• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   FakeAV

New Router Attack Displays Fake Warning Messages

  • Posted on:May 20, 2015 at 11:59 am
  • Posted in:Malware
  • Author:
    Jaydeep Dave (Vulnerability Research)
0

Just because security researchers report about threats doesn’t mean we’re exempted from them. I recently experienced an incident at home that involved tampered DNS router settings. I was redirected to warning pages that strongly resemble those used in previous FAKEAV attacks. I noticed that my home internet router DNS settings have been modified from its default settings. (My router…

Read More
Tags: DNS poisoningFakeAVrouters

Keygens For Engineering, Scientific Software Leads To FAKEAV

  • Posted on:January 23, 2014 at 10:25 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Jeffrey Bernardino (Threat Researcher)
0

In the past few weeks, we have seen increasing numbers of infections related to the TROJ_GATAK, especially in the North American region. This malware family is not particularly well known; we discussed it in 2012 in relation with file infectors that were hitting Dutch users. In checking for its possible causes, we’ve found the malware…

Read More
Tags: fake antivirusFakeAVGoogle Talkkey generatorpirated softwareskype

[INFOGRAPHIC] Follow the Money Trail

  • Posted on:March 27, 2012 at 9:33 am
  • Posted in:Malware
  • Author:
    Danielle Veluz (Technical Communications)
0

Last month, we published an infographic Know Your Enemies, which illustrated the different cybercrooks users may “meet” firsthand in the virtual neighborhood. Interestingly, a question was raised to us about the differences between the prices of user information. There are indeed discrepancies between the prices of credit cards between regions. The question, however, is why….

Read More
Tags: cybercrimeFakeAVinfographic

Searches for iCloud Unveil FAKEAV

  • Posted on:June 20, 2011 at 12:08 am
  • Posted in:Bad Sites, Malware
  • Author:
    Paul Pajares (Fraud Analyst)
9

Cybercriminals are now using search engine optimization (SEO) poisoning techniques for the iCloud to trigger malicious URLs hosting FAKEAV malware.

Read More
Tags: compromised sitesFakeAViCloudMalware

Bogus ‘HouseCall’ Search Results Lead to Adware

  • Posted on:November 23, 2008 at 9:37 pm
  • Posted in:Bad Sites
  • Author:
    Jonathan Leopando (Technical Communications)
4

Given the popularity of Trend Micro’s free online scanner HouseCall, it shouldn’t be a surprise that hackers are now trying to exploit it for their benefit. Advanced Threats Researcher Ivan Macalintal found this unwelcome search result that comes up when a user searches for “free online virus scan by Trend Micro” in Google: Figure 1….

Read More
Tags: adwarefake Trend Micro productFakeAVHouseCall

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.