• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   ZeuS

Attack of the Solo Cybercriminals – Frapstar in Canada

  • Posted on:May 26, 2015 at 8:08 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

By now cybercrime has become the fastest growing criminal enterprise of the 21st century, run by efficient organizations with great professionalism. Today, news headlines are mostly about large-scale breaches orchestrated by large criminal syndicates. But smaller one-man operations can be equally devastating to the unwitting home users and businesses. This reminds us that cyber criminals…

Read More
Tags: canadacardingcybercrimecybercriminal undergroundinformation theftZeuS

Decrypting ZBOT Configuration Files Automatically

  • Posted on:November 12, 2014 at 10:32 pm
  • Posted in:Malware
  • Author:
    Lord Alfred Remorin (Senior Threat Researcher)
0

Since its emergence in 2007, ZBOT (also known as ZeuS) has become one of the most prevalent botnets and widely distributed banking Trojans. This malware family is widely known as a notorious credential stealing toolkit. It uses form-grabbing through web injection to steal user credentials from legitimate websites. It also has the capability to send…

Read More
Tags: AVARbanking TrojanMalwareonline bankingZBOTZeuS

Checking In On Africa: The Latest Developments in Cybercrime

  • Posted on:August 11, 2014 at 8:07 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

In the early 2000s, Africa gained notoriety due to the 419 “Nigerian” scam. This scam involved making payments in exchange for a reward for helping so-called high-ranking Nigerian officials and their families. While all the scams may not have necessarily originated from Africa, the use of Nigerian officials was imprinted upon the public consciousness, thereby…

Read More
Tags: 419 “Nigerian” scamAfricabanking TrojanBlackshadesbotnetCVE-2012-0158cybercrimedefacementdenial-of-service (DoS) attacksdistributed denial-of-service (DDoS) attacksIce IXRATsremote access TrojansSpyEyeTargeted Attack TechniquesZBOTZeuS

1H 2014 Spam Attacks and Trends

  • Posted on:July 24, 2014 at 8:40 am
  • Posted in:Malware, Spam
  • Author:
    Maria Manly (Anti-spam Research Engineer)
0

In the first half of the year, the spam volume increased by 60% compared to the data last 1H 2013.  We can attribute these to several factors:  the prevalence of DOWNAD and the steady boom of malware-related emails with spam-sending capabilities (such as MYTOB). Prevalent threats like UPATRE and ZeuS/ZBOT also employed spam as its…

Read More
Tags: ConfickercybercrimeDOWNADGermanyMalwareSpamZBOTZeuS

DOWNAD Tops Malware Spam Source in Q2 2014

  • Posted on:July 1, 2014 at 7:15 pm
  • Posted in:Malware, Spam
  • Author:
    Maria Manly (Anti-spam Research Engineer)
0

DOWNAD , also known as Conficker  remains to be one of the top 3 malware that affects enterprises and small and medium businesses.  This is attributed to the fact that a number of companies are still using Windows XP, susceptible to this threat. It can infect an entire network via a malicious URL, spam email, and…

Read More
Tags: BotnetscybercrimeDAWNADMalwareSpamZBOTZeuS
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.