Trend Micro Research : Articles, News, Reports

An Overview of the Different Versions of the Trigona Ransomware

An Overview of the Different Versions of the Trigona Ransomware 23/06/2023 at 15:24 By The Trigona ransomware is a relatively new ransomware family that began activities around late October 2022 — although samples of it existed as early as June 2022. Since then, Trigona’s operators have remained highly active, and in fact have been continuously […]

React to this headline:

Loading spinner

An Overview of the Different Versions of the Trigona Ransomware Read More »

Gaps in Azure Service Fabric’s Security Call for User Vigilance

Gaps in Azure Service Fabric’s Security Call for User Vigilance 21/06/2023 at 13:43 By In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Gaps in Azure Service Fabric’s Security Call for User Vigilance Read More »

Insight on Vulnerabilities in MOVEit Transfer

Insight on Vulnerabilities in MOVEit Transfer 16/06/2023 at 08:18 By Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Insight on Vulnerabilities in MOVEit Transfer Read More »

SeroXen Incorporates Latest BatCloak Engine Iteration

SeroXen Incorporates Latest BatCloak Engine Iteration 15/06/2023 at 12:16 By We looked into the documented behavior of SeroXen malware and noted the inclusion of the latest iteration of the batch obfuscation engine BatCloak to generate a fully undetectable (FUD) .bat loader. This is the second part of a three-part series documenting the abuse of BatCloak’s

React to this headline:

Loading spinner

SeroXen Incorporates Latest BatCloak Engine Iteration Read More »

Attack Surface Management Strategies

Attack Surface Management Strategies 15/06/2023 at 12:16 By As organizations shift to the cloud in droves, their digital attack surface continues to rapidly expand. We explore how proactive cyber risk management can help harden your defenses and reduce the likelihood of an attack or breach. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Attack Surface Management Strategies Read More »

Meet Your New AI Assistant: Introducing Trend Vision One™ – Companion

Meet Your New AI Assistant: Introducing Trend Vision One™ – Companion 15/06/2023 at 12:16 By Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Meet Your New AI Assistant: Introducing Trend Vision One™ – Companion Read More »

To Fight Cyber Extortion and Ransomware, Shift Left

To Fight Cyber Extortion and Ransomware, Shift Left 15/06/2023 at 12:16 By How can organizations defend themselves more effectively against ransomware and other forms of cyber extortion? By “shifting left” and adopting proactive cybersecurity strategies to detect attacks sooner, mitigating breaches before they cause harm. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

To Fight Cyber Extortion and Ransomware, Shift Left Read More »

Behind the Scenes: Unveiling the Hidden Workings of Earth Preta

Behind the Scenes: Unveiling the Hidden Workings of Earth Preta 14/06/2023 at 15:00 By This blog entry discusses the more technical details on the most recent tools, techniques, and procedures (TTPs) leveraged by the Earth Preta APT group, and tackles how we were able to correlate different indicators connected to this threat actor. This article

React to this headline:

Loading spinner

Behind the Scenes: Unveiling the Hidden Workings of Earth Preta Read More »

Analyzing the FUD Malware Obfuscation Engine BatCloak

Analyzing the FUD Malware Obfuscation Engine BatCloak 09/06/2023 at 13:01 By We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Analyzing the FUD Malware Obfuscation Engine BatCloak Read More »

Amazon Security Lake Partners with Trend

Amazon Security Lake Partners with Trend 05/06/2023 at 20:24 By Trend Micro is proud to be a launch partner for Amazon Security Lake, which puts the customer in control, making critical data available to them from third-party security and analytics solutions of their choice. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Amazon Security Lake Partners with Trend Read More »

Investigating BlackSuit Ransomware’s Similarities to Royal

Investigating BlackSuit Ransomware’s Similarities to Royal 31/05/2023 at 13:02 By In this blog entry, we analyze BlackSuit ransomware and how it compares to Royal Ransomware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Investigating BlackSuit Ransomware’s Similarities to Royal Read More »

New Info Stealer Bandit Stealer Targets Browsers, Wallets

New Info Stealer Bandit Stealer Targets Browsers, Wallets 26/05/2023 at 12:16 By This is an analysis of Bandit Stealer, a new Go-based information-stealing malware capable of evading detection as it targets multiple browsers and cryptocurrency wallets. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

New Info Stealer Bandit Stealer Targets Browsers, Wallets Read More »

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies 25/05/2023 at 11:52 By This blog entry features three case studies that show how malicious actors evade the antispam, antibot, and antiabuse measures of online web services via residential proxies and CAPTCHA-breaking services. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies Read More »

Future Exploitation Vector: File Extensions as Top-Level Domains

Future Exploitation Vector: File Extensions as Top-Level Domains 23/05/2023 at 12:01 By In this blog entry, we will examine the security risks related to file extension-related Top-Level Domains (TLDs) while also providing best practices and recommendations on how both individual users and organizations can protect themselves from these hazards. This article is an excerpt from

React to this headline:

Loading spinner

Future Exploitation Vector: File Extensions as Top-Level Domains Read More »

BlackCat Ransomware Deploys New Signed Kernel Driver

BlackCat Ransomware Deploys New Signed Kernel Driver 22/05/2023 at 13:03 By In this blog post, we will provide details on a BlackCat ransomware incident that occurred in February 2023, where we observed a new capability, mainly used for the defense evasion phase. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

BlackCat Ransomware Deploys New Signed Kernel Driver Read More »

Rust-Based Info Stealers Abuse GitHub Codespaces

Rust-Based Info Stealers Abuse GitHub Codespaces 19/05/2023 at 12:32 By This is the first part of our security analysis of an information stealer targeting GitHub Codespaces (CS) that discusses how attackers can abuse these cloud services for a variety of malicious activities. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Rust-Based Info Stealers Abuse GitHub Codespaces Read More »

Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices

Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices 17/05/2023 at 16:44 By An overview of the Lemon Group’s use of preinfected mobile devices, and how this scheme is potentially being developed and expanded to other internet of things (IoT) devices. This research was presented in full at the Black Hat Asia 2023 Conference in Singapore

React to this headline:

Loading spinner

Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices Read More »

8220 Gang Evolves With New Strategies

8220 Gang Evolves With New Strategies 16/05/2023 at 14:08 By We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

8220 Gang Evolves With New Strategies Read More »

Water Orthrus’s New Campaigns Deliver Rootkit and Phishing Modules

Water Orthrus’s New Campaigns Deliver Rootkit and Phishing Modules 15/05/2023 at 13:12 By Water Orthrus has been active recently with two new campaigns. CopperStealth uses a rootkit to install malware on infected systems, while CopperPhish steals credit card information. This blog will provide the structure of the campaign and how they work. This article is

React to this headline:

Loading spinner

Water Orthrus’s New Campaigns Deliver Rootkit and Phishing Modules Read More »

Malicious AI Tool Ads Used to Deliver Redline Stealer

Malicious AI Tool Ads Used to Deliver Redline Stealer 12/05/2023 at 12:25 By We’ve been observing malicious advertisement campaigns in Google’s search engine with themes that are related to AI tools such as Midjourney and ChatGPT. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Malicious AI Tool Ads Used to Deliver Redline Stealer Read More »

Scroll to Top