• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware

Updates on ThiefQuest, the Quickly-Evolving macOS Malware

  • Posted on:July 17, 2020 at 5:00 am
  • Posted in:Mac, Malware
  • Author:
    Trend Micro
0

This entry is about ThiefQuest, the newly discovered malware targeting macOS. We discuss the differences between the old and new versions of the malware. Related findings include new functions as well as unusual observations in VirusTotal

Read More
Tags: macOSMalwareransomwareThiefQuest

Netwalker Fileless Ransomware Injected via Reflective Loading

  • Posted on:May 18, 2020 at 5:00 am
  • Posted in:Malware, Ransomware
  • Author:
    Trend Micro
0

Ransomware in itself poses a formidable threat for organizations. As a fileless threat, the risk is increased as it can more effectively evade detection. We discuss how Netwalker ransomware is deployed filelessly through reflective DLL injection.

Read More
Tags: filelessMalwareNetwalkerransomware

QNodeService: Node.js Trojan Spread via Covid-19 Lure

  • Posted on:May 14, 2020 at 10:29 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

QNodeService is a new, undetected malware sample written in Node.js, which is an unusual choice for malware authors. The malware has functionality that enables it to download/upload/execute files, steal credentials from Chrome/Firefox browsers, and perform file management, among other things.

Read More
Tags: MalwareNode.jsQNodeServiceTrojan

Zoomed In: A Look into a Coinminer Bundled with Zoom Installer

  • Posted on:April 3, 2020 at 12:11 pm
  • Posted in:Malware
  • Author:
    Trend Micro
0

We found a coinminer bundled with the legitimate installer of video conferencing app Zoom. Users who attempt to download the installer get more than what they bargain for as they instead download the AutoIt compiled malware Trojan.Win32.MOOZ.THCCABO.

Read More
Tags: coinminerMalwareZoom

Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks

  • Posted on:March 5, 2020 at 3:58 am
  • Posted in:Malware, Mobile
  • Author:
    Vit Sembera (Threats Analyst)
0

We dug deeper into the behavior of Geost, a trojan targetting Russian banks, by reverse engineering a sample of the malware. The trojan employed several layers of obfuscation, encryption, reflection, and injection of non-functional code segments that made it more difficult to reverse engineer.

Read More
Tags: androidGeostMalwareRussianTrojan
Page 1 of 3812 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.