Articles about Trend Micro

Trend Micro buys Taiwanese deep packet sniffing firm

Global security firm Trend Micro, which has announced a deal to buy smaller network security firm Broadweb. Financial terms of the deal, announced Thursday, were not disclosed. Broadweb's deep packet inspection technology will be dovetailed into Trend's existing lines of network security kit to improve the blocking of malicious …
John Leyden, 11 Oct 2013

Trend Micro turns RAT catcher as Taiwan cops cuff hacker

Security vendor Trend Micro has embiggened its industry collaboration credentials this week after helping Taiwanese police arrest one man in connection with a widespread targeted attack, and teaming up with Interpol on a new cyber crime prevention centre. The targeted attack in question used the notorious Ghost remote access …
Phil Muncaster, 25 Jun 2013

You dirty RAT: Trend Micro spots new Asia-wide attack

Security researchers are warning of yet another advanced, large-scale attack campaign using sophisticated techniques to hide itself from its targets – organisations across Asia. Trend Micro has dubbed the campaign Naikon, based on the HTTP user-agent string “NOKIAN95/WEB” found in various targeted attacks across the region in …
Phil Muncaster, 14 Jun 2013
The Register breaking news

Trend Micro squishes 'stuck in a loop' SafeSync bug

Trend Micro has issued software patches for its SafeSync product after some users complained that the software was not syncing files between two or more devices properly. Posts of complaints on a user forum, and a tip from a Reg reader, suggested the software's synchronisation of files between devices was not functioning and …
John Leyden, 13 Nov 2012
The Register breaking news

New trend: Trojan which steals your pics instead of your text

Miscreants have developed a strain of malware that steals image files from compromised systems. The Pixsteal-A Trojan dispenses with the conventional tactic of only stealing text files, instead concentrating on uploading .jpg, .jpeg, and .dmp (memory dump) files from infected machines onto a remote FTP server. The switch in …
John Leyden, 06 Nov 2012
The Register breaking news

Android malware under blog control says Trend Micro

Trend Micro is reporting a Chinese Android malware that operates partly under the command and control of a blog. The ANDROIDOS_ANSERVERBOT.A malware is disguised as an e-book reader offered on a third-party Chinese app store. It uses two command and control servers, one of them served out of a blog with encrypted posts. Posts to …
arrow pointing up

Trend Micro buys encryption firm

Trend Micro has agreed to buy encryption specialist Mobile Armor. Financial terms of the deal, announced on Tuesday, were not disclosed. St Louis, Missouri-based Mobile Armor markets data-protection software that offers full-disk, file/folder, and removable media encryption for endpoints (laptops, tablet PCs, and smartphones). …
John Leyden, 30 Nov 2010
Facebook privacy image

Facebook cosies up to ESET for malware detection

Facebook, which earlier this year started partnering with F-Secure and Trend Micro for malware detection, has added Slovak vendor ESET to its suite of security products. The previous tie-ups, detailed here, are worth noting to put the new partnership in context. F-Secure and Trend both pointed Facebook users at their free online …

Lads from Lagos using 'Predator Pain' on hapless 419 victims

Advanced-fee fraudsters are adopting the tactics of state-sponsored hackers in attacks targeting small- to medium-sized businesses, rather than large corporates, according to research from Trend Micro. 419 gangs are using the Predator Pain and Limitless keyloggers to steal network credentials through spear-phishing attacks, …
John Leyden, 13 Nov 2014

A life of cybercrime, a caipirinha and a tan: Fraudsters love a Brazilian

Brazil is the only market that offers training services for cybercriminal wannabes, making it possible to start a new career in cybercrime for just $500. Training modules, hands-on exercises, interactive guides, instructional videos, as well as post-training support are available, according to a new report of the Brazilian …
John Leyden, 20 Nov 2014

'Ruskie' malware pwns iOS 7

Attackers, perhaps of Russian origin are infecting the iPhones linked to government, defence and media sectors with dangerous spy malware capable of breaching non-jailbroken devices, researchers say. The XAgent malware part of attacks unveiled last year against Windows devices has moved to iOS targeting iOS 7 and to much lesser …
Darren Pauli, 05 Feb 2015

Israeli gov & boffins targeted by pr0ntastic malware from Gaza

Hackers from Gaza and Egypt appear to have teamed up in order to attack Israeli government, research, infrastructure and military networks. Security researchers at Trend Micro have traced ongoing malware-based attacks against Israeli organisations back to Gaza. Trend have uncovered two separate, but interconnected campaigns. …
John Leyden, 16 Feb 2015

Crooks are using proxy servers to build more convincing phishing sites – new claim

