• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source

HTML_MULTIEX.A

  • Posted on:November 2, 2005 at 10:04 am
  • Posted in:Bad Sites
  • Author:
    Jihan Monera (Advanced Threats Researcher)
0

We have received numerous links, even resulting to more than a hundred, which aim to redirect the user to a specific URL. These malicious links may follow the following format:http://{varies}.nl/info.htmlAll of these links have exactly the same contents, an encrypted script, which redirects those unlucky enough to click the malicious link to a malicious HTML…

Read More

New Bagle! TROJ_BAGLE.AB

  • Posted on:November 2, 2005 at 10:00 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

Just a few hours ago, our email honeypot began receiving samples of this new bagle trojan. As of now we have two different files samples coming in:MD5 hash:7B2F9DDEBD027D54E36408C89804AFDB8275444AC2CAAC4B90BFD07D0B2B17BEThe samples have already been submitted to the service team for processing. This bagle variant will be detected as TROJ_BAGLE.ABUpdate Just received another sample of this malware, this…

Read More

New Mytob Variant: WORM_MYTOB.KS

  • Posted on:November 2, 2005 at 9:58 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

We have received a total of 11 samples of this malware since 3 am this morning. Here are a few details on this variant: File Size: ~44,032 Bytes (unzipped) packed using PESpin 0.3x – 0.4x MD5 Hash: D37FDEEC3299DFAEF64151FA87880FB7You may view the email details for this malware in our advisories section.

Read More

Oracle Worm

  • Posted on:November 2, 2005 at 9:58 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

Recently, a proof-of-concept worm targetting Oracle databases with default user accounts and passwords was posted on Full-Disclosure. The worm looks for remote Oracle databases through the use of UTL_TCP package. It creates table X in the remote database (harmless but there could always be other ways to turn it into something else) upon discovery of…

Read More

Sony Installs Rootkit

  • Posted on:November 2, 2005 at 9:57 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

Rootkit? Whenever I hear that word, I alwaysassociate it with malware as a means to hide themselves from AVcompanies. And do we share the same perspective? I bet but not forSony(?!).The rootkit being utilized by Sony BMG is a technology to protectits digital property from atleast casual piracy considering theeasy way of CD burning provided…

Read More
Page 788 of 801 « ‹ 787788789 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.