Trend Micro Research : Research

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution 2025-03-11 at 10:15 By In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make […]

React to this headline:

Loading spinner

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Read More »

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2025-03-05 at 09:50 By Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned

React to this headline:

Loading spinner

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario Read More »

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security 2025-03-04 at 16:00 By This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security Read More »

Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal

Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal 2025-03-03 at 11:24 By In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain persistent control and exfiltrate sensitive data from compromised machines. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal Read More »

Updated Shadowpad Malware Leads to Ransomware Deployment

Updated Shadowpad Malware Leads to Ransomware Deployment 2025-02-20 at 11:18 By In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authentication This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Updated Shadowpad Malware Leads to Ransomware Deployment Read More »

Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection

Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection 2025-02-18 at 03:03 By Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads, bypass ESET antivirus, and maintain control over compromised systems. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection Read More »

Chinese-Speaking Group Manipulates SEO with BadIIS

Chinese-Speaking Group Manipulates SEO with BadIIS 2025-02-07 at 11:48 By This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Chinese-Speaking Group Manipulates SEO with BadIIS Read More »

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks 2025-02-04 at 11:10 By The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks Read More »

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response 2025-01-30 at 10:18 By The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response Read More »

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 2025-01-17 at 11:19 By Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 Read More »

Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR

Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR 2025-01-15 at 05:19 By This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR Read More »

How Cracks and Installers Bring Malware to Your Device

How Cracks and Installers Bring Malware to Your Device 2025-01-10 at 09:35 By Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

How Cracks and Installers Bring Malware to Your Device Read More »

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit 2025-01-09 at 09:17 By Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit Read More »

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense 2025-01-07 at 18:01 By Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense Read More »

What We Know About CVE-2024-49112 and CVE-2024-49113

What We Know About CVE-2024-49112 and CVE-2024-49113 2025-01-04 at 09:48 By This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

What We Know About CVE-2024-49112 and CVE-2024-49113 Read More »

Python-Based NodeStealer Version Targets Facebook Ads Manager

Python-Based NodeStealer Version Targets Facebook Ads Manager 2024-12-19 at 09:46 By In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This article is an excerpt

React to this headline:

Loading spinner

Python-Based NodeStealer Version Targets Facebook Ads Manager Read More »

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion 2024-12-13 at 10:04 By In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion Read More »

The Road to Agentic AI: Exposed Foundations

The Road to Agentic AI: Exposed Foundations 2024-12-04 at 17:18 By Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

The Road to Agentic AI: Exposed Foundations Read More »

Gafgyt Malware Targeting Docker Remote API Servers

Gafgyt Malware Targeting Docker Remote API Servers 2024-12-03 at 11:50 By Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Gafgyt Malware Targeting Docker Remote API Servers Read More »

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 2024-11-26 at 10:33 By Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha. This article

React to this headline:

Loading spinner

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Read More »

Scroll to Top