• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Open source

Grouping Linux IoT Malware Samples With Trend Micro ELF Hash

  • Posted on:April 20, 2020 at 7:21 am
  • Posted in:Internet of Things, Open source
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

We created Trend Micro ELF Hash (telfhash), an open-source clustering algorithm that effectively clusters Linux IoT malware created using ELF files.

Read More
Tags: Clustering algorithminternet of thingsLinux malware

Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

  • Posted on:November 29, 2019 at 3:29 am
  • Posted in:Bad Sites, Exploits, Internet of Things, Malware, Open source, Spam, Targeted Attacks, Vulnerabilities
  • Author:
    Trend Micro
0

We found cyberespionage group TICK targeting critical systems and enterprises, attempting to steal information to benefit this APT group’s sponsor. In this research brief, we show the timeline of the group’s activities and malware development, as well as the technical analyses of the new malware families, modified tools, and upgraded malware routines.

Read More
Tags: APTcampaigncyberespionageMalwareOperation ENDTRADETargeted AttackTICK

Miner Malware Spreads Beyond China, Uses Multiple Propagation Methods Including EternalBlue, Powershell Abuse

  • Posted on:April 12, 2019 at 4:56 am
  • Posted in:Botnets, Malware, Open source, Vulnerabilities
  • Author:
    Trend Micro
0

We analyzed a malicious Monero miner using multiple methods for propagation and infection to systems and vulnerable databases. While initially found infecting systems in China beginning of the year, the malware is expanding to other countries with more infiltration techniques like EternalBlue and PowerShell abuse.

Read More
Tags: cryptocurrencyEternalBlueMoneroPowershell

Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners

  • Posted on:February 8, 2019 at 5:02 am
  • Posted in:Internet of Things, Malware, Open source
  • Author:
    Trend Micro
0

We noticed a Linux coin miner with scripts almost the same as KORKERDS, and with just one crontab removes other miners and malware installed in the system upon infection.

Read More
Tags: coinminerKORKERDSLinuxMalware

ThinkPHP Vulnerability Abused by Botnets Hakai and Yowai

  • Posted on:January 25, 2019 at 5:00 am
  • Posted in:Botnets, Exploits, Open source, Vulnerabilities
  • Author:
    Trend Micro
0

We found a new Mirai variant we’ve called Yowai and Gafgyt variant Hakai abusing a ThinkPHP flaw for propagation and DDoS attacks.

Read More
Tags: botnetGafgytHakaiMiraivulnerabilityYowai
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.