Trend Micro Research : Research

Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users

Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users 2025-10-04 at 01:35 By Trend™ Research has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. This article is an excerpt from Trend […]

React to this headline:

Loading spinner

Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users Read More »

New LockBit 5.0 Targets Windows, Linux, ESXi

New LockBit 5.0 Targets Windows, Linux, ESXi 2025-09-25 at 21:26 By Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

New LockBit 5.0 Targets Windows, Linux, ESXi Read More »

This Is How Your LLM Gets Compromised

This Is How Your LLM Gets Compromised 2025-09-24 at 22:27 By Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

This Is How Your LLM Gets Compromised Read More »

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks 2025-09-24 at 01:02 By Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. This article is an excerpt from Trend

React to this headline:

Loading spinner

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks Read More »

How AI-Native Development Platforms Enable Fake Captcha Pages

How AI-Native Development Platforms Enable Fake Captcha Pages 2025-09-19 at 11:45 By Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How AI-Native Development Platforms Enable Fake Captcha Pages Read More »

What We Know About the NPM Supply Chain Attack

What We Know About the NPM Supply Chain Attack 2025-09-18 at 13:34 By Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

What We Know About the NPM Supply Chain Attack Read More »

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks 2025-09-12 at 06:16 By Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks Read More »

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed 2025-09-09 at 13:08 By An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed Read More »

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps 2025-09-04 at 22:22 By Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps Read More »

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents 2025-08-28 at 14:22 By The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents Read More »

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware 2025-08-20 at 19:25 By Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware Read More »

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks 2025-08-14 at 11:38 By Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks Read More »

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises 2025-08-12 at 13:10 By We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises Read More »

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises 2025-08-12 at 13:10 By We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises Read More »

Gunra Ransomware Group Unveils Efficient Linux Variant

Gunra Ransomware Group Unveils Efficient Linux Variant 2025-07-29 at 15:02 By This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Gunra Ransomware Group Unveils Efficient Linux Variant Read More »

Proactive Email Security: The Power of AI

Proactive Email Security: The Power of AI 2025-07-25 at 01:27 By Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Proactive Email Security: The Power of AI Read More »

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) 2025-07-22 at 02:18 By CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) Read More »

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Earth Lamia Develops Custom Arsenal to Target Multiple Industries 2025-05-27 at 12:02 By Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations.

React to this headline:

Loading spinner

Earth Lamia Develops Custom Arsenal to Target Multiple Industries Read More »

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain 2025-05-22 at 12:23 By We have detected a new tactic involving fake CAPTCHA pages that trick users into executing harmful commands in Windows. This scheme uses disguised files sent via phishing and other malicious methods. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain Read More »

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan 2025-05-13 at 10:16 By Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan Read More »

Scroll to Top