Trend Micro Research : Endpoints

CrazyHunter Campaign Targets Taiwanese Critical Sectors

CrazyHunter Campaign Targets Taiwanese Critical Sectors 2025-04-16 at 11:55 By This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

CrazyHunter Campaign Targets Taiwanese Critical Sectors Read More »

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets 2025-04-14 at 14:12 By A controller linked to BPF backdoor can open a reverse shell, enabling deeper infiltration into compromised networks. Recent attacks have been observed targeting the telecommunications, finance, and retail sectors across South Korea, Hong Kong, Myanmar, Malaysia, and Egypt. This article is an

React to this headline:

Loading spinner

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets Read More »

CTEM + CREM: Aligning Your Cybersecurity Strategy

CTEM + CREM: Aligning Your Cybersecurity Strategy 2025-04-09 at 05:41 By Cyber threats evolve daily, and organizations need to move beyond traditional security approaches to stay ahead. That’s why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction. CTEM isn’t just another cybersecurity buzzword; it’s a structured, continuous program designed

React to this headline:

Loading spinner

CTEM + CREM: Aligning Your Cybersecurity Strategy Read More »

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques 2025-03-31 at 12:23 By The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.

React to this headline:

Loading spinner

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques Read More »

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure 2025-03-28 at 17:54 By Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines. This article is an excerpt

React to this headline:

Loading spinner

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure Read More »

Cybertron Reshapes AI Security as “Cyber Brain” Grows

Cybertron Reshapes AI Security as “Cyber Brain” Grows 2025-03-27 at 03:02 By Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Cybertron Reshapes AI Security as “Cyber Brain” Grows Read More »

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin 2025-03-25 at 17:18 By Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin Read More »

Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations

Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations 2025-03-21 at 11:36 By Trend Research encounters new versions of the Albabat ransomware, which appears to target Windows, Linux, and macOS devices. We also reveal the group’s use of GitHub to streamline their ransomware operation. This article is an excerpt from

React to this headline:

Loading spinner

Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations Read More »

ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns

ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns 2025-03-21 at 07:21 By Trend Zero Day Initiative™ (ZDI) uncovered both state-sponsored and cybercriminal groups extensively exploiting ZDI-CAN-25373, a Windows .lnk file vulnerability that enables hidden command execution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns Read More »

SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware

SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware 2025-03-14 at 07:18 By Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware Read More »

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution 2025-03-11 at 10:15 By In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make

React to this headline:

Loading spinner

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Read More »

Updated Shadowpad Malware Leads to Ransomware Deployment

Updated Shadowpad Malware Leads to Ransomware Deployment 2025-02-20 at 11:18 By In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authentication This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Updated Shadowpad Malware Leads to Ransomware Deployment Read More »

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks 2025-02-04 at 11:10 By The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks Read More »

Native Sensors vs. Integrations for XDR Platforms?

Native Sensors vs. Integrations for XDR Platforms? 2025-02-03 at 09:20 By Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Native Sensors vs. Integrations for XDR Platforms? Read More »

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR? 2025-01-31 at 22:20 By XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR? Read More »

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response 2025-01-30 at 10:18 By The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response Read More »

ASRM: A New Pillar for Cyber Insurance Underwriting

ASRM: A New Pillar for Cyber Insurance Underwriting 2025-01-30 at 02:33 By ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

ASRM: A New Pillar for Cyber Insurance Underwriting Read More »

Invisible Prompt Injection: A Threat to AI Security

Invisible Prompt Injection: A Threat to AI Security 2025-01-23 at 00:07 By This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Invisible Prompt Injection: A Threat to AI Security Read More »

How Cracks and Installers Bring Malware to Your Device

How Cracks and Installers Bring Malware to Your Device 2025-01-10 at 09:35 By Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

How Cracks and Installers Bring Malware to Your Device Read More »

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit 2025-01-09 at 09:17 By Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit Read More »

Scroll to Top