Investigating BlackSuit Ransomware’s Similarities to Royal
Credit to Author: Katherine Casona| Date: Wed, 31 May 2023 00:00:00 +0000
In this blog entry, we analyze BlackSuit ransomware and how it compares to Royal Ransomware.
Read moreCredit to Author: Katherine Casona| Date: Wed, 31 May 2023 00:00:00 +0000
In this blog entry, we analyze BlackSuit ransomware and how it compares to Royal Ransomware.
Read moreCredit to Author: Feike Hacquebord| Date: Tue, 30 May 2023 00:00:00 +0000
Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu’s motives seem to have changed since at least October 2022.
Read moreCredit to Author: Joey Costoya| Date: Thu, 25 May 2023 00:00:00 +0000
This blog entry features three case studies that show how malicious actors evade the antispam, antibot, and antiabuse measures of online web services via residential proxies and CAPTCHA-breaking services.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 23 May 2023 00:00:00 +0000
Learn how connected car cyber risk will evolve in the coming years.
Read moreCredit to Author: Nitesh Surana| Date: Tue, 23 May 2023 00:00:00 +0000
In this entry, we detail our research findings on how an info stealer is able to achieve persistence on a victim’s machine by modifying the victim’s Discord client.
Read moreCredit to Author: Mahmoud Zohdy| Date: Mon, 22 May 2023 00:00:00 +0000
In this blog post, we will provide details on a BlackCat ransomware incident that occurred in February 2023, where we observed a new capability, mainly used for the defense evasion phase.
Read moreCredit to Author: Jaromir Horejsi| Date: Mon, 15 May 2023 00:00:00 +0000
Water Orthrus has been active recently with two new campaigns. CopperStealth uses a rootkit to install malware on infected systems, while CopperPhish steals credit card information. This blog will provide the structure of the campaign and how they work.
Read moreCredit to Author: Junestherry Dela Cruz| Date: Fri, 12 May 2023 00:00:00 +0000
We’ve been observing malicious advertisement campaigns in Google’s search engine with themes that are related to AI tools such as Midjourney and ChatGPT.
Read moreCredit to Author: Khristian Joseph Morales| Date: Tue, 09 May 2023 00:00:00 +0000
The Trend Micro Managed XDR team investigated several Ducktail-related web browser credential dumping incidents involving different customers.
Read moreCredit to Author: Khristian Joseph Morales| Date: Tue, 09 May 2023 00:00:00 +0000
The Trend Micro Managed XDR team investigated several Ducktail-related web browser credential dumping incidents involving different customers.
Read more