• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Nart Villeneuve (Senior Threat Researcher)

Nart Villeneuve (Senior Threat Researcher)

Senior Threat Researcher

Malicious PDFs On The Rise

  • Posted on:April 29, 2013
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Nart Villeneuve (Senior Threat Researcher)
0

Additional text and analysis by Kyle Wilhoit Throughout 2012, we saw a wide variety of APT campaigns leverage an exploit in Microsoft Word (CVE-2012-0158). This represented a shift, as previously CVE-2010-3333 was the most commonly used Word vulnerability. While we continue to see CVE-2012-0158 in heavy use, we have noticed increasing use of an exploit for…

Read More
Tags: APTExploitsMicrosoft OfficepdfReader

Targeted Attack Campaign Hides Behind SSL Communication

  • Posted on:April 25, 2013
  • Posted in:Targeted Attacks
  • Posted by:
    Nart Villeneuve (Senior Threat Researcher)
0

Using encrypted communication like Secure Sockets Layers (SSL) along with the clever use of recent news item as a social engineering lure is the perfect combination to penetrate and remain in a targeted entity’s infrastructure. It didn’t take long for targeted attacks to use last week’s Boston Marathon bombing as a bait to trick predetermined…

Read More
Tags: APT attacksTargeted Attack

Asprox Reborn

  • Posted on:March 4, 2013
  • Posted in:Botnets, Malware, Spam
  • Posted by:
    Nart Villeneuve (Senior Threat Researcher)
0

While spam botnets are well-known for sending out unwanted ads, especially for “rogue” pharmaceutical companies, they are also an integral component of malware distribution. In addition to sending out their own malware so that they can increase the size of their botnet, the miscreants behind these operations also earn revenue by installing additional malware supplied…

Read More
Tags: ASPROXbotnetSpam

Hiding in Plain Sight: The FAKEM Remote Access Trojan

  • Posted on:January 17, 2013
  • Posted in:Targeted Attacks
  • Posted by:
    Nart Villeneuve (Senior Threat Researcher)
2

The perpetrators of targeted attacks want to maintain a persistent presence in a target network in order to extract sensitive data when needed. To maintain this, attackers seek to blend in with normal network traffic and use ports allowed by firewalls. Frequently, the malware used in targeted attacks uses HTTP and HTTPS to appear like…

Read More
Tags: advanced persistent threatsAPTFAKEMLURIDplugXtargeted attacks

What Kind of Targeted Attacks Will We See in 2013?

  • Posted on:December 28, 2012
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Nart Villeneuve (Senior Threat Researcher)
0

Now that knowledge of targeted attacks, including APT activity, has become mainstream within the broader security community, I predict that 2013 will be a year in which our assumptions will be challenged. We have already seen how successful so-called “technically unsophisticated” attacks have been over the last few years, and I predict they will continue…

Read More
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.