You are here:-Threat Intelligence

Threat Intelligence

Mirai-like Scanning Activity Detected From China, With Targets in Brazil

by Trend Micro IoT Reputation Service Team Our network monitoring system recently detected an enormous amount of Mirai-like scanning activity from China. From 1:00 p.m. UTC on March 31 to 12:00 a.m. UTC on April 3, our team detected an influx of activity coming from 3,423 IP addresses of scanners. Brazil appeared to

By | 2018-04-17T05:52:16+00:00 April 16th, 2018|Categories: Threat Intelligence|0 Comments

Study: Single Connected Car Can Trick Smart Traffic Lights Into Causing Intersection Clogging – Security News

Researchers from the University of Michigan have shown that connected vehicle-based transportation systems can be interfered with using a single attack vehicle. Their research demonstrates how identifying a data spoofing strategy on one connected car can trick a traffic system into believing that an intersection is congested through vehicle-to-infrastructure (V2I) communication. V2I is

By | 2018-03-30T02:46:58+00:00 March 28th, 2018|Categories: Threat Intelligence|Comments Off on Study: Single Connected Car Can Trick Smart Traffic Lights Into Causing Intersection Clogging – Security News

Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test –

One of the key use cases for our customers is the protection of their data center environments, which can involve moving off the perimeter into the data center or segmenting their data center from the rest of the organization. It is imperative that a data center security solution not only deliver high inspection

By | 2018-02-21T03:20:59+00:00 February 19th, 2018|Categories: Threat Intelligence|Comments Off on Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test –

New Mirai Attack Attempts Detected in South America and North African Countries

Just a few days ago, the notorious Internet of Things (IoT) botnet known as Mirai (detected by Trend Micro as ELF_MIRAI family) was detected as being active in a new campaign targeting Argentina, when red flags were raised after an increase in traffic on ports 2323 and 23. It appears that the campaign

By | 2017-12-05T03:24:46+00:00 December 3rd, 2017|Categories: Threat Intelligence|Comments Off on New Mirai Attack Attempts Detected in South America and North African Countries

Vulnerability in Key Fob Can Let Hackers Open Subaru Cars – Security News

Electronics designer Tom Wimmenhove recently uncovered a vulnerability in the key fob system that car manufacturer Subaru uses for several of its vehicles. When exploited successfully, it can enable hackers or thieves to clone the key fob to the access the vehicle.  Dubbed as the “fobrob” exploit, Wimmenhove noted that the flaw is

By | 2017-10-17T03:35:52+00:00 October 16th, 2017|Categories: Threat Intelligence|Comments Off on Vulnerability in Key Fob Can Let Hackers Open Subaru Cars – Security News

As Cities Get Smarter, So Should Their Security

TrendMicro Today, more urban centers than ever are implementing a range of advanced technological systems. These sensors and networks used in combination with citizens' mobile devices create smarter cities capable of reduced pollution, increased safety, better engagement with residents and more accessible transportation options. As the majority of the world's population – 65 percent

By | 2017-09-23T19:23:46+00:00 June 26th, 2017|Categories: Threat Intelligence|Comments Off on As Cities Get Smarter, So Should Their Security

IoT, Smart Cities Under Attack

Internet of Things technology is now more widespread than many people realize. Systems that fall under the IoT umbrella are popping up in an array of settings, even outside consumer circles. Today, every group from enterprise businesses to city governments is utilizing intelligent, internet- and Bluetooth-enabled devices to make a variety of critical

By | 2017-09-23T19:23:09+00:00 May 22nd, 2017|Categories: Threat Intelligence|Comments Off on IoT, Smart Cities Under Attack

WannaCry & The Reality Of Patching

[Editors note: For the latest WannaCry information as it relates to Trend Micro products, please read this support article.]  The WannaCry ransomware variant of 12-May-2017 has been engineered to take advantage of the most common security challenges facing large organizations today. Starting with one infection system, this variant uses a recent vulnerability (CVE-2017-0144/MS17-010)

By | 2017-07-12T20:31:20+00:00 May 14th, 2017|Categories: Threat Intelligence|Comments Off on WannaCry & The Reality Of Patching

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

Ransomware that inflicts severe damage on corporate IT systems Ransomware is indiscriminate on its targets. It is a type of that infects smartphones, tablets, computers, and servers to render the device inaccessible by locking the screen or encrypting its files. In order to regain access, the user must pay up. Ransomware began to

By | 2017-07-12T07:55:50+00:00 April 3rd, 2017|Categories: Threat Intelligence|Comments Off on Smart Factory Security Part 3: Ransomware countermeasures for factory operations

TrendLabs Security Intelligence BlogNew Linux Malware Exploits CGI Vulnerability

by Jeanne Jocson and Jennifer Gumban Linux has long been the preferred operating system for enterprise platforms and Internet of Things (IoT) manufacturers. Linux-based devices are continually being deployed in smart systems across many different industries, with IoT gateways facilitating connected solutions and services central to different businesses. In connection to their widespread

By | 2017-07-11T22:51:08+00:00 March 9th, 2017|Categories: Threat Intelligence|Comments Off on TrendLabs Security Intelligence BlogNew Linux Malware Exploits CGI Vulnerability