• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: Angler exploit kit

Updated Sundown Exploit Kit Uses Steganography

  • Posted on:December 29, 2016 at 12:01 am
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

This year has seen a big shift in the exploit kit landscape, with many of the bigger players unexpectedly dropping out of action. The Nuclear exploit kit operations started dwindling in May, Angler disappeared around the same time Russia’s Federal Security Service made nearly 50 arrests last June, and then in September Neutrino reportedly went private and shifted focus to select clientele only. Now, the most prominent exploit kits in circulation are RIG and Sundown. Both gained prominence shortly after Neutrino dropped out of active circulation.

Read More
Tags: exploit kitsteganographySundown

Exploit Kits in 2015: Scale and Distribution

  • Posted on:March 15, 2016 at 5:43 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

In the first part of this series of blog posts, we discussed what new developments and changes in the exploit kit landscape were seen in 2015. In this post, we look at the scale of the exploit kit problem – how many users were affected, which exploit kits are popular, and where are the users coming from?

Read More
Tags: Anglerexploit kitmagnitude

Exploit Kits in 2015: Flash Bugs, Compromised Sites, Malvertising Dominate

  • Posted on:March 10, 2016 at 4:00 am
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Brooks Li and Joseph C. Chen (Threats Analysts)
0

Threats never stand still, and exploits kits were no exception. 2015 saw multiple changes to this part of the threat landscape: freshly-discovered exploits were added, and compromised websites and malvertising were used to deploy and spread threats using exploit kits. Exploit kits were a key part of the threat landscape in 2015. In this series of posts,…

Read More
Tags: Adobeadobe flashexploit kitInternet ExplorerVulnerabilities

How Exploit Kit Operators are Misusing Diffie-Hellman Key Exchange

  • Posted on:September 21, 2015 at 5:48 pm
  • Posted in:Exploits, Malware
  • Author:
    Trend Micro
1

By Brooks Li, Stanley Liu and Allen Wu Feedback from the Trend Micro™ Smart Protection Network™ has allowed us to discover that the notorious Angler and Nuclear exploit kits have included the latest Flash vulnerability (CVE-2015-5560) in their regular update. This means that systems with Adobe Flash Player 18.0.0.209 and earlier are vulnerable; however users running the…

Read More
Tags: diffie-hellmanencryptionexploit kitsman in the middle

Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems

  • Posted on:July 13, 2015 at 10:13 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Philippe Lin (Senior Threat Researcher)
16

The dissection of the data from the Hacking Team leak has yielded another critical discovery: Hacking Team uses a UEFI BIOS rootkit to keep their Remote Control System (RCS) agent installed in their targets’ systems. This means that even if the user formats the hard disk, reinstalls the OS, and even buys a new hard…

Read More
Tags: Hacking TeamUEFI BIOS rootkit
Page 3 of 12 « ‹ 234 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.