Web Attacks
Cybercriminals employ various methods for stealing information, with social engineering and malware infection being the most common. We see especially successful ones in the form of survey scams on so...
At the tail end of 2012, Trend Micro researchers received two malware samples that stole personal information in ways never seen before. TSPY_PASSTEAL.
The VOBFUS family of worms is known for their download and propagation routines, which allowed them to gain prominence, as can be seen in the family’s increasing number of variants over time. These wo...
File infectors have recently seen a resurgence in the threat landscape. Prominent examples of file infectors are MUSTAN and QUERVAR.
The most notorious file infectors of 2012—SALITY, XPAJ, MUSTAN, and QUERVAR—have different routines that make removal and containment a challenge. While their main routine—infecting files is by and la...
Some threats are more persistent than others. They are usually developed, modified, or simply coursed through a different vector in order to remain relevant in the threat landscape.
Microsoft has recently released MS12-063 to address vulnerabilities that affect all versions of Internet Explorer, namely versions 6, 7, 8, and 9. The following article is an in-depth look into the ze...
PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized in the same way as Poison Ivy, a RAT involved in a campaig...
In the past, cybercriminals have crafted malicious files that exhibit explicit behavior such as in the case of FAKEAV, ransomware, and adware which display noticeable message prompts and pop-ups. Howe...