Skip to content

Research and Analysis

Sextortion goes mobile

An in-depth look at sextortion activities where cybercriminals use mobile devices and malware to cash in

Read more (PDF) »

< >

Open all

A year of destructive cyber attacks highlights the need for cyber-preparedness

The year 2014 was rife with mega breaches, hard-to-patch vulnerabilities, thriving cybercriminal underground economies, and a number of large-scale incidents. Faced with these growing threats, organizations need to plan ahead and be ready to take action instantly. Learn more from 2014 TrendLabs annual security roundup.

TrendLabs 3Q 2014 Security Roundup

Vulnerabilities Under Attack

Vulnerabilities in oft-overlooked but widely used software and devices surfaced in the third quarter of 2014, reiterating the importance of having security in mind. Shellshock and a Netis router vulnerability proved that attackers don't discriminate when it comes to targets. These are just two of the biggest threats that hit users in the past three months though. Find out what other threats reared their ugly heads.

The invisible becomes visible:

Trend Micro Security predictions for 2015 and beyond

As security vendors and law enforcement agencies close in on attackers, the more darknets, unreported but big vulnerabilities across platforms and devices, and the Deep Web will figure in the threat landscape.

TrendLabs 2Q 2014 Security Roundup

Turning the tables on cyber attacks

Recent events such as data breaches in the first half of 2014 strongly indicate that organizations need to start adopting a more strategic approach to protect digital information. This strategy includes protecting sensitive data such as intellectual property and trade secrets—often the crown jewels of any organization.

››› More threat reports

  1. TrendLabs 1Q 2014 Security Roundup
  2. TrendLabs 2013 Annual Security Roundup
  3. Trend Micro predictions for 2014 and beyond
  4. TrendLabs 3Q 2013 Security Roundup
  5. TrendLabs 2Q 2013 Security Roundup
  6. TrendLabs 1Q 2013 Security Roundup (PDF)
  7. 2012 Annual Security Roundup (PDF)
  8. 2012 Mobile Threat and Security Roundup: Repeating history (PDF)
  9. 3Q 2012 Security Roundup: Android under seige: Popularity comes at a price (PDF)
  10. 2Q 2012 Security Roundup: It's big business and it's getting personal (PDF)
  11. 1Q 2012 Security Roundup: Security in the Age of Mobility (PDF)
  12. A Look Back at 2011: Information is Currency (PDF)
  13. 3Q 2011 Threat Roundup (PDF)
  14. Virtualization and Cloud computing - A security best practice guide (PDF)
  15. Virtualization and Cloud Security - Security Threats to Evolving Data Centers (PDF)
  16. Security Focus Report – Spam Trends in Today’s Business World (PDF)
  17. 2Q 2011 Crimeware Report (PDF)
  18. 2Q 2011 Threat Roundup (PDF)
  19. 1Q 2011 Crimeware Report (PDF)
  20. TrendLabs Threat Trends 2010: The Year of the Toolkit (PDF)
  21. FAKEAV - The Growing Problem (PDF)
  22. Trend Micro TrendLabs Global Threat Trends 1H 2010 (PDF)
  23. The Business of Cybercrime: A Complex Business Model (PDF)

 

Open all

Sextortion in the Far East

Sextortion isn't new, but a new modus operandi that makes use of mobiles and malware is emerging in the Far East. Find out how they do it.

Read more (PDF)

Operation Woolen Goldfish:When Kittens Go Phishing

Cybersecurity researchers discover how the "Rocket Kitten" group created ran a state-sponsored campaign and hit different public and private Israeli and European organizations.

Read more (PDF)

Exploit Kits: Past, present, and future

Exploit kits are an ever-evolving threat. This research paper discusses what they are, how they work, and how they evolved over time.

Read more (PDF)

Defending Against PoS RAM Scrapers: Current and Next-Generation Technologies

This research paper reveals how PoS RAM scrapers infect systems to exfiltrate stolen data and how you can defend against them.

