Trend Micro Research : Cyber Crime

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics 07/12/2023 at 22:16 By Explore real use cases demonstrating the transformative impact of Trend Vision One™ – Forensics, an integrated Digital Forensics and Incident Response (DFIR) tool This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Integrated DFIR Tool Can Simplify and Accelerate Cyber Forensics Read More »

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime 27/10/2023 at 12:50 By This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime Read More »

Attacks on 5G Infrastructure From Users’ Devices

Attacks on 5G Infrastructure From Users’ Devices 20/09/2023 at 11:03 By Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed,

React to this headline:

Loading spinner

Attacks on 5G Infrastructure From Users’ Devices Read More »

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 01/09/2023 at 12:04 By In this entry, we summarize the security analyses and investigations done on phishing-as-a-service 16shop through the years. We also outline the partnership between Trend Micro and Interpol in taking down the main administrators and servers of this massive phishing campaign. This article is an excerpt

React to this headline:

Loading spinner

Revisiting 16shop Phishing Kit, Trend-Interpol Partnership Read More »

Taking the Fight to the Cyber-Criminals

Taking the Fight to the Cyber-Criminals 18/07/2023 at 03:02 By Trend Micro and INTERPOL collaborate to create a safer digital world This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Taking the Fight to the Cyber-Criminals Read More »

Tailing Big Head Ransomware’s Variants, Tactics, and Impact

Tailing Big Head Ransomware’s Variants, Tactics, and Impact 07/07/2023 at 15:33 By We analyze the technical details of a new ransomware family named Big Head. In this entry, we discuss the Big Head ransomware’s similarities and distinct markers that add more technical details to initial reports on the ransomware. This article is an excerpt from

React to this headline:

Loading spinner

Tailing Big Head Ransomware’s Variants, Tactics, and Impact Read More »

Analyzing the FUD Malware Obfuscation Engine BatCloak

Analyzing the FUD Malware Obfuscation Engine BatCloak 09/06/2023 at 13:01 By We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Analyzing the FUD Malware Obfuscation Engine BatCloak Read More »

Rust-Based Info Stealers Abuse GitHub Codespaces

Rust-Based Info Stealers Abuse GitHub Codespaces 19/05/2023 at 12:32 By This is the first part of our security analysis of an information stealer targeting GitHub Codespaces (CS) that discusses how attackers can abuse these cloud services for a variety of malicious activities. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Rust-Based Info Stealers Abuse GitHub Codespaces Read More »

Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices

Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices 17/05/2023 at 16:44 By An overview of the Lemon Group’s use of preinfected mobile devices, and how this scheme is potentially being developed and expanded to other internet of things (IoT) devices. This research was presented in full at the Black Hat Asia 2023 Conference in Singapore

React to this headline:

Loading spinner

Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices Read More »

8220 Gang Evolves With New Strategies

8220 Gang Evolves With New Strategies 16/05/2023 at 14:08 By We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

8220 Gang Evolves With New Strategies Read More »

Scroll to Top