• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Mark Balanza (Threats Analyst)

Mark Balanza (Threats Analyst)

Threats Analyst

Android Malware Acts as an SMS Relay

  • Posted on:June 24, 2011
  • Posted in:Malware, Mobile
  • Posted by:
    Mark Balanza (Threats Analyst)
10

I have seen Android malware delete and send SMS messages but this is the first time I saw an Android malware act as an SMS relay. My colleagues and I were recently able to analyze a sample of an Android malware that uses an infected device as a proxy for sending and receiving messages. Unlike…

Read More

Analysis of DroidDreamLight Android Malware

  • Posted on:June 1, 2011
  • Posted in:Malware, Mobile
  • Posted by:
    Mark Balanza (Threats Analyst)
1

We recently received a sample of an Android malware known as DroidDreamLight currently circulating on the Web. Once executed on an infected device, this malware steals mobile-specific informationĀ that it thenĀ usesĀ for malicious activities. Similar to previous information-stealing Android malware, DroidDreamLight, detected by Trend Micro as ANDROIDOS_DORDRAE.L gathers the following specific information fromĀ an infected mobile phone: Device…

Read More

Android Malware Targets China Mobile Subscribers

  • Posted on:May 12, 2011
  • Posted in:Mobile
  • Posted by:
    Mark Balanza (Threats Analyst)
6

We recently analyzed an Android OSĀ malware that specifically targets China Mobile subscribers. China Mobile is a state-owned telecommunications serviceĀ providerĀ thatĀ is considered the world’s largest mobile phone operator. The malware arrives through a link sent through SMS. The said message tells the China Mobile users to install a patch for their supposedly vulnerableĀ devices by accessing the given…

Read More
Page 2 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.