Learn more (PDF)

››› More research papers

  1. Operation Arid Viper: Bypassing the Iron Dome (PDF)
  2. The South Korean Fake Banking App Scam: The Yanbian Gang Sets Sights on South Koreans
  3. Backdoor use in targeted attacks (PDF)
  4. Finding Holes: Operation Emmental
  5. The Apollo Campaign (PDF)
  6. Suggestions to help companies with the fight against targeted attacks (PDF)
  7. Email correlation and phishing (PDF)
  8. Stealrat: An in-depth look at an emerging spambot (PDF)
  9. Targeted Attacks Detection with SPuNge (PDF)
  10. Windows 8 and Windows RT: New Beginnings (PDF)
  11. Safe: A Targeted Threat (PDF)
  12. Latin American and Caribbean Cybersecurity Trends and Government Responses (PDF)
  13. SCADA in the cloud: A security conundrum? (PDF)
  14. Africa: A new safe harbor for cybercriminals (PDF)
  15. Who's really attacking your ICS equipment (PDF)
  16. Asprox reborn (PDF)
  17. FAKEM RAT: Malware (PDF)
  18. The HeartBeat APT Campaign (PDF)
  19. The Crimeware Evolution (PDF)
  20. Spear-Phishing Email: Most Favored APT Attack Bait (PDF)
  21. Police Ransomware Update (PDF)
  22. Russian Underground 101 (PDF)
  23. Detecting APT Activity with Network Traffic Analysis (PDF)
  24. W32.Tinba (Tinybanker): "The Turkish Incident" (PDF)
  25. The Taidoor Campaign: An In-Depth Analysis (PDF)
  26. Adding Android and Mac OS X Malware to the APT Toolbox (PDF)
  27. Continuous Monitoring in a Virtual Environment (PDF)
  28. Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs—An In-Depth Analysis (PDF)
  29. Automating online banking fraud—automatic transfer system: The latest cybercrime toolkit feature (PDF)
  30. IXESHE: An APT campaign (PDF)
  31. Consumerization of IT - a Trend Micro Technical Brief (PDF)
  32. Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan (PDF)
  33. The "Police Trojan": An In-Depth Analysis (PDF)
  34. The Olympics Change Freeze: Don’t Leave Your Critical Systems Out in the Cold (PDF)
  35. Traffic Direction Systems as Malware Distribution Tools (PDF)
  36. Toward a More Secure Posture for Industrial Control System Networks (PDF)
  37. More traffic, more money: KOOBFACE draws more blood (PDF)
  38. A Look at HTML5 Attack Scenarios (PDF)
  39. Trends in Targeted Attacks (PDF)
  40. Discerning Relationships: The Mexican Botnet Connection (PDF)
  41. Lessons Learned While Sinkholing Botnets - Not as Easy as It Looks! (PDF)
  42. From Russia to Hollywood: Turning the Tables on a SpyEye Cybercrime Ring (PDF)
  43. Dissecting the LURID APT - Campaign, Attacks, Tactics and Victims (PDF)
  44. Targeting the Source: FAKEAV Affiliate Networks (PDF)
  45. Sinkholing Botnets (PDF)
  46. The Dark Side of Trusting Web Searches - From Blackhat SEO to System Infection (PDF)
  47. The Botnet Chronicles – A Journey to Infamy (PDF)
  48. How Blackhat SEO Became Big (PDF)
  49. File-Patching ZBOT Variants - ZeuS 2.0 Levels Up (PDF)
  50. Dissecting the XWM Trojan Kit (PDF)
  51. Understanding WMI Malware (PDF)
  52. Web 2.0 Botnet Evolution - KOOBFACE Revisited (PDF)
  53. ZeuS - A Persistent Criminal Enterprise (PDF)
  54. Unmasking FAKEAV (PDF)
  55. Show Me the Money!: The Monetization of KOOBFACE (PDF)
  56. The Heart of KOOBFACE: C&C and Social Network Propagation (PDF)
  57. The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained (PDF)
  58. A Cybercrime Hub in Estonia (PDF)

 

Open all

Malicious network communications

What are you overlooking?

APT campaigns aggressively pursue and compromise specific targets to gain control of a company’s computer system for a prolonged period of time. To make a targeted attack successful, the communication channel between a threat actor and the malware inside a network must always remain open and unknown. Know how leveraging threat intelligence can help detect this malicious network traffic by reading this primer.

