mentioned that one of the primary drivers of the move was that majority of Windows users are now using 64-bit operating systems. The adoption rate for 64-bit for Windows has been a tad slower than what Microsoft had initially predicted, but it has been steady,…

Read More
Tags: 64-bitadvanced persistent threatAPTKIVARSMalwaretargeted attacks

PLEAD Targeted Attacks Against Taiwanese Government Agencies

  • Posted on:May 23, 2014
  • Posted in:Exploits, Malware, Targeted Attacks, Vulnerabilities
  • Posted by:
    Kervin Alintanahin (Threats Analyst)
2

In the recent 2H-2013 Targeted Attack Roundup Report we noted that we have been seeing several targeted attack campaign-related attacks in Taiwan. We are currently monitoring a campaign that specifically targets government and administrative agencies in Taiwan. We are naming this specific campaign PLEAD because of the letters of the backdoor commands issued by the related…

Read More
Tags: APTgovernmentgovernment agenciesMalwarePLEADspear phishingTaiwanTaiwaneseTargeted Attacktargeted attack campaign

Kunming Attack Leads to Gh0st RAT Variant

  • Posted on:March 13, 2014
  • Posted in:Malware, Spam, Targeted Attacks
  • Posted by:
    Kervin Alintanahin (Threats Analyst)
0

Recently, a mass stabbing incident in Kunming, China left 29 victims dead. We came across an email which used this incident as social engineering bait. To appear legitimate, the message talks about the incident at length and cites several news outlets as its sources. It encourages the user to open the attached document for more information….

Read More
Tags: GhostnetKunmingRAT
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.