Trend Micro Research : Research

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns 2025-10-22 at 22:17 By Trend™ Research examines the complex collaborative relationship between China-aligned APT groups via the new “Premier Pass-as-a-Service” model, exemplified by the recent activities of Earth Estries and Earth Naga. This article is an excerpt from Trend Micro Research, News and Perspectives View […]

React to this headline:

Loading spinner

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns Read More »

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities 2025-10-22 at 01:10 By Trend Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left

React to this headline:

Loading spinner

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities Read More »

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing 2025-10-16 at 17:45 By A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing Read More »

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits 2025-10-15 at 23:22 By Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series. This article is an excerpt from

React to this headline:

Loading spinner

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits Read More »

Weaponized AI Assistants & Credential Thieves

Weaponized AI Assistants & Credential Thieves 2025-10-09 at 15:01 By Learn the state of AI and the NPM ecosystem with the recent s1ngularity’ weaponized AI for credential theft. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Weaponized AI Assistants & Credential Thieves Read More »

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits 2025-10-09 at 15:01 By Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits Read More »

How Your AI Chatbot Can Become a Backdoor

How Your AI Chatbot Can Become a Backdoor 2025-10-08 at 17:54 By In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How Your AI Chatbot Can Become a Backdoor Read More »

Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users

Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users 2025-10-04 at 01:35 By Trend™ Research has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. This article is an excerpt from Trend

React to this headline:

Loading spinner

Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users Read More »

New LockBit 5.0 Targets Windows, Linux, ESXi

New LockBit 5.0 Targets Windows, Linux, ESXi 2025-09-25 at 21:26 By Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

New LockBit 5.0 Targets Windows, Linux, ESXi Read More »

This Is How Your LLM Gets Compromised

This Is How Your LLM Gets Compromised 2025-09-24 at 22:27 By Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

This Is How Your LLM Gets Compromised Read More »

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks 2025-09-24 at 01:02 By Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. This article is an excerpt from Trend

React to this headline:

Loading spinner

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks Read More »

How AI-Native Development Platforms Enable Fake Captcha Pages

How AI-Native Development Platforms Enable Fake Captcha Pages 2025-09-19 at 11:45 By Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How AI-Native Development Platforms Enable Fake Captcha Pages Read More »

What We Know About the NPM Supply Chain Attack

What We Know About the NPM Supply Chain Attack 2025-09-18 at 13:34 By Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

What We Know About the NPM Supply Chain Attack Read More »

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks 2025-09-12 at 06:16 By Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks Read More »

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed 2025-09-09 at 13:08 By An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed Read More »

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps 2025-09-04 at 22:22 By Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps Read More »

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents 2025-08-28 at 14:22 By The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents Read More »

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware 2025-08-20 at 19:25 By Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware Read More »

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks 2025-08-14 at 11:38 By Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks Read More »

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises 2025-08-12 at 13:10 By We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises Read More »