• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Veo Zhang (Mobile Threats Analyst)

Veo Zhang

Mobile Threats Analyst

Janus Android App Signature Bypass Allows Attackers to Modify Legitimate Apps

  • Posted on:December 26, 2017
  • Posted in:Malware, Mobile
  • Posted by:
    Veo Zhang (Mobile Threats Analyst)
0

Android’s regular security update for December 2017 included a fix for a serious vulnerability that could allow attackers to modify installed apps without affecting their signature. This would allow an attacker to gain access to the affected device (indirectly). First found by researchers in July, this vulnerability (designated as CVE-2017-13156, and also called the Janus vulnerability) affects versions of Android from 5.1.1 to 8.0; approximately 74% of all Android devices have these versions installed.

Read More
Tags: Janusmobile malwarevulnerability

October macOS Patch Fixes FAT/USB Vulnerability

  • Posted on:November 21, 2017
  • Posted in:Mac, Vulnerabilities
  • Posted by:
    Veo Zhang (Mobile Threats Analyst)
0

October’s macOS security update contained a fix for a vulnerability that Trend Micro privately disclosed to Apple earlier this year. The vulnerability (designated as CVE-2017-13811), was in the fsck_msdos system tool. This tool checks for and fixes errors in devices formatted with the FAT filesystem, and is automatically invoked by macOS when a device using FAT (such as a USB disk or an SD card) is inserted.

Read More
Tags: FATmacOSUSB

Vulnerability in F2FS File System Leads To Memory Corruption on Android, Linux

  • Posted on:August 8, 2017
  • Posted in:Mobile, Open source, Vulnerabilities
  • Posted by:
    Veo Zhang (Mobile Threats Analyst)
0

August’s Android Security Bulletin includes three file system vulnerabilities (CVE-2017-10663, CVE-2017-10662, and CVE-2017-0750 that were discovered by Trend Micro researchers. These vulnerabilities could cause memory corruption on the affected devices, leading to code execution in the kernel context. This would allow for more data to be accessed and controlled by the malware. A malicious app could be used to trigger this vulnerability, which occurs when a malicious disk using the F2FS (Flash-Friendly File System) is mounted. The disk can either be an actual physical device or a virtual file image.

Read More
Tags: androidF2FSLinux

New Flavor of Dirty COW Attack Discovered, Patched

  • Posted on:December 6, 2016
  • Posted in:Exploits, Mobile, Vulnerabilities
  • Posted by:
    Veo Zhang (Mobile Threats Analyst)
0

Dirty COW (designated as CVE-2016-5195) is a Linux vulnerability that was first disclosed to the public in October 2016. It was a serious privilege escalation flaw that allowed an attacker to gain root access on the targeted system; other methods were needed to run any code on the targeted machine. We have found a new way to target Dirty COW that is different from existing attacks.

Read More
Tags: androidDirty COW

‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices

  • Posted on:June 21, 2016
  • Posted in:Malware, Mobile
  • Posted by:
    Veo Zhang (Mobile Threats Analyst)
0

We came across a family of mobile malware called Godless (detected as ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its pockets. By having multiple exploits to use, Godless can target virtually any Android device running on Android 5.1 (Lollipop) or earlier. As of this writing, almost 90% of Android devices run on affected versions. Based on the data gathered from our Trend Micro Mobile App Reputation Service, malicious apps related to this threat can be found in prominent app stores, including Google Play, and has affected over 850,000 devices worldwide.

Read More
Tags: Rooting Malware
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.