Trend Micro Research : Research

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 2025-01-17 at 11:19 By Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. This article is an excerpt from Trend Micro Research, News […]

React to this headline:

Loading spinner

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 Read More »

Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR

Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR 2025-01-15 at 05:19 By This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR Read More »

How Cracks and Installers Bring Malware to Your Device

How Cracks and Installers Bring Malware to Your Device 2025-01-10 at 09:35 By Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

How Cracks and Installers Bring Malware to Your Device Read More »

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit 2025-01-09 at 09:17 By Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit Read More »

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense 2025-01-07 at 18:01 By Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense Read More »

What We Know About CVE-2024-49112 and CVE-2024-49113

What We Know About CVE-2024-49112 and CVE-2024-49113 2025-01-04 at 09:48 By This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

What We Know About CVE-2024-49112 and CVE-2024-49113 Read More »

Python-Based NodeStealer Version Targets Facebook Ads Manager

Python-Based NodeStealer Version Targets Facebook Ads Manager 2024-12-19 at 09:46 By In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This article is an excerpt

React to this headline:

Loading spinner

Python-Based NodeStealer Version Targets Facebook Ads Manager Read More »

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion 2024-12-13 at 10:04 By In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion Read More »

The Road to Agentic AI: Exposed Foundations

The Road to Agentic AI: Exposed Foundations 2024-12-04 at 17:18 By Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

The Road to Agentic AI: Exposed Foundations Read More »

Gafgyt Malware Targeting Docker Remote API Servers

Gafgyt Malware Targeting Docker Remote API Servers 2024-12-03 at 11:50 By Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Gafgyt Malware Targeting Docker Remote API Servers Read More »

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 2024-11-26 at 10:33 By Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha. This article

React to this headline:

Loading spinner

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Read More »

Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions

Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions 2024-11-25 at 10:35 By Since 2023, APT group Earth Estries has aggressively targeted key industries globally with sophisticated techniques and new backdoors, like GHOSTSPIDER and MASOL RAT, for prolonged espionage operations. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions Read More »

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2024-11-19 at 11:01 By LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates

React to this headline:

Loading spinner

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Read More »

Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations

Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2024-11-11 at 11:18 By Trend Micro researchers, in collaboration with Japanese authorities, analyzed links between SEO malware families used in SEO poisoning attacks that lead users to fake shopping sites. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations Read More »

Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations

Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations 2024-11-08 at 02:00 By Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations Read More »

SOC Around the Clock: World Tour Survey Findings

SOC Around the Clock: World Tour Survey Findings 2024-11-05 at 05:49 By Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

SOC Around the Clock: World Tour Survey Findings Read More »

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

Attacker Abuses Victim Resources to Reap Rewards from Titan Network 2024-10-30 at 09:47 By In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Attacker Abuses Victim Resources to Reap Rewards from Titan Network Read More »

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis 2024-10-24 at 12:33 By While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures. This

React to this headline:

Loading spinner

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis Read More »

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Unmasking Prometei: A Deep Dive Into Our MXDR Findings 2024-10-23 at 16:23 By How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in

React to this headline:

Loading spinner

Unmasking Prometei: A Deep Dive Into Our MXDR Findings Read More »

Attackers Target Exposed Docker Remote API Servers With perfctl Malware

Attackers Target Exposed Docker Remote API Servers With perfctl Malware 2024-10-21 at 18:33 By We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Attackers Target Exposed Docker Remote API Servers With perfctl Malware Read More »

Scroll to Top