IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Credit to Author: Trend Micro Research| Date: Fri, 17 Jan 2025 00:00:00 +0000

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

Read more

How Cracks and Installers Bring Malware to Your Device

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Credit to Author: Sarah Pearl Camiling| Date: Thu, 09 Jan 2025 00:00:00 +0000

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

Read more

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Credit to Author: Bestin Koruthu| Date: Tue, 07 Jan 2025 00:00:00 +0000

Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data.

Read more

Python-Based NodeStealer Version Targets Facebook Ads Manager

Credit to Author: Aira Marcelo| Date: Thu, 19 Dec 2024 00:00:00 +0000

In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram.

Read more

Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks

Credit to Author: Feike Hacquebord| Date: Tue, 17 Dec 2024 00:00:00 +0000

APT group Earth Koshchei, suspected to be sponsored by the SVR, executed a large-scale rogue RDP campaign using spear-phishing emails, red team tools, and sophisticated anonymization techniques to target high-profile sectors.

Read more