• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Kyle Wilhoit (Senior Threat Researcher)

Kyle Wilhoit

Senior Threat Researcher

KillDisk and BlackEnergy Are Not Just Energy Sector Threats

  • Posted on:February 11, 2016
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Kyle Wilhoit (Senior Threat Researcher)
2

Our new intelligence on BlackEnergy expands previous findings on the first wide-scale coordinated attack against industrial networks. Based on our research that we will further outline below, attackers behind the outages in two power facilities in Ukraine in December likely attempted similar attacks against a mining company and a large railway operator in Ukraine.

Read More
Tags: BlackEnergyenergy sectorKilldiskukraine

Do Attribution and Motives Matter?

  • Posted on:October 6, 2015
  • Posted in:Targeted Attacks
  • Posted by:
    Kyle Wilhoit (Senior Threat Researcher)
0

Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, we think it is much more important to ask: what information about the attacker can help organizations protect themselves better?

Let’s look at things from the perspective of a network administrator trying to defend their organization. If someone wants to determine who was behind an attack on their organization, maybe the first thing they’ll do use IP address locations to try and determine the location of an attacker. However, say an attack was traced to a web server in Korea. What’s not to say that whoever was responsible for the attack also compromised that server? What makes you think that site’s owner will cooperate with your investigation?

Read More
Tags: advanced persistent threatsAPTsattributionmotivestargeted attacks

Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?

  • Posted on:February 10, 2015
  • Posted in:Internet of Things
  • Posted by:
    Kyle Wilhoit (Senior Threat Researcher)
2

With analysis and research by Stephen Hilt (Independent Researcher) Even as attacks on SCADA devices has become more public, devices are constantly being reported as Internet-facing and thus, vulnerable to attacks.  Very little security is implemented on these devices, making them perfect targets of opportunity. Recently, Internet-facing gas station pumps have gained some attention, when…

Read More
Tags: gas stationsinternet of thingsInternet of ThingsIoEIOT

A Peek Inside a PoS Scammer’s Toolbox

  • Posted on:November 19, 2014
  • Posted in:Malware
  • Posted by:
    Kyle Wilhoit (Senior Threat Researcher)
0

PoS malware has been receiving a tremendous amount of attention in the past two years with high profile incidents like Target, Home Depot, and Kmart. With the massive “Black Friday” shopping season coming up, PoS malware will surely get additional publicity. This high profile nature means, we constantly look for evolving PoS malware and look into their behavior…

Read More
Tags: C&C serverPOS malwareRDPtoolkitVNC

Cybercriminals Using Targeted Attack Methodologies (Part 1)

  • Posted on:December 15, 2013
  • Posted in:Targeted Attacks
  • Posted by:
    Kyle Wilhoit (Senior Threat Researcher)
0

One of our 2014 security predictions is that cyber criminals will more frequently leverage targeted attack methodologies. Some of these tactics include using spear phishing attacks, as well as well-known vulnerabilities that have been used successfully in targeted attacks. Let’s see why cybercriminals are taking a closer look at these techniques, and how this can…

Read More
Tags: cybercrimetargeted attackstechniques
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.