• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: lnk vulnerability

What’s the Fuss with WORM_VOBFUS?

  • Posted on:November 29, 2012 at 7:36 am
  • Posted in:Malware, Vulnerabilities
  • Author:
    Trend Micro
0

Some malware are more persistent than others – like WORM_VOBFUS. This recent heap of WORM_VOBFUS variants seen spreading on Facebook does not exhibit new routines, but it is a good reminder for users about well-known but easily forgotten safe computing practices. Based on our initial analysis, these WORM_VOBFUS variants that do not show any advanced…

Read More
Tags: FacebookMalwarevobfusvulnerability

Gauss Continues Streak of Possible State-Sponsored Attacks

  • Posted on:August 13, 2012 at 6:02 am
  • Posted in:Malware, Targeted Attacks, Vulnerabilities
  • Author:
    Trend Micro
0

We received inquiries about the Gauss attack, which garnered significant media attention as it drew comparisons to Flame. Gauss was designed to steal system-related information and gather banking, social networking, email and instant messaging (IM) credentials. Researchers also surmised that this is possibly the latest among the strings of state-sponsored attacks, which gathered awareness with…

Read More

Malicious Email Campaign Uses Current Socio-Political Events as Lure for Targeted Attack

  • Posted on:March 15, 2012 at 1:00 am
  • Posted in:Exploits, Malware, Targeted Attacks
  • Author:
    Ivan Macalintal (Threat Research Manager)
1

We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue.  One of these messages is about the supposed statement from the German Chancellor regarding the protests in Lhasa, Tibet.  The From field indicates that it came from a key officer from the ATC or Australian Tibet…

Read More

Stuxnet Used in Blackhat SEO Campaign

  • Posted on:September 30, 2010 at 12:28 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Bernadette Irinco (Technical Communications)
13

As expected, criminals are now taking advantage of the notoriety of Stuxnet as a mechanism to deploy malicious code. Senior Threats Researcher Ivan Macalintal found poisoned search results that leveraged on this notorious malware threat. Some of the search strings used in this blackhat SEO campaign include “stuxnet SCADA,” “stuxnet removal tool,” “stuxnet cleanup,” “stuxnet…

Read More

Redirectors in Compromised Sites Used in Spammed Messages

  • Posted on:July 27, 2010 at 6:30 am
  • Posted in:Spam
  • Author:
    Joey Costoya
0

Busy day in TrendLabs today, first the full analysis of and news on ZeuS and SALITY, which are exploiting the Windows shortcut vulnerability. Now we’ve identified a ton of compromised websites leading to an “online pharmacy.” We’re currently seeing a wave of fake pharma spam that do not directly advertise the URL of the fake…

Read More
Page 7 of 7 « ‹ 67

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.