Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
How Underground Groups Use Stolen Identities and Deepfakes
Social Media

How Underground Groups Use Stolen Identities and Deepfakes

The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.

September 27, 2022
Cyber Crime

Cyber Crime: INTERPOL Uses Trend Threat Intelligence

INTERPOL recently conducted operation African Surge to take down malicious infrastructure across the African continent and requested the help of private enterprises. Trend Micro is proud to have been asked to participate, and provided global threat intelligence that was utilised in this operation.

Expert Perspective Nov 25, 2022

Save to Folio

Expert Perspective Nov 25, 2022

Save to Folio

Ransomware

WannaRen Returns as Life Ransomware, Targets India

This blog entry looks at the characteristics of a new WannaRen ransomware variant, which we named Life ransomware after its encryption extension.

Research Nov 23, 2022

Save to Folio

Research Nov 23, 2022

Save to Folio

Targeted Attacks

Earth Preta Spear-Phishing Governments Worldwide

We break down the cyberespionage activities of advanced persistent threat (APT) group Earth Preta, observed in large-scale attack deployments that began in March. We also show the infection routines of the malware families they use to infect multiple sectors worldwide: TONEINS, TONESHELL, and PUBLOAD.

Research Nov 18, 2022

Save to Folio

Research Nov 18, 2022

Save to Folio

Cyber Crime

Electricity/Energy Cybersecurity: Trends & Survey Response

Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry's challenges and present Trend Micro's recommendations.

Research Nov 16, 2022

Save to Folio

Research Nov 16, 2022

Save to Folio

Malware

Pilfered Keys: Free App Infected by Malware Steals Keychain Data

Open-source applications are a practical way to save money while keeping up with your productivity. However, this can be abused by threat actors to steal your data. Find out how one app was used to gather information of Apple users.

Nov 16, 2022

Save to Folio

Nov 16, 2022

Save to Folio

Targeted Attacks

Hack the Real Box: APT41’s New Subgroup Earth Longzhi

We looked into the campaigns deployed by a new subgroup of advanced persistent threat (APT) group APT41, Earth Longzhi. This entry breaks down the technical details of the campaigns in full as presented at HITCON PEACE 2022 in August.

Nov 09, 2022

Save to Folio

Nov 09, 2022

Save to Folio