Research

  • Chinese Cybercrime Underground Sells More than Online Gaming AccountsThe Chinese market economy is undoubtedly booming. These days, however, China does not only rank highly for economic performance; it also continues to grow as a major player in the underground market for cybercrime products and services.
    Read more
  • http://about-threats.trendmicro.com/resources/images/apt/safe.jpgWhether considered advanced persistent threats (APTs) or malware-based espionage attacks, successful and long-term compromises of high-value organizations and enterprises worldwide by a consistent set of campaigns cannot be ignored.
    Read more
  • Network Traffic Analysis Can Stop Targeted AttacksOnce inside a network, targeted attacks can use it as a highway to further a campaign. By using network traffic, coupled with threat intelligence, enterprise response teams can monitor and stop attacks before their respective attackers get away with their goal
    Read more
  • RAT Hides as Windows® and Yahoo!® MessengerRATs or remote access Trojans—like the prominent Gh0st, PoisonIvy, and DRAT—have made it easier for attackers to stay hidden within a target network. A RAT's ability to disguise their network traffic as messaging app traffic makes it especially elusive.
    Read more
  • Spear-Phishing Is the Favored Targeted Attack Bait Though phishing threats are typical on the Internet, the danger of spear-phishing attacks shouldn’t be downplayed. Sixty-five government entities have been exposed to spear-phishing—still the favored attack method because of its continued success in tricking
    Read more
  • Defining Defense in 2013Targeted attack incidents from previous years prove that targeted campaigns don't always use the same attack methods. Diversifying defense measures such as log inspection, virtual patching, and the like can help minimize the risks they may face in 2013.
    Read more
  • Taidoor Campaign Targets Government Agencies in TaiwanThe Taidoor campaign primarily targeted government organizations located in Taiwan. Trend Micro Research was able to develop indicators of compromise useful in determining if an attack is underway in an enterprise.
    Read more
  • Better Targeted Attack Response Requires Mindset ChangeTrend Micro cyber security vice president Tom Kellerman says organizations must change the way they think about security when dealing with targeted attacks. Their IT teams must always assume compromise and build their company’s strategies from there.
    Read more
  • Android, Mac OS X Malware Join Other Targeted Attack ToolsAttackers have upped the ante by adding Android and Mac OS X to their targeted attack arsenal. Android malware, already a cybercriminal favorite, allows attackers to hop on the BYOD wagon, while Mac OS X malware broadens their scope of potential victims.
    Read more
  • IXESHE Campaign Actors Zero in on East Asian Governments and IndustriesThe IXESHE attackers are notable for their use of compromised machines within a target’s internal network as C&C servers. While the malware used in the attacks were not very complicated by nature, these proved very effective. This campaign remains an activ
    Read more

Connect with us on