You are here:-Anti-Malware

anti-Malware

by Lenart Bermejo and Ronnie Giagone (Threats Analysts) We came across a new version of a cryptocurrency-mining RETADUP worm (detected by Trend Micro as WORM_RETADUP.G) through feedback from our managed detection and response-related monitoring. This new variant is coded in AutoHotKey, an open-source scripting language used in Windows for creating hotkeys (i.e., keyboard

By | 2018-04-23T17:09:12+00:00 April 23rd, 2018|Categories: Anti-Malware|0 Comments

We have been detecting a new wave of network attacks since early March, which, for now, are targeting Japan, Korea, China, Taiwan, and Hong Kong. The attacks use Domain Name System (DNS) cache poisoning/DNS spoofing, possibly through infringement techniques such as brute-force or dictionary attacks, to distribute and install malicious Android apps. Trend

By | 2018-04-20T03:32:02+00:00 April 20th, 2018|Categories: Anti-Malware|0 Comments

By Abraham Camba and Janus Agcaoili We discovered a spam campaign that delivers the notorious cross-platform remote access Trojan (RAT) Adwind a.k.a. jRAT (detected by Trend Micro as JAVA_ADWIND.WIL) alongside another well-known backdoor called XTRAT a.k.a XtremeRAT (BKDR_XTRAT.SMM). The spam campaign also delivered the info-stealer Loki (TSPY_HPLOKI.SM1). DUNIHI (VBS_DUNIHI.ELDSAVJ), a known VBScript with backdoor

By | 2018-04-19T15:23:04+00:00 April 19th, 2018|Categories: Anti-Malware|0 Comments

by Don Ladores and Angelo Deveraturda  Currently, cryptocurrency miners are heavily used by malware—we’ve seen miners injected onto ad platforms, on popular mobile devices, and servers. Malware creators change payloads to maximize their chances to make a profit, and in this volatile cryptocurrency landscape, they seem committed to integrating miners into their arsenal. We are

By | 2018-04-18T02:37:17+00:00 April 17th, 2018|Categories: Anti-Malware|0 Comments

Instances involving compromised devices, botnets, and vulnerabilities have become ordinary occurrences. This makes sense given the increased connectivity today, but ask yourself: What is the most common internet-of-things (IoT) device across network infrastructures, whether in homes or businesses? Answer: the router. Even before the term IoT was coined, we had the routers at

By | 2018-04-17T14:35:41+00:00 April 17th, 2018|Categories: Anti-Malware|0 Comments

by Dove Chiu, Kenney Lu, and Tim Yeh (Threats Analysts) If there is anything to be learned from the massive attacks that have been seen on connected devices, it is that the internet of things (IoT) is riddled with vulnerabilities. We have seen this time and again with how botnets are created from

By | 2018-04-16T14:12:28+00:00 April 16th, 2018|Categories: Anti-Malware|0 Comments

Microsoft has rolled out its Patch Tuesday for April to address security issues in Internet Explorer (IE), Edge, ChakraCore, Visual Studio, Microsoft Office and Office Services and Web Apps, and Malware Protection Engine. Of the 67 listed vulnerabilities, 24 were rated critical. Eight of these were disclosed through Trend Micro’s ZDI program: While

By | 2018-04-11T12:31:30+00:00 April 11th, 2018|Categories: Anti-Malware|0 Comments

by Trend Micro IoT Reputation Service Team Our network monitoring system recently detected an enormous amount of Mirai-like scanning activity from China. From 1:00 p.m. UTC on March 31 to 12:00 a.m. UTC on April 3, our team detected an influx of activity coming from 3,423 IP addresses of scanners. Brazil appeared to

By | 2018-04-11T12:15:28+00:00 April 11th, 2018|Categories: Anti-Malware|0 Comments

By Mayra Rosario Fuentes and Numaan Huq (Senior Threat Researchers) In our latest research paper on healthcare cybersecurity, Securing Connected Hospitals, which was produced in partnership with HITRUST, we examined internet-connected medical-related devices and systems such as databases, hospital admin consoles, and medical devices. We also looked into the supply chain, which has

By | 2018-04-05T23:02:51+00:00 April 5th, 2018|Categories: Anti-Malware|0 Comments

Using a machine learning system, we analyzed 3 million software downloads, involving hundreds of thousands of internet-connected machines, and provide insights in this three-part blog series. In the first part of this series, we took a closer look at unpopular software downloads and the risks they pose to organizations. We also briefly mentioned

By | 2018-04-05T11:01:49+00:00 April 5th, 2018|Categories: Anti-Malware|0 Comments