You are here:-Threat Intelligence

Threat Intelligence

Open ADB Ports Being Exploited to Spread Possible Satori Variant in Android Devices

By | 2018-07-25T03:41:44+00:00 July 23rd, 2018|Categories: Threat Intelligence|

by Hubert Lin, Lorin Wu, and Vit Sembera The exploitation of open ports on devices has been an on-going problem for many IoT users. TCP port 5555, in particular, has had issues in the past due to product manufacturers leaving it open before shipping, which potentially exposes users to attackers. Recently, we found

Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G

By | 2018-06-14T03:18:41+00:00 June 12th, 2018|Categories: Threat Intelligence|

by Craig Gibson (Principal Threat Defense Architect) Already a vital part of both the internet of things and the critical infrastructure of the internet, satellites are set to take on a more significant role with the emergence of 5G cellular network technology and the continuing expansion of the internet of things (IoT). While

Comments Off on Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G

Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale

By | 2018-06-07T12:12:46+00:00 June 6th, 2018|Categories: Threat Intelligence|

by Craig Gibson (Principal Threat Defense Architect) Already, current cellular network technologies such as 3G and 4G allow fast wireless communication. But the next evolution, 5G, is set to afford even faster connections along with greater reliability. Touted as the next generation of mobile internet connectivity, 5G will offer speeds of the order

Comments Off on Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale

Blockchain: The Missing Link Between Security and the IoT? – Security News

By | 2018-05-21T10:44:44+00:00 May 20th, 2018|Categories: Threat Intelligence|

The internet of things (IoT) has been associated with major cyberattacks, often involving the abuse of vulnerable connected devices, such as surveillance cameras, to facilitate malicious activities. Of course, concerns have been raised about the IoT’s capability to secure billions of devices connected to the unwieldy internet, calling for viable solutions that could

Comments Off on Blockchain: The Missing Link Between Security and the IoT? – Security News

Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground

By | 2018-05-09T16:43:38+00:00 May 8th, 2018|Categories: Threat Intelligence|

Cryptocurrencies have been generating much buzz of late. While some governments are at work to regulate transactions involving them, there are others that want to stop mining activities related to them altogether. We have noted that cybercriminals have been actively engaged in cryptocurrency-mining malware activities, ranging from those that exploit consumer hardware graphics

Comments Off on Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground

Mirai-like Scanning Activity Detected From China, With Targets in Brazil

By | 2018-04-17T05:52:16+00:00 April 16th, 2018|Categories: Threat Intelligence|

by Trend Micro IoT Reputation Service Team Our network monitoring system recently detected an enormous amount of Mirai-like scanning activity from China. From 1:00 p.m. UTC on March 31 to 12:00 a.m. UTC on April 3, our team detected an influx of activity coming from 3,423 IP addresses of scanners. Brazil appeared to

Comments Off on Mirai-like Scanning Activity Detected From China, With Targets in Brazil

Study: Single Connected Car Can Trick Smart Traffic Lights Into Causing Intersection Clogging – Security News

By | 2018-03-30T02:46:58+00:00 March 28th, 2018|Categories: Threat Intelligence|

Researchers from the University of Michigan have shown that connected vehicle-based transportation systems can be interfered with using a single attack vehicle. Their research demonstrates how identifying a data spoofing strategy on one connected car can trick a traffic system into believing that an intersection is congested through vehicle-to-infrastructure (V2I) communication. V2I is

Comments Off on Study: Single Connected Car Can Trick Smart Traffic Lights Into Causing Intersection Clogging – Security News

Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test –

By | 2018-02-21T03:20:59+00:00 February 19th, 2018|Categories: Threat Intelligence|

One of the key use cases for our customers is the protection of their data center environments, which can involve moving off the perimeter into the data center or segmenting their data center from the rest of the organization. It is imperative that a data center security solution not only deliver high inspection

Comments Off on Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test –

New Mirai Attack Attempts Detected in South America and North African Countries

By | 2017-12-05T03:24:46+00:00 December 3rd, 2017|Categories: Threat Intelligence|

Just a few days ago, the notorious Internet of Things (IoT) botnet known as Mirai (detected by Trend Micro as ELF_MIRAI family) was detected as being active in a new campaign targeting Argentina, when red flags were raised after an increase in traffic on ports 2323 and 23. It appears that the campaign

Comments Off on New Mirai Attack Attempts Detected in South America and North African Countries

Vulnerability in Key Fob Can Let Hackers Open Subaru Cars – Security News

By | 2017-10-17T03:35:52+00:00 October 16th, 2017|Categories: Threat Intelligence|

Electronics designer Tom Wimmenhove recently uncovered a vulnerability in the key fob system that car manufacturer Subaru uses for several of its vehicles. When exploited successfully, it can enable hackers or thieves to clone the key fob to the access the vehicle.  Dubbed as the “fobrob” exploit, Wimmenhove noted that the flaw is

Comments Off on Vulnerability in Key Fob Can Let Hackers Open Subaru Cars – Security News