• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Maharlito Aquino (Threat Research)

Maharlito Aquino (Threat Research)

Threat Research

The Siesta Campaign: A New Targeted Attack Awakens

  • Posted on:March 6, 2014
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Maharlito Aquino (Threat Research)
0

In the past few weeks, we have received several reports of targeted attacks that exploited various application vulnerabilities to infiltrate various organizations. Similar to the Safe Campaign, the campaigns we noted went seemingly unnoticed and under the radar. The attackers orchestrating the campaign we call the Siesta Campaign used multicomponent malware to target certain institutions that…

Read More
Tags: Malwaresiestatargeted attacks

BLYPT: A New Backdoor Family Installed via Java Exploit

  • Posted on:September 20, 2013
  • Posted in:Exploits, Malware
  • Posted by:
    Maharlito Aquino (Threat Research)
1

Recently, we have observed a new backdoor family which we’ve called BLYPT. This family is called BLYPT because of its use of binary large objects (blob) stored in the registry, as well as encryption. Currently, this backdoor is installed using Java exploits; either drive-by downloads or compromised web sites may be used to deliver these…

Read More
Tags: backdoorBLYPTJavajava exploitMalwarevulnerability

Online Gaming Spyware Downloads Backdoor

  • Posted on:August 15, 2013
  • Posted in:Bad Sites, Malware, Targeted Attacks
  • Posted by:
    Maharlito Aquino (Threat Research)
0

ONLINEG, a spyware known to steal online gaming credentials, appears to be adding backdoors to its resume. We found a variant (specifically TSPY_ONLINEG.OMU) that aside from the usual data theft routine, also downloads a backdoor onto the infected system, making it vulnerable to more damage. TSPY_ONLINEG.OMU was recently found on certain South Korean websites, which…

Read More
Tags: data stealinginformation theftMalwareonline gamesONLINEGSouth KoreaTargeted Attack

Targeted Attack in Taiwan Uses Infamous Gh0st RAT

  • Posted on:June 23, 2013
  • Posted in:Targeted Attacks
  • Posted by:
    Maharlito Aquino (Threat Research)
0

From the arrest of one of the head members of the ransomware gang to the successful Rove Digital takedown, coordination between law enforcement agencies and security groups has time and again yielded positive results. This time, the Taiwan Criminal Investigation Bureau (CIB), in cooperation with Trend Micro, resolved a targeted attack involving the notorious Ghost RAT…

Read More
Tags: APTGh0st RATremote access TrojansTaiwanTargeted Attack

RARSTONE Found In Targeted Attacks

  • Posted on:June 13, 2013
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Maharlito Aquino (Threat Research)
0

Earlier in February we blogged about RARSTONE, a Remote Access Tool (RAT) that we discovered having some similar characteristics to PlugX, an older and more well-known RAT. In April, the same malware family used the Boston Marathon bombing as part of its social engineering bait. Since then, we’ve been looking out for further attacks using RARSTONE. We’ve…

Read More
Tags: APTbackdooremailphishingRARSTONEremote access TrojanTargeted Attack
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.