• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Japan

Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More

  • Posted on:April 16, 2018 at 5:00 am
  • Posted in:Internet of Things, Vulnerabilities
  • Author:
    Trend Micro
0

If there is anything to be learned from the massive attacks that have been seen on connected devices, it is that the internet of things (IoT) is riddled with vulnerabilities. We have seen this time and again with how botnets are created from system weaknesses and have harnessed poor basic security to disrupt many devices and services.

In the past year, we embarked on a closer look at the security of IoT devices around the world. We chose devices that are available in different Amazon regions and are widely used in the Japan market, and tried to find out whether remote code execution (RCE) is possible. What we ended up finding out was more than that.

Read More
Tags: connected homeinternet of thingsIOTJapanRemote Code Executionsmart homeVulnerabilities

Japanese Cybercriminals New Addition To Underground Arena

  • Posted on:October 13, 2015 at 5:03 am
  • Posted in:Bad Sites, Deep Web
  • Author:
    Akira Urano (Senior Threat Researcher)
0

Our research into various cybercriminal underground communities has taken us to Japan. The Japanese Underground looks into this growing community, with a particular focus on the items they sell, such as passports, firearms, and child pornography.

Over the years we have tracked cybercrime activity and targeted attacks in Japan. Japan is no stranger to cyber attacks and malware-related incidents—from recent malvertising attacks in early October to EMDIVI malware targeting Japan companies, and even to banking malware centered in the region in 2014. Despite these incidents and more, our research on the cybercrime underground in Japan shows that the underground economy is still fairly younger and smaller compared with its foreign counterparts.

Read More
Tags: CUESJapanjapanese cybercrime underground

3,000 High-Profile Japanese Sites Hit By Massive Malvertising Campaign

  • Posted on:September 30, 2015 at 6:59 pm
  • Posted in:Malware
  • Author:
    Joseph C Chen (Fraud Researcher)
0

Malvertising and exploit kits work hand-in-hand – and are an amazingly effective threat that keeps victimizing users over and over again. The latest victim? Users in Japan.

Since the start of September, almost half a million users have been exposed to a malvertising campaign powered by the Angler exploit kit. This particular attack was highly targeted towards users in Japan. At the height of this campaign, almost 100,000 users saw the malvertisements per day.To make these ads essentially impossible to distinguish from real ones, the attackers used copies of the banners used by legitimate ads for their own malicious advertising.

Read More
Tags: Angler Exploit KitJapanmalvertising

MERS News Used in Targeted Attack against Japanese Media Company

  • Posted on:June 29, 2015 at 2:54 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Benson Sy (Threats Analyst)
0

Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to…

Read More
Tags: CHMJapanMERSspear phishingTargeted AttackZXShell

Who’s Behind Operation Huyao?

  • Posted on:November 6, 2014 at 6:54 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Noriaki Hayashi (Senior Threat Researcher)
0

As previously discussed Operation Huyao is a well-designed phishing scheme that relys on relay/proxy sites that pull content directly from their target sites to make their phishing sites appear to be more realistic and believable. Only one such attack, targeting a well-known Japanese site, has been documented. No other sites have been targeted by this attack.Publicly available information suggests that…

Read More
Tags: JapanOperation Huyaophishingweb threats
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.