• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Mark Joseph Manahan (Threat Response Engineer)

Mark Joseph Manahan (Threat Response Engineer)

Threat Response Engineer

Ransomware Now Uses Windows PowerShell

  • Posted on:June 1, 2014
  • Posted in:Bad Sites, Malware, Ransomware
  • Posted by:
    Mark Joseph Manahan (Threat Response Engineer)
0

We highlighted in our quarterly threat roundup how various ransomware variants and other similar threats like CryptoLocker that now perform additional routines such as using different languages in their warning and stealing funds from cryptocurrency wallets. The addition of  mobile ransomware highlights how these threats are continuously improved over time. We recently encountered another variant that used the…

Read More
Tags: cryptolockerMalwareposhcoderransomwareWindows Powershell

VOBFUS Evolves, Adds Multiple Languages

  • Posted on:May 14, 2014
  • Posted in:Malware
  • Posted by:
    Mark Joseph Manahan (Threat Response Engineer)
0

VOBFUS malware is known for its polymorphic abilities, which allow for easy generation of new variants. We recently came across one variant that replaces these abilities for one never seen in VOBFUS malware before—the ability to “speak” several languages. Infection in Different Languages Just like other VOBFUS variants, this new variant, detected as WORM_VOBFUS.JDN, propagates by…

Read More
Tags: localized malwareMalwareransomwarevobfus

Old Java RAT Updates, Includes Litecoin Plugin

  • Posted on:April 16, 2014
  • Posted in:Malware, Spam
  • Posted by:
    Mark Joseph Manahan (Threat Response Engineer)
0

Out with the old, in with the new? When it comes to cybercrime, that’s rarely the case. We often seen old malware get upgrades with new techniques, payloads, and even targets. This is certainly the case for an old Java remote access Trojan (RAT) detected as JAVA_OZNEB.B. Users may encounter this threat as an attachment…

Read More
Tags: JavaMalwareRATSpam

ZBOT Adds Clickbot Routine To Arsenal

  • Posted on:March 19, 2014
  • Posted in:Malware
  • Posted by:
    Mark Joseph Manahan (Threat Response Engineer)
0

The ZeuS/ZBOT malware family is probably one of the most well-known malware families today . It is normally known for stealing credentials associated with online banking accounts. However, ZBOT is no one-trick pony. Some ZBOT variants perform other routines like downloading or dropping other threats like ransomware. We recently came across one variant detected as TROJ_ZCLICK.A,…

Read More
Tags: clickbotMalwareZBOTZeuS

Malware Uses ZWS Compression for Evasion Tactic

  • Posted on:February 5, 2014
  • Posted in:Malware, Vulnerabilities
  • Posted by:
    Mark Joseph Manahan (Threat Response Engineer)
0

Cybercriminals can certainly be resourceful when it comes to avoiding detection. We have seen many instances wherein malware came equipped with improved evasion techniques, such as preventing execution of analysis tools, hiding from debuggers, blending in with normal network traffic, along with various JavaScript techniques. Security researchers have now come across malware that uses a…

Read More
Tags: ExploitMalwareVulnerabilitiesZWS
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.