Trend Micro

Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

The vulnerability was actively exploited by Russian cybercrime groups through spear-phishing campaigns, using homoglyph attacks to spoof document extensions and trick users and the Windows Operating System into executing malicious files.

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

The botnet comprises malware variants derived from Mirai and Bashlite and infects IoT devices by exploiting vulnerabilities and weak credentials. The primary devices used in the botnet were wireless routers and IP cameras from well-known brands.

Software Cracks and Installers Used to Bring Malware to Your Device

Threat actors often leverage reputable file hosting services like Mediafire and Mega.nz to conceal the origin of their malware and make detection and removal more difficult.

Python-Based NodeStealer Version Targets Facebook Ads Manager

This latest version of NodeStealer can not only harvests credit card details and browser-stored data, but also targets Facebook Ads Manager accounts for their critical financial and business information.

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion

The attacker impersonated a client, convincing the victim to download AnyDesk, thereby gaining remote access and deploying DarkGate through an AutoIt script. The malware enabled command execution, system discovery, and persistent access.

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

Earth Minotaur uses the MOONSHINE exploit kit to deliver the DarkNimbus backdoor to Android and Windows devices, targeting WeChat, and possibly making it a cross-platform threat.

Gafgyt Malware Broadens its Scope in Recent Attacks

Gafgyt primarily targets vulnerable IoT devices, but Trend Micro researchers recently observed this malware being used to attack Docker Remote API servers, signifying a notable shift in its behavior.

Return of ANEL Backdoor in the Recent Earth Kasha Spear-Phishing Campaign in 2024

The campaign’s primary intrusion vector involved carefully crafted spear-phishing emails. These messages, often sent from compromised or free email accounts, contained links to malicious OneDrive-hosted ZIP files.
November 25, 2024

Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions

Earth Estries, a Chinese APT group, has primarily targeted critical sectors like telecommunications and government entities across the US, Asia-Pacific, Middle East, and South Africa since 2023.

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

Water Barghest, which comprised over 20,000 IoT devices by October 2024, monetizes IoT devices by exploiting vulnerabilities and quickly enlisting them for sale on a residential proxy marketplace.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags