Critically Underrated: Studying the Data Distribution Service (DDS) Protocol


Researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

Read more

An Investigation of the BlackCat Ransomware via Trend Micro Vision One

Credit to Author: Lucas Silva| Date: Mon, 18 Apr 2022 00:00:00 +0000

We recently investigated a case related to the BlackCat ransomware group using the Trend Micro Vision One™ platform, which comes with extended detection and response (XDR) capabilities. BlackCat (aka AlphaVM or AlphaV) is a ransomware family created in the Rust programming language and operated under a ransomware-as-a-service (RaaS) model.

Read more

CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware

Credit to Author: Deep Patel| Date: Fri, 08 Apr 2022 00:00:00 +0000

We discovered active exploitation of a vulnerability in the Spring Framework designated as CVE-2022-22965 that allows malicious actors to download the Mirai botnet malware.

Read more

An In-Depth Look at ICS Vulnerabilities Part 3


In our series wrap-up, we look into CVEs that affect critical manufacturing based on MITRE’s matrix. We also explore common ICS-affecting vulnerabilities identified in 2021.

Read more

Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload

Credit to Author: Earle Maui Earnshaw| Date: Tue, 05 Apr 2022 00:00:00 +0000

Both BLISTER and SocGholish are loaders known for their evasion tactics. Our report details what these loaders are capable of and our investigation into a campaign that uses both to deliver the LockBit ransomware.

Read more

MacOS SUHelper Root Privilege Escalation Vulnerability: A Deep Dive Into CVE-2022-22639

Credit to Author: Mickey Jin| Date: Mon, 04 Apr 2022 00:00:00 +0000

We discovered a now-patched vulnerability in macOS SUHelper, designated as CVE-2022-22639. If exploited, the vulnerability could allow malicious actors to gain root privilege escalation.

Read more

An In-Depth Look at ICS Vulnerabilities Part 2


In part two of our three-part series, we continue to analyze vulnerabilities using MITRE ATT&CK. We also look into the sectors affected and their risk levels.

Read more

An In-Depth Look at ICS Vulnerabilities Part 1


In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS.

Read more

Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously

Credit to Author: Mayra Rosario Fuentes| Date: Tue, 29 Mar 2022 00:00:00 +0000

One of the recent trends we’ve observed is the rise of cloud-based cryptocurrency-mining groups that exploit cloud resources, specifically the CPU power of deployed cloud instances, to mine cryptocurrency.

Read more