Read Malicious Network Communications: What Are You Overlooking (PDF)

5 predictions for 2013 and beyond

What should SMBs look out for?

As 2012 drew to a close, SMBs, along with most organizations, should have taken a step back and learned from the past year. With mobile devices fast becoming part of workplaces and the increased availability of cloud services, SMBs should adopt security practices to fully protect their assets. This year, the Android malware volume is expected to hit the 1 million mark. The continuous use of cloud services will also play a key part in the SMB threat environment. This primer runs through five predictions SMBs should take note of.

Read our 5 predictions for SMBs (PDF)

Security threats to business, the digital lifestyle, and the cloud

Trend Micro predictions for 2013 and beyond

In 2013, managing the security of devices, small business systems, and large enterprise networks will be more complex than ever before. Users are breaking down the PC monoculture by embracing a wider variety of platforms, each with its own user interface, OS, and security model. Businesses, meanwhile, are grappling with protecting intellectual property and business information as they tackle consumerization, virtualization, and cloud platforms head-on. This divergence in computing experience will further expand opportunities for cybercriminals and other threat actors to gain profit, steal information, and sabotage their targets’ operations.

Read our 2013 predictions (PDF)

Eco and ego apps in Japan

Users face various unwanted app routines in the current mobile landscape. Given this situation, market owners have taken certain measures like providing safety guidelines, conducting prerelease quality assurance checks, and introducing access permission layers at the OS level. Unfortunately, these are still far from being fool-proof solutions. The reality is: Users are responsible for checking if the apps they download are legitimate or not.

Read Eco and Ego Apps in Japan (PDF)

››› More spotlight articles

  1. The knight fork: defining defense in 2013 (PDF)
  2. Peter the Great vs Sun Tzu (PDF)
  3. How to Thwart the Digital Insider – An Advanced Persistent Response to Targeted Attacks (PDF)
  4. How tough is it to deal with APTs? (PDF)
  5. 12 Security Predictions for 2012 (PDF)
  6. Malicious Redirection: A Look at DNS Changers (PDF)
  7. The Perils that Malvertisements Pose (PDF)
  8. Cashing in on Cybercrime: New Malware Target Bitcoin (PDF)
  9. Online Surveys and Their Irresistible Lures: Why Social Media Users Fall for Scams (PDF)
  10. Android Malware Acts as an SMS Relay: Just the Tip of the Iceberg for AnAndroid Malware Acts as an SMS Relay: Just the Tip of the Iceberg for Android Malwaredroid Malware (PDF)
  11. From Application Guises to FAKEAV: The Evolution of Mac Malware (PDF)
  12. Mobile Landscape: Security Risks and Opportunities (PDF)
  13. Threats to Watch out for During the Tax Season (PDF)
  14. Celebrity News - Roll out the Red Carpet for Cybercrime (PDF)
  15. Cybercriminals Spread Love via Online Threats (PDF)
  16. Top Tips for Safer and More Secure Online Experiences in 2011 (PDF)
  17. 2010 Threats: The Good, the Bad, and the Ugly (PDF)
  18. Trend Micro 2011 Threat Predictions (PDF)
  19. Tis the Season to be Wary (PDF)
  20. Security Dangers of Using Open Wi-Fi Networks (PDF)
  21. From the Virtual Works to Real-World Threats (PDF)
  22. Slipping through the Cracks of Web Services to Serve Malware (PDF)
  23. Mobile Phones Emerge as Security Threat Targets (PDF)
  24. Why FAKEAV Persist (PDF)
  25. XSS Attack Hits Youtube (PDF)
  26. Avoiding the Whack-a-Mole Anti-Phishing Strategy (PDF)
  27. Security Threats Loom over Online Banking (PDF)
  28. Emerging Malware Business Platforms (PDF)
  29. Popularity Ushers in New Security Threats (PDF)
  30. Issues and Threats that Facebook Users Face (PDF)
  31. The Evolution of Botnets (PDF)
  32. Building Businesses and Potential Threats with Online Social Networks (PDF)
  33. DOWNAD/Conficker: The Case of the Missing Malware (PDF)

Social Media

Connect with us on