Research
- Trend Micro researchers looked into the way attackers use backdoors to command and control their target networks. So far, our researchers noted that attackers commonly take advantage of these eight backdoor techniques.Nearly 40 of the top 50 free apps in Google Play now have fake counterparts available for download on both official and third-party app stores. These fake apps should not be taken lightly since cyberciminals are now using them in their schemes.Adware are often regarded as low-risk threats, but adware companies can decide to discreetly load dangerous malware onto the computers on which their adware have been installed anytime. The spike in MEVADE/SEFNIT incidences shows how adware can pose great riskEstablished back in 2004, the Russian underground market was the first to offer crimeware to cybercriminals. Up to this day, it continues to thrive and evolve despite the evident drop in market prices.The most immediate security risk to businesses and customers lies in accepting payments through a PoS system. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.NBC News teamed up with Trend Micro for a honeypot experiment designed to check the security of consumer-grade gadgets in time for the 2014 Sochi Winter Olympics. The results show the need for tougher mobile security.Brazil is experiencing an influx of CPL malware, a malicious variant of .CPL, a legitimate Windows Control Panel file. Cybercriminals are currently repurposing .CPL files to spread banking Trojans targeting Brazilian users.Both threat actors and cybercriminals use the most advanced techniques to boost their attacks’ success rate, including hiding behind legitimate traffic. How can your local IT department catch them when they don’t rouse suspicion?