Crooks using phishing pages to grab victims' passwords have apparently upped their game – by using proxy servers rather than static pages to craft legit-looking websites. Normally, thieves recreate a web page – such as a login page for an online shop or webmail – and stick it on a compromised server, then direct marks towards …
John Leyden, 07 Nov 2014
management regulation1

Symantec to cough up $17m after bloody dust-up with patent troll

Symantec must pay out $17m after losing a patent infringement battle to IP-hoarding house Intellectual Ventures. A jury in Delaware found in favor of Intellectual Ventures on two of three infringement claims, awarding the biz $8m in damages for one claim and $9m for the other. Symantec was found to have infringed on two patents …
Shaun Nichols, 10 Feb 2015
<coat/> <door> <door/> shirt at Cash'n'Carrion

Securobods warn of wide open backdoor in Netis/Netcore routers

Update Routers sold under the brand Netis by Chinese security vendor Netcore have a hardcoded password that leaves users with a wide-open backdoor that could easily be exploited by attackers, claim researchers. The backdoor allows cyber-criminals to easily change settings or run arbitrary code on routers, securobods at Trend Micro warn …
John Leyden, 27 Aug 2014

Not sure what RFID is? Can't hack? You can STILL be a card fraudster with this Android app

Cybercrooks have developed an Android app that makes it possible to hack RFID payment cards, researchers discovered after a Chilean transport system was defrauded. The app at the centre of the scam hacked into the user’s radio frequency ID (RFID) bus transit card in order to recharge credits. The fraud-enabling Android tool, …
John Leyden, 03 Dec 2014

Robin Hood virus: Chinese hackers target nation's wealthy

It seems China's state-supported hackers are being overshadowed by the black hat scene as the latter appears to have doubled in size – with some brazen crackers turning to carding the nation's wealthiest. A Trend Micro report dubbed The Chinese Underground in 2013 [PDF] issued this week reveals the black hat hacking scene has …
Darren Pauli, 05 Sep 2014
Petrol behind bars in Willowra

Anonymous HACKED GAS STATIONS - and could cause FUEL SHORTAGES

Hackers – possibly affiliated with Anonymous – have already attacked at least one internet-connected gas (petrol) station pump monitoring system. Evidence of malfeasance, uncovered by Trend Micro, comes three weeks after research about automated tank gauge vulnerabilities from Rapid7, the firm behind Metasploit. Automated tank …
John Leyden, 11 Feb 2015
Adobe Flash installer

Trouble comes in threes: Yet ANOTHER Flash 0-day vuln patch looming

Adobe plans to patch Flash yet again after yet another zero-day vulnerability in the web video software leaves PCs prone to hijacking. The PSA15-02 security advisory details a security hole that hackers are already exploiting to compromise vulnerable systems. An upcoming update to squash the critical bug makes it three patches …
John Leyden, 02 Feb 2015
Pwned

Sony Pictures MEGAHACK: Securobods pull out probes, analyse badness

Security experts have been able to obtain and analyse samples of the malware linked to the Sony Pictures breach. An FBI advisory issued on Monday, leaked to Reuters, warned US businesses to be vigilant about a new strain of “destructive” malware. The link between the Sony breach and the malware described by the FBI is yet to be …
John Leyden, 04 Dec 2014
The Register breaking news

Trend Micro lays down bread for humyo cloud service

Trend Micro has bought UK-based consumer and micro business cloud storage service provider humyo, with the target's file synchronisation technology apparently the cherry on the cake. This technology syncs files between a users' connected devices and humyo's cloud vault, meaning the humyo cloud is like Dropbox with added …
Chris Mellor, 14 Jun 2010

Another day, another nasty Android vuln

The security researcher who last year sucked thousands of IDs out of Apple's Developer Centre site has turned his gaze onto Android and turned up a bug that Trend Micro says is exploitable. According to Ibrahim Balic, the bug causes memory corruption on Android 4.2.2 , 4.3 and 2.3 at least, but he suspects all Android versions …

Attackers planting banking Trojans in industrial systems

Trend Micro researcher Kyle Wilhoit says the latest attacks on SCADA and industrial control networks are turning out to carry rather pedestrian banking Trojans, and have been on the rise since October 2014. Talking to DarkReading, Wilhoit said rather than Stuxnet-style attacks, ne'er-do-wells are dropping banking Trojans into …
Malware

Attackers raid SWISS BANKS with DNS and malware bombs

Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system settings, researchers have warned. The attacks sported a clever implementation of malware that pointed victim machines to replica phishing bank sites when they attempt to …
Darren Pauli, 23 Jul 2014

AT LAST: Australia gets its very own malware

Australians are being targeted by a new variant of the Carberp malware under what appears to be renewed criminal interest in the antipodes. The modified trojan, Carberp.C, was spread through a spam operation masquerading as a payment invoice. Virus writers pushed the malware out a day after coding it, Symantec researcher …
Darren Pauli, 19 Jan 2015
Flash Gordon

