Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Zero-Day Alerts

  • Hacking Team Leak

  • Recent Posts

  • Calendar

    July 2015
    S M T W T F S
    « Jun    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • Email Subscription

  • About Us


    Archive for the ‘Targeted Attacks’ Category




    Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to open the message. The email header, written in Japanese, translates as “Fw: Prevention of the Middle East Respiratory Syndrome (MERS) while the attachment file reads, ...

    Posted in Malware, Targeted Attacks |



    The Esile targeted attack campaign targeting various countries in the Southeast Asian region has been discussed in the media recently. This campaign - which was referred to by other researchers as Lotus Blossom - is believed to be the work of a nation-state actor due to the nature of the stolen information, which is more valuable to countries than either private companies or cybercriminals. The Palo Alto Networks report discussed a targeted attack campaign that has been known to Trend Micro researchers for some time. We noted ...




    In our recent research, Piercing the HawkEye, we uncovered various ways cybercriminals were able to exploit information they gathered from monitoring victims' mailboxes in order to steal money from businesses. One of the examples we shared, the "change of supplier" fraud, was one of the most notable, as this type of scheme has been known to earn cybercriminals millions of dollars of stolen money. In this post, we will flesh out the details of this particular scheme, and what makes ...

    Posted in Malware, Targeted Attacks |



    It doesn't take an advanced malware to disrupt a business operation. In fact, even a simple backdoor is enough to do it. Earlier this year the Trend Micro Forward-Looking Threat Research Team closely monitored the operations of two Nigerian cybercriminals -- identified through aliases Uche and Okiki -- who attacked small businesses from developing countries to steal information and intercept transactions with their targets' partners. All this was done through HawkEye, a simple backdoor that costs around $35. While the malware used is simple, the cybercriminal operation itself is not. ...

    Posted in Malware, Targeted Attacks |



    We first discovered MalumPoS, a new attack tool that threat actors can reconfigure to breach any PoS system they wish to target. Currently, it is designed to collect data from PoS systems running on Oracle® MICROS®, a platform popularly used in the hospitality, food and beverage, and retail industries. Oracle claims that MICROS is used in 330,000 customer sites worldwide. A bulk of the companies using this platform is mostly concentrated in the United States. If successfully deployed by a threat actor, ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice