• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Russia

Pawn Storm’s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets

  • Posted on:August 18, 2015 at 6:51 am
  • Posted in:Bad Sites, Targeted Attacks
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
0

Why would Pawn Storm, the long-running cyber-espionage campaign, set its sights on a Russian punk rock group? Sure, Pussy Riot is controversial. Members of the feminist band had previously been thrown in jail for their subversive statements against the Orthodox Church and Russian patriarchal system. But why would attackers have any interest in them? What…

Read More
Tags: cyberespionagePawn StormphishingRussiaukraine

New Year, Old Problems: Large-Scale Dating Site Spam Run Hits Users

  • Posted on:January 8, 2015 at 5:36 pm
  • Posted in:Spam
  • Author:
    Trend Micro
1

2015 has just begun, but we’re already seeing old problems crop up again – particularly the abuse of a lot of legitimate web sites. Since the start of the year, we’ve been seeing a significant increase in the number of spammed messages with links that lead to various Russian dating sites. Figure 1. Sample of dating…

Read More
Tags: dating sitesmessage boardsRussiaSpam

Operation Pawn Storm: The Red in SEDNIT

  • Posted on:October 22, 2014 at 3:41 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Jim Gogolinski (Senior Threat Researcher)
0

Pawn Storm is an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, and media. Specific targets include: Military agencies, embassies, and defense contractors in the US and its allies Opposition politicians and dissidents of the Russian government International media The national security department of a US…

Read More
Tags: APTOperation Pawn StormRussiaSEDNITTargeted AttackUS

Cybercriminal Underground Economy Series: Russia, China, and Brazil

  • Posted on:February 24, 2014 at 3:00 pm
  • Posted in:Malware
  • Author:
    Trend Micro
0

Places in the Internet where cybercriminals come together to buy and sell different products and services exist. Instead of creating their own attack tools from scratch, they can instead purchase what they need from peers who offer competitive prices. Like any other market, the laws of supply and demand dictate prices and feature offerings. But…

Read More
Tags: BrazilChinacybercrimeresearchRussiaunderground economy

Connecting the Dots: Fake Apps, Russia, and the Mobile Web

  • Posted on:September 17, 2013 at 11:21 pm
  • Posted in:Bad Sites, Malware, Mobile
  • Author:
    Rowena Diocton (Technical Communications)
0

The existence of fake mobile apps poses privacy and financial risks to users of the mobile web. As experts figure out the dangers of the consumerization and the lack of security of mobile devices, fake apps continue to grow. Fake apps usually ride on the popularity of legitimate apps—for example, recently fake emails said that users…

Read More
Tags: androidfake appsmobile malwarepremium service abuseRussiaSMS fraud
Page 1 of 212

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Going In-depth with Emotet: Multilayer Operating Mechanisms
  • February Patch Tuesday: Batch Includes 77 Updates That Cover Flaws in Internet Explorer, Exchange Server, and DHCP Server
  • Various Google Play ‘Beauty Camera’ Apps Send Users Pornographic Content, Redirect Them to Phishing Websites and Collect Their Pictures
  • Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
  • Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.