• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Michael Casayuran (Anti-spam Research Engineer)

Michael Casayuran

Anti-spam Research Engineer

2014 Spam Landscape: UPATRE Trojan Still Top Malware Attached to Spam

  • Posted on:February 25, 2015
  • Posted in:Spam
  • Posted by:
    Michael Casayuran (Anti-spam Research Engineer)
0

The malware UPATRE was gained much prominence following the demise of the Blackhole Exploit kit. It was since known as one of the top malware seen attached to spammed messages and continues to be so all throughout 2014 with particularly high numbers seen in the fourth quarter of the year. We have released our annual roundup…

Read More
Tags: Spam

CUTWAIL Spambot Leads to UPATRE-DYRE Infection

  • Posted on:October 16, 2014
  • Posted in:Malware, Spam
  • Posted by:
    Michael Casayuran (Anti-spam Research Engineer)
0

A new spam attack disguised as invoice message notifications was recently seen spreading the UPATRE malware, that ultimately downloads its final  payload- a BANKER malware related to the DYREZA/DYRE banking malware. Background In early October we observed a surge of spammed messages sent by the botnet CUTWAIL/PUSHDO, totaling to more than 18,000 messages seen in a single day. CUTWAIL/PUSHDO has been in…

Read More
Tags: BANKERbanking malwarebanking TrojanUPATRE

KELIHOS Spambot Highlights Security Risk in SPF Records

  • Posted on:October 1, 2014
  • Posted in:Botnets, Malware, Spam
  • Posted by:
    Michael Casayuran (Anti-spam Research Engineer)
0

During the last week of August 2014, we observed a salad spam surge caused by KELIHOS spambot.  Salad spam contains gibberish words in the email body, and is usually employed by cybercriminals so as to bypass spam filters. Here are some samples we spotted: Figures 1-2: Screenshots of spammed messages Majority of this outbreak’s victims are from the…

Read More
Tags: botnetemail securityKELIHOSMalwareSpamSPFspoofing

Bitcoin, the Latest Lure of Scammers

  • Posted on:April 9, 2014
  • Posted in:Bad Sites, Spam
  • Posted by:
    Michael Casayuran (Anti-spam Research Engineer)
1

“Get rich fast” scams have been circulating online for several years now. Some examples would be the classic Nigerian or 419 scams, lottery scams, and work-from-home scams. The stories may vary but the underlying premise is the same: get a large sum of money for doing something with little to no effort. Scammers have now…

Read More
Tags: 419bitcoinnigerian scamphishingscamSpam

Grand Theft Auto V PC Beta Test Lures Victims

  • Posted on:March 14, 2014
  • Posted in:Malware, Spam
  • Posted by:
    Michael Casayuran (Anti-spam Research Engineer)
0

Rockstar Games’ latest offering for the videogame industry, open-world crime simulator Grand Theft Auto V, came out several months ago for consoles to fanfare and anticipation. Unsurprisingly, people have been waiting for the PC version, despite Rockstar Games being very mum about its release date (or even its existence). This uncertainty did not stop cybercriminals from…

Read More
Tags: backdoorbeta testGrand Theft Auto VMalware
Page 1 of 212

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Going In-depth with Emotet: Multilayer Operating Mechanisms
  • February Patch Tuesday: Batch Includes 77 Updates That Cover Flaws in Internet Explorer, Exchange Server, and DHCP Server
  • Various Google Play ‘Beauty Camera’ Apps Send Users Pornographic Content, Redirect Them to Phishing Websites and Collect Their Pictures
  • Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
  • Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.