Attackers sling recent Flash 0day through 1800 domains

Some 1800 subdomains have been found slinging the Angler exploit kit using Adobe's most recent Flash zero day exploit, Cisco researcher Nick Biasini says. The lion's share of nasty subdomains were set up on 28 and 29 January and tied to about 50 GoDaddy registrant accounts. Biasini said the malvertising attacks used several …
Darren Pauli, 04 Feb 2015
 Dummy hand grenades are used by the Marines from the 3rd Low Altitude Air Defense Battalion, for practice before throwing the M-67 Fragment Grenades at the firing range.jpg

Dropbox used as command and control for Taiwan time bomb

A remote access trojan (RAT) is using Dropbox for command and control in a targeted attack against the Taiwanese Government, malware analyst Maersk Menrige says. The upgraded PlugX RAT is the first targeted attack to use Dropbox to update command and control settings, Menrige said, as distinct from other malware and ransomware …
Darren Pauli, 30 Jun 2014

Hackers pop German steel mill, wreck furnace

Talented hackers have caused "serious damage" after breaching a German steel mill and wrecking one of its blast furnaces. The hack of the unnamed mill, detailed in the annual report of the German Federal Office of Information Security, was pulled off after a victim fell for a phishing email. Hackers then pivoted to the …
Darren Pauli, 22 Dec 2014
The Register breaking news

Trend Micro to eyeball malware from cloud

Trend Micro has unveiled a major update to its flagship scanning tools that puts your virus signature database online, plus a modular security and system management suite with partner BigFix. Trend Micro's updated OfficeScan Client/Server Suite includes an interesting change to the way its flagship scanning software keeps its …
Austin Modine, 13 Apr 2009
Windows Vista teaser

Trend Micro boosts Vista package, extends Hotmail deal

Security provider Trend Micro yesterday announced a brace of Microsoft-based strategies, rolling out improvements for its combo offering on Vista and proclaiming that it will handle antivirus for Hotmail/Live webmail services for a further year. Users running Trend Micro Internet Security on Vista platforms get two enhancements …
Lewis Page, 26 Jun 2007

VXers Shellshocking embedded BusyBox boxen

Malware writers have crafted new wares to attack embedded devices running BusyBox and not yet patched against the ShellShock vulnerability, researcher Rhena Inocencio says. Miscreants' tool of choice for such attacks is malware called "Bashlite" that, once executed on a victim machine, probes for devices such as routers and …
Darren Pauli, 17 Nov 2014

Not your father's spam: Trojan slingers attach badness to attachment WITHIN attachment

Cybercrooks are upping the ante by loading malware as an attachment inside another attachment in a bid to slip past security defences. A new variant of the Upatre Trojan comes bundled in spammed messages that imitate emails from known banks such as Lloyds Bank and Wells Fargo. The .MSG file of the malicious emails contains …
John Leyden, 08 Apr 2014

Trend Micro buys leak prevention firm

Trend Micro has acquired data leak prevention firm Provilla, in an agreement that expands its business beyond its core antivirus and content security markets. Financial terms are undisclosed. Data leaks potentially expose firms to security, intellectual property, financial, privacy and compliance threats. Provilla's technology …
John Leyden, 25 Oct 2007

Like WhatsApp? Meet 'desktop' version... and his BANK ACCOUNT RAIDING Trojan pal

Scammers have slung together a scam designed to trick users into running malware disguised as a "desktop version" of the ultra-popular WhatsApp mobile messaging app. Links promoted through a run of spam emails that began appearing last week actually lead to a banking Trojan rather than a PC version of the mobile-only app, Trend …
John Leyden, 26 Feb 2014

Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't

A dispute has arisen about the seriousness of a vulnerability in Linux, dubbed "Grinch", that supposedly creates a privilege escalation risk. The flaw resides in the Linux authorisation system, which can unintentionally allow privilege escalation, granting a user “root", or full administrative, access. “With full root access, …
John Leyden, 19 Dec 2014

Still using Adobe Flash? Oh well, get updating: 15 hijack flaws patched

People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software. If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux …
Shaun Nichols, 05 Feb 2015
channel

Trend Micro snaps up UK-based email crypto firm

Trend Micro, the security firm best known for its PC-cillin anti-virus software, has acquired UK-based email encryption firm Identum. Terms of the deal, announced Monday, were undisclosed. Identum's email encryption technology will be rolled into Trend's existing portfolio of content and web-security products under the Trend …
John Leyden, 25 Feb 2008
fingers pointing at man

Trend Micro CEO in SEC probe

The Securities and Exchange Commission (SEC) is considering enforcement action against the chief executive of Trend Micro, Eva Chen, involving her husband Daniel Chiang and the trading of stock in SINA Corporation, the Chinese online media and wireless services firm. Chiang is former co-chairman of SINA Corporation. SEC …
John Leyden, 05 Jul 2006

