• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Maersk Menrige (Threats Analyst)

Threats Analyst

PlugX RAT With “Time Bomb” Abuses Dropbox for Command-and-Control Settings

  • Posted on:June 25, 2014
  • Posted in:Targeted Attacks
  • Posted by:
    Maersk Menrige (Threats Analyst)
1

Monitoring network traffic is one of the means for IT administrators to determine if there is an ongoing targeted attack in the network.  Remote access tools or RATs, commonly seen in targeted attack campaigns, are employed to establish command-and-control (C&C) communications.  Although the network traffic of these RATs, such as Gh0st, PoisonIvy, Hupigon, and PlugX, among…

Read More
Tags: lateral movementplugXtargeted attacksthreat intelligence

Template Document Exploit Found in Several Targeted Attacks

  • Posted on:June 17, 2014
  • Posted in:Exploits, Malware, Targeted Attacks
  • Posted by:
    Maersk Menrige (Threats Analyst)
1

The use of contextually-relevant emails is one of the most common social engineering tactics employed in targeted attacks.  Emails still being the primary mode of business communications are often abused to deliver exploits to penetrate a network that consequently lead to other stages of a targeted attack cycle. In one of the targeted attacks we’re…

Read More
Tags: APTbackdoorC&C serversCVE-2012-0158JapanMalwareMS12-027social engineeringTaiwantargeted attacksvulnerability

ANTIFULAI Targeted Attack Exploits Ichitaro Vulnerability

  • Posted on:June 4, 2014
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Maersk Menrige (Threats Analyst)
1

Targeted attacks are difficult to detect and mitigate by nature. We recently uncovered a targeted attack campaign we dubbed as “ANTIFULAI” that targets both government agencies and private industries in Japan. In our 2H 2013 Targeted Attack Trends report, we found that 80% of the analyzed cases of targeted attacks hit government institutions. Like many targeted attacks, ANTIFULAI uses…

Read More
Tags: APTbackdoorC&C serversIchitaroJapanMalwaresocial engineeringtargeted attacksvulnerability

Black Magic: Windows PowerShell Used Again in New Attack

  • Posted on:May 29, 2014
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Maersk Menrige (Threats Analyst)
1

The Windows PowerShell® command line is a valuable Windows administration tool designed especially for system administration. It combines the speed of the command line with the flexibility of a scripting language, making it helpful for IT professionals to automate administration of the Windows OS and its applications. Unfortunately, threat actors have recently taken advantage of…

Read More
Tags: APTCRIGENTplugXPowershellTaidoorTargeted Attacktargeted emailWindowsWindows PowershellWindows XP

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.