• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Storm

Storm Uses Old Bait

  • Posted on:August 5, 2008 at 12:21 pm
  • Posted in:Malware, Spam
  • Author:
    JM Hipolito (Technical Communications)
1

The Storm gang is casting its net once again, using “postcards” as bait in a recently discovered spam run, Trend Micro Senior Advanced Threats Researcher Paul Ferguson has reported. Below is a screenshot of an email sample: Clicking the link embedded in the message connects the user to any of the following domains: hxxp:// {BLOCKED}cardAdvertising.com/…

Read More
Tags: postcardsStorm

Feds Combing Facebook for Terrorists, Storm Says

  • Posted on:July 30, 2008 at 7:34 pm
  • Posted in:Malware, Spam
  • Author:
    JM Hipolito (Technical Communications)
1

Can it be true that even terrorists are hooked on Facebook? And that the Feds are scouring the social networking site looking for them? Storm Worm puppet-masters seem to think so, or they just want everyone to go and find out if it’s true. Senior Threat Researcher David Sancho has recently discovered a spam run…

Read More
Tags: FacebookFBIStorm

Storm Goes Economic

  • Posted on:July 21, 2008 at 11:51 pm
  • Posted in:Spam
  • Author:
    Jake Soriano (Technical Communications)
0

Ideas on a world financial crisis seem to be on everyone’s minds these days, even malware authors’. In a recent spamming operation, the Storm gang takes advantage of users’ fears of global economic problems. Localizing the attack to citizens of the still hypothetical North American Currency Union, these spammed email messages promise more information on…

Read More
Tags: amerocurrencyeconomyfinancial crisesSpamStorm

Breaking News! Iran Invaded! Well…maybe

  • Posted on:July 9, 2008 at 1:38 am
  • Posted in:Malware
  • Author:
    Robert McArdle (Senior Threat Researcher)
1

Picture the scene: You wake up in the morning and make your way on autopilot to work at your job in Tehran, then switch on your work PC to check your email. One in particular stands out as being a bit different from the others. You read it once, and then just to be sure…

Read More
Tags: Storm

Social Engineering Watch: Happy Fourth of July

  • Posted on:July 4, 2008 at 10:17 am
  • Posted in:Spam
  • Author:
    Macky Cruz (Technical Communications)
0

Security analysts mark a secret social events calendar in their heads for good reason. Malware writers have been known to launch offensives using timely celebratory-themed email messages to get users to click on links or open files. Nifty social engineering tricks like these also effectively distract users from the real action: Trojans getting a foot…

Read More
Tags: july4thStorm
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.