• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: hacking team

Kernel Waiter Exploit from the Hacking Team Leak Still Being Used

  • Posted on:May 19, 2016 at 3:28 am
  • Posted in:Mobile, Vulnerabilities
  • Author:
    Veo Zhang (Mobile Threats Analyst)
0

Although the Hacking Team leak took place several months ago, the impact of this data breach—where exploit codes were made public and spurred a chain of attacks—can still be felt until today. We recently spotted malicious Android apps that appear to use an exploit found in the Hacking Team data dumps. The apps, found in certain websites, could allow remote attackers to gain root privilege when successfully exploited. Mobile devices running on Android version 4.4 (KitKat) and below, which account for nearly 57% of total Android devices, are susceptible to attacks that may abuse this flaw.

Read More
Tags: Hacking Teammalicious appsTowelRoot

Windows Media Center Hacking Team Bug Fixed in September 2015 Patch Tuesday

  • Posted on:September 8, 2015 at 2:23 pm
  • Posted in:Vulnerabilities
  • Author:
    Kenney Lu (Threats Analyst)
0

This month’s Patch Tuesday features 12 updates, with five rated as “critical” and seven as “important.” Included in the critical updates are cumulative updates for both Internet Explorer (MS15-094) and Microsoft Edge (MS15-095). These updates address bugs that could allow remote code execution if the user visits a specially crafted webpage using either browser. Adobe…

Read More
Tags: ExploitsHacking TeamPatch TuesdaySeptember 2015 Patch TuesdaySeptember Patch TuesdayvulnerabilityWindows Media Center

Hacking Team Flash Attacks Spread: Compromised TV and Government-Related Sites in Hong Kong and Taiwan Lead to PoisonIvy

  • Posted on:July 28, 2015 at 2:01 pm
  • Posted in:Exploits, Targeted Attacks, Vulnerabilities
  • Author:
    Joseph C Chen (Fraud Researcher)
0

A recent campaign compromised Taiwan and Hong Kong sites to deliver Flash exploits related to Hacking Team and eventually download PoisonIvy and other payloads in user systems. This campaign started on July 9, a few days after the Hacking Team announced it was hacked. The actors compromised the sites of a local television network, educational…

Read More
Tags: adobe flashflash 0dayHacking Teamwebsite compromise

Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In

  • Posted on:July 21, 2015 at 2:01 am
  • Posted in:Mobile
  • Author:
    Veo Zhang (Mobile Threats Analyst)
0

Following news that iOS devices are at risk of spyware related to the Hacking Team, the saga continues into the Android sphere. We found that among the leaked files is the code for Hacking Team’s open-source malware suite RCSAndroid (Remote Control System Android), which was sold by the company as a tool for monitoring targets….

Read More
Tags: androidgoogle playHacking Team leakmobile threatsRCSAndroid

Hacking Team Leak Uncovers Another Windows Zero-Day, Fixed In Out-Of-Band Patch

  • Posted on:July 20, 2015 at 6:56 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Moony Li (Threat Analyst)
1

Another zero-day vulnerability has been found by Trend Micro researchers from the Hacking Team trove of data. We reported this vulnerability to Microsoft, and it has been designated as CVE-2015-2426. It has also been patched in an unusual out-of-band patch. It could be used to carry out a Windows local privilege escalation (LPE).  By exploiting this vulnerability, attackers…

Read More
Tags: Hacking TeamMicrosoftupdateWindowszero dayzero-day vulnerability
Page 1 of 1412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.