Just because security researchers report about threats doesn’t mean we’re exempted from them. I recently experienced an incident at home that involved tampered DNS router settings. I was redirected to warning pages that strongly resemble those used in previous FAKEAV attacks. I noticed that my home internet router DNS settings have been modified from its default settings. (My router…
Read MoreIn the past few weeks, we have seen increasing numbers of infections related to the TROJ_GATAK, especially in the North American region. This malware family is not particularly well known; we discussed it in 2012 in relation with file infectors that were hitting Dutch users. In checking for its possible causes, we’ve found the malware…
Read MoreLast month, we published an infographic Know Your Enemies, which illustrated the different cybercrooks users may “meet” firsthand in the virtual neighborhood. Interestingly, a question was raised to us about the differences between the prices of user information. There are indeed discrepancies between the prices of credit cards between regions. The question, however, is why….
Read MoreCybercriminals are now using search engine optimization (SEO) poisoning techniques for the iCloud to trigger malicious URLs hosting FAKEAV malware.
Read MoreGiven the popularity of Trend Micro’s free online scanner HouseCall, it shouldn’t be a surprise that hackers are now trying to exploit it for their benefit. Advanced Threats Researcher Ivan Macalintal found this unwelcome search result that comes up when a user searches for “free online virus scan by Trend Micro” in Google: Figure 1….
Read More