Trend Micro Research : Articles, News, Reports

Python-Based NodeStealer Version Targets Facebook Ads Manager

Python-Based NodeStealer Version Targets Facebook Ads Manager 2024-12-19 at 09:46 By In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This article is an excerpt […]

React to this headline:

Loading spinner

Python-Based NodeStealer Version Targets Facebook Ads Manager Read More »

Link Trap: GenAI Prompt Injection Attack

Link Trap: GenAI Prompt Injection Attack 2024-12-17 at 03:20 By Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Link Trap: GenAI Prompt Injection Attack Read More »

MITRE ATT&CK 2024 Results for Enterprise Security

MITRE ATT&CK 2024 Results for Enterprise Security 2024-12-11 at 19:18 By Enterprise 2024 will incorporate multiple, smaller emulations for a more nuanced and targeted evaluation of defensive capabilities. We’re excited to offer two distinct adversary focus areas: Ransomware targeting Windows and Linux, and the Democratic People’s Republic of Korea’s targeting macOS. This article is an

React to this headline:

Loading spinner

MITRE ATT&CK 2024 Results for Enterprise Security Read More »

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks 2024-12-05 at 09:33 By Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks Read More »

The Road to Agentic AI: Exposed Foundations

The Road to Agentic AI: Exposed Foundations 2024-12-04 at 17:18 By Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

The Road to Agentic AI: Exposed Foundations Read More »

Gafgyt Malware Targeting Docker Remote API Servers

Gafgyt Malware Targeting Docker Remote API Servers 2024-12-03 at 11:50 By Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Gafgyt Malware Targeting Docker Remote API Servers Read More »

AI Pulse: The Good from AI and the Promise of Agentic

AI Pulse: The Good from AI and the Promise of Agentic 2024-12-03 at 03:54 By The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of

React to this headline:

Loading spinner

AI Pulse: The Good from AI and the Promise of Agentic Read More »

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 2024-11-26 at 10:33 By Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha. This article

React to this headline:

Loading spinner

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Read More »

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2024-11-19 at 11:01 By LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates

React to this headline:

Loading spinner

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Read More »

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices 2024-11-18 at 11:33 By In this blog entry, we discuss Water Barghest’s exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Read More »

Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations

Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2024-11-11 at 11:18 By Trend Micro researchers, in collaboration with Japanese authorities, analyzed links between SEO malware families used in SEO poisoning attacks that lead users to fake shopping sites. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations Read More »

Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations

Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations 2024-11-08 at 02:00 By Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations Read More »

SOC Around the Clock: World Tour Survey Findings

SOC Around the Clock: World Tour Survey Findings 2024-11-05 at 05:49 By Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

SOC Around the Clock: World Tour Survey Findings Read More »

AI Pulse: Election Deepfakes, Disasters, Scams & more

AI Pulse: Election Deepfakes, Disasters, Scams & more 2024-10-31 at 22:02 By In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about

React to this headline:

Loading spinner

AI Pulse: Election Deepfakes, Disasters, Scams & more Read More »

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

Attacker Abuses Victim Resources to Reap Rewards from Titan Network 2024-10-30 at 09:47 By In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Attacker Abuses Victim Resources to Reap Rewards from Titan Network Read More »

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis 2024-10-24 at 12:33 By While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures. This

React to this headline:

Loading spinner

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis Read More »

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Unmasking Prometei: A Deep Dive Into Our MXDR Findings 2024-10-23 at 16:23 By How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in

React to this headline:

Loading spinner

Unmasking Prometei: A Deep Dive Into Our MXDR Findings Read More »

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach 2024-10-22 at 12:47 By In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach Read More »

Attackers Target Exposed Docker Remote API Servers With perfctl Malware

Attackers Target Exposed Docker Remote API Servers With perfctl Malware 2024-10-21 at 18:33 By We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Attackers Target Exposed Docker Remote API Servers With perfctl Malware Read More »

Gartner 2024 CNAPP Market Guide Insights for Leaders

Gartner 2024 CNAPP Market Guide Insights for Leaders 2024-10-18 at 19:46 By As businesses increasingly pivot to cloud-native applications, the landscape of cybersecurity becomes ever more challenging. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Gartner 2024 CNAPP Market Guide Insights for Leaders Read More »

Scroll to Top