Trend Micro™ Managed XDR Analysis of Infection From Fake Installers and Cracks

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

Trend Micro Managed XDR Analysis of Infection From Fake Installers and Cracks

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Credit to Author: Trend Micro Research| Date: Fri, 17 Jan 2025 00:00:00 +0000

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

Read more

How Cracks and Installers Bring Malware to Your Device

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Credit to Author: Sarah Pearl Camiling| Date: Thu, 09 Jan 2025 00:00:00 +0000

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

Read more

Python-Based NodeStealer Version Targets Facebook Ads Manager

Credit to Author: Aira Marcelo| Date: Thu, 19 Dec 2024 00:00:00 +0000

In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram.

Read more

Gafgyt Malware Broadens Its Scope in Recent Attacks

Credit to Author: Sunil Bharti| Date: Tue, 03 Dec 2024 00:00:00 +0000

Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.

Read more

Gafgyt Malware Targeting Docker Remote API Servers

Credit to Author: Sunil Bharti| Date: Tue, 03 Dec 2024 00:00:00 +0000

Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.

Read more