Hackers prowl for Trend Micro vuln

Hackers have begun actively scanning for recently announced vulnerabilities in Trend Micro's ServerProtect product. Security watchers at the Internet Storm Centre (ISC) have noted a huge upsurge of traffic on TCP port 5168, associated with security bugs in ServerProtect (an enterprise software product designed to protect …
John Leyden, 23 Aug 2007

China's mobile underground revealed in new report

China plays host to a vast and highly sophisticated “mobile underground” where cyber criminals can buy the tools to launch attacks for as little as 100 yuan (£9.70), according to a new report from security vendor Trend Micro. The Mobile Cybercriminal Underground Market in China is the firm's follow up to two separate reports on …
Phil Muncaster, 04 Mar 2014
Executioner

Enough is ENOUGH: It's time to flush Flash back to where it came from – Hell

+Comment If you patched Adobe's screen door of the internet – its Flash plugin – last week, and thought you were safe, even for a few weeks, you were sadly mistaken. The Photoshop goliath is warning that yet another programming blunder in its code is being exploited in the wild, and says it won't have a patch ready to deploy until later …
Iain Thomson, 02 Feb 2015

Flappy Bird's ANIMATED CORPSE may spread malware PLAGUE

Cybercrooks have been quick to latch onto the hype about Flappy Bird's demise by laying a variety of malware-based traps. Counterfeit Flappy Bird Android apps packing malware have been spotted all over the web, with sightings by both Trend Micro and Sophos, among others. Trend warns that counterfeit copies of the mobile game …
John Leyden, 12 Feb 2014
chart

Trend Micro sees resellers grow

Since launching its "Worry Free" bundle of services in late 2005, Trend Micro has seen improved interest from the channel - it has signed up 50 per cent more resellers since launch. The package is aimed at smaller businesses. It provides a bundled package and simple maintenance. It will protect servers, clients and messaging …
John Oates, 12 Jun 2006

Kaspersky exposes SONY-CRIPPLING malware DETAILS

Kaspersky bod Kurt Baumgartner has released more details on the Sony-plundering malware and links it to attacks on Saudi Aramco and South Korea. Research conducted in the wake of the epic Sony breach last month had connected those behind the attack known as the Guardians of Peace (GOP) with the 2012 hacking of Saudi Aramco by ' …
Darren Pauli, 08 Dec 2014
Autodesk's AutoCAD

Rare AutoCAD malware rigs drafting machines for follow-up attacks

Security researchers have discovered a rare strain of AutoCAD malware that opens up compromised machines to secondary exploits. ACM/SHENZ-A poses as a legitimate component of AutoCAD software for computer-aided design (CAD). But analysis by security researchers at Trend Micro has revealed that the malicious file opens up systems …
John Leyden, 25 Nov 2013
Social media buttons

Attack flogged through shiny-clicky social media buttons

Web admins beware: social media buttons that load scripts from unknown external sites could see your sites foisting the FlashPack exploit kit to visitors. Several sources warn that popular JavaScript social media panels are being modified to load external resources that pulled down FlashPack, formerly known as SafePack, which …
Darren Pauli, 26 Aug 2014

Something smells PHISHY: It's the celeb nudie iCloud PERV trap...

Consumers are being warned to be on their guard against phishers' fake Apple emails and texts designed to exploit the publicity about this week's nude celeb picture flap. In addition to scam emails designed to trick gullible recipients into logging into phishing sites, Symantec warns of a likely upsurge in fraudulent text …
John Leyden, 04 Sep 2014

Ultimate hardware hack: Home Depot nailed by vice merchants

Do-it-yourself kingpin Home Depot has confirmed a report it was breached indicating the compromise occurred in April this year. The US retail chain was working with law enforcement over compromise of payment terminals across stores in the country. Chief executive of the hacked firm Frank Blake admitted the breach in a terse …
Darren Pauli, 09 Sep 2014

Shellshock: 'Larger scale attack' on its way, warn securo-bods

The Shellshock vulnerability has already become the focus for malicious scanning and at least one botnet but crooks are still testing the waters with the vulnerability and much worse could follow, security watchers warn. Net security firm FireEye said it has seen all manner of overtly malicious traffic leveraging the Bash bug, …
John Leyden, 29 Sep 2014
The Register breaking news

Trend taps Third Brigade for security and compliance tech

Internet security firm Trend Micro has acquired security and compliance firm Third Brigade. Terms of the deal, announced Wednesday and expected to close in the second quarter of 2009, were undisclosed. Trend said the agreement to buy the privately-held firm would accelerate its dynamic datacenter security strategy. Third …
John Leyden, 29 Apr 2009