Trend Micro Research : Articles, News, Reports

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis 2024-10-24 at 12:33 By While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures. This […]

React to this headline:

Loading spinner

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis Read More »

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Unmasking Prometei: A Deep Dive Into Our MXDR Findings 2024-10-23 at 16:23 By How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in

React to this headline:

Loading spinner

Unmasking Prometei: A Deep Dive Into Our MXDR Findings Read More »

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach 2024-10-22 at 12:47 By In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach Read More »

Attackers Target Exposed Docker Remote API Servers With perfctl Malware

Attackers Target Exposed Docker Remote API Servers With perfctl Malware 2024-10-21 at 18:33 By We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Attackers Target Exposed Docker Remote API Servers With perfctl Malware Read More »

Gartner 2024 CNAPP Market Guide Insights for Leaders

Gartner 2024 CNAPP Market Guide Insights for Leaders 2024-10-18 at 19:46 By As businesses increasingly pivot to cloud-native applications, the landscape of cybersecurity becomes ever more challenging. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Gartner 2024 CNAPP Market Guide Insights for Leaders Read More »

How to Mitigate the Impact of Rogue AI Risks

How to Mitigate the Impact of Rogue AI Risks 2024-10-17 at 23:34 By This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How to Mitigate the Impact of Rogue AI Risks Read More »

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data 2024-10-16 at 14:35 By This article uncovers a Golang ransomware abusing AWS S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions. This article is an excerpt

React to this headline:

Loading spinner

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data Read More »

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions 2024-10-15 at 11:02 By Trend Micro’s Threat Hunting Team discovered EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions Read More »

Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware

Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware 2024-10-14 at 11:48 By Trend Micro researchers have uncovered a surge of malicious activities involving a threat actor group that we track as Water Makara. This group is targeting enterprises in Brazil, deploying banking malware using obfuscated JavaScript to slip past

React to this headline:

Loading spinner

Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware Read More »

Earth Simnavaz Levies Advanced Cyberattacks Against UAE and Gulf Regions

Earth Simnavaz Levies Advanced Cyberattacks Against UAE and Gulf Regions 2024-10-11 at 11:02 By Trend Micro’s investigation into the recent activity of Earth Simnavaz provides new insights into the APT group’s evolving tactics and the immediate threat it poses to critical sectors in the UAE. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Earth Simnavaz Levies Advanced Cyberattacks Against UAE and Gulf Regions Read More »

Rogue AI: What the Security Community is Missing

Rogue AI: What the Security Community is Missing 2024-10-03 at 11:46 By This is the fourth blog post in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Rogue AI: What the Security Community is Missing Read More »

MDR in Action: Preventing The More_eggs Backdoor From Hatching

MDR in Action: Preventing The More_eggs Backdoor From Hatching 2024-09-30 at 18:16 By Trend Micro MDR (Managed Detection and Response) team promptly mitigated a more_eggs infection. Using Vision One, MDR illustrated how Custom Filters/Models and Security Playbook can be used to automate the response to more_eggs and similar threats. This article is an excerpt from

React to this headline:

Loading spinner

MDR in Action: Preventing The More_eggs Backdoor From Hatching Read More »

Delivering Proactive Protection Against Critical Threats to NVIDIA-powered AI Systems

Delivering Proactive Protection Against Critical Threats to NVIDIA-powered AI Systems 2024-09-27 at 18:16 By On Wednesday, NVIDA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Delivering Proactive Protection Against Critical Threats to NVIDIA-powered AI Systems Read More »

Cybersecurity Compass: Bridging the Communication Gap

Cybersecurity Compass: Bridging the Communication Gap 2024-09-27 at 05:16 By Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Cybersecurity Compass: Bridging the Communication Gap Read More »

How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections

How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections 2024-09-20 at 18:31 By Trend Micro tracked this group as Water Bakunawa, behind the RansomHub ransomware, employs various anti-EDR techniques to play a high-stakes game of hide and seek with security solutions. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections Read More »

Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC

Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC 2024-09-19 at 11:47 By We observed Earth Baxia carrying out targeted attacks against APAC countries that involved advanced techniques like spear-phishing and customized malware, with data suggesting that the group operates from China. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC Read More »

Vulnerabilities in Cellular Packet Cores Part IV: Authentication

Vulnerabilities in Cellular Packet Cores Part IV: Authentication 2024-09-18 at 13:46 By Our research reveals two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC). The first vulnerability (CVE-2024-20685) allows a crafted signaling message to crash the control plane, leading to potential service outages. The second (ZDI-CAN-23960) disconnects and replaces attached base stations, disrupting network

React to this headline:

Loading spinner

Vulnerabilities in Cellular Packet Cores Part IV: Authentication Read More »

Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities

Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities 2024-09-12 at 12:46 By In this blog entry, we provide an analysis of the recent remote code execution attacks related to Progress Software’s WhatsUp Gold that possibly abused the vulnerabilities CVE-2024-6670 and CVE-2024-6671. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities Read More »

Earth Preta Evolves its Attacks with New Malware and Strategies

Earth Preta Evolves its Attacks with New Malware and Strategies 2024-09-09 at 10:48 By In this blog entry, we discuss our analysis of Earth Preta’s enhancements in their attacks by introducing new tools, malware variants and strategies to their worm-based attacks and their time-sensitive spear-phishing campaign. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Earth Preta Evolves its Attacks with New Malware and Strategies Read More »

TIDRONE Targets Military and Satellite Industries in Taiwan

TIDRONE Targets Military and Satellite Industries in Taiwan 2024-09-06 at 12:49 By Our research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

TIDRONE Targets Military and Satellite Industries in Taiwan Read More »

Scroll to Top