Articles about Trend Micro

Trend Micro buys Taiwanese deep packet sniffing firm

Global security firm Trend Micro, which has announced a deal to buy smaller network security firm Broadweb. Financial terms of the deal, announced Thursday, were not disclosed. Broadweb's deep packet inspection technology will be dovetailed into Trend's existing lines of network security kit to improve the blocking of malicious …
John Leyden, 11 Oct 2013

Trend Micro turns RAT catcher as Taiwan cops cuff hacker

Security vendor Trend Micro has embiggened its industry collaboration credentials this week after helping Taiwanese police arrest one man in connection with a widespread targeted attack, and teaming up with Interpol on a new cyber crime prevention centre. The targeted attack in question used the notorious Ghost remote access …
Phil Muncaster, 25 Jun 2013

You dirty RAT: Trend Micro spots new Asia-wide attack

Security researchers are warning of yet another advanced, large-scale attack campaign using sophisticated techniques to hide itself from its targets – organisations across Asia. Trend Micro has dubbed the campaign Naikon, based on the HTTP user-agent string “NOKIAN95/WEB” found in various targeted attacks across the region in …
Phil Muncaster, 14 Jun 2013
The Register breaking news

Trend Micro squishes 'stuck in a loop' SafeSync bug

Trend Micro has issued software patches for its SafeSync product after some users complained that the software was not syncing files between two or more devices properly. Posts of complaints on a user forum, and a tip from a Reg reader, suggested the software's synchronisation of files between devices was not functioning and …
John Leyden, 13 Nov 2012
The Register breaking news

New trend: Trojan which steals your pics instead of your text

Miscreants have developed a strain of malware that steals image files from compromised systems. The Pixsteal-A Trojan dispenses with the conventional tactic of only stealing text files, instead concentrating on uploading .jpg, .jpeg, and .dmp (memory dump) files from infected machines onto a remote FTP server. The switch in …
John Leyden, 06 Nov 2012
Close-up of the flu virus (artist's impression) - Shutterstock

US judge lobs antivirus patents back to Hell

A US district court has torn the heart out of two patents wielded by Intellectual Ventures against two antivirus makers. In a judgment [PDF] this week, Chief Judge Leonard Stark ruled that Intellectual Ventures' US patents 6,460,050 and 6,073,142 were "ineligible," meaning they are too vague and the technologies they described …
Shaun Nichols, 24 Apr 2015
arrow pointing up

Trend Micro buys encryption firm

Trend Micro has agreed to buy encryption specialist Mobile Armor. Financial terms of the deal, announced on Tuesday, were not disclosed. St Louis, Missouri-based Mobile Armor markets data-protection software that offers full-disk, file/folder, and removable media encryption for endpoints (laptops, tablet PCs, and smartphones). …
John Leyden, 30 Nov 2010
The Register breaking news

Android malware under blog control says Trend Micro

Trend Micro is reporting a Chinese Android malware that operates partly under the command and control of a blog. The ANDROIDOS_ANSERVERBOT.A malware is disguised as an e-book reader offered on a third-party Chinese app store. It uses two command and control servers, one of them served out of a blog with encrypted posts. Posts to …

Rocket Kittens target defence and IT bods from Europe & Israel

A seemingly state-sponsored hacking crew has compromised systems in several organisations in Israel and Europe, according to new research by Trend Micro. The so-called Rocket Kitten group has targeted defence and IT industries, government entities and academic institutions. Victims include civilian and academic organisations in …
John Leyden, 20 Mar 2015
Facebook privacy image

Facebook cosies up to ESET for malware detection

Facebook, which earlier this year started partnering with F-Secure and Trend Micro for malware detection, has added Slovak vendor ESET to its suite of security products. The previous tie-ups, detailed here, are worth noting to put the new partnership in context. F-Secure and Trend both pointed Facebook users at their free online …
De Vaartkapoen. Pic: Bianca Bueno

Security software's a booming market. Why is Symantec stumbling?

Worldwide security software revenue totalled $21.4bn in 2014, a 5.3 per cent increase from 2013's revenue of $20.3bn, according to the serious bean counters at Gartner. A decline in consumer security software and endpoint protection — areas that together account for 39 per cent of the market — was more than offset the strong …
John Leyden, 27 May 2015

Lads from Lagos using 'Predator Pain' on hapless 419 victims

Advanced-fee fraudsters are adopting the tactics of state-sponsored hackers in attacks targeting small- to medium-sized businesses, rather than large corporates, according to research from Trend Micro. 419 gangs are using the Predator Pain and Limitless keyloggers to steal network credentials through spear-phishing attacks, …
John Leyden, 13 Nov 2014

A life of cybercrime, a caipirinha and a tan: Fraudsters love a Brazilian

Brazil is the only market that offers training services for cybercriminal wannabes, making it possible to start a new career in cybercrime for just $500. Training modules, hands-on exercises, interactive guides, instructional videos, as well as post-training support are available, according to a new report of the Brazilian …
John Leyden, 20 Nov 2014

'Ruskie' malware pwns iOS 7

Attackers, perhaps of Russian origin are infecting the iPhones linked to government, defence and media sectors with dangerous spy malware capable of breaching non-jailbroken devices, researchers say. The XAgent malware part of attacks unveiled last year against Windows devices has moved to iOS targeting iOS 7 and to much lesser …
Darren Pauli, 05 Feb 2015

Israeli gov & boffins targeted by pr0ntastic malware from Gaza

Hackers from Gaza and Egypt appear to have teamed up in order to attack Israeli government, research, infrastructure and military networks. Security researchers at Trend Micro have traced ongoing malware-based attacks against Israeli organisations back to Gaza. Trend have uncovered two separate, but interconnected campaigns. …
John Leyden, 16 Feb 2015

Backdoor bot brains snatched after cops, white hats raid servers

Microsoft and Interpol have teamed up to derail a malware infection that compromised more than 770,000 Windows PCs worldwide. Simda is a “pay-per-install” software nasty: fraudsters pay miscreants some sum of money for every 1,000 or so machines they compromise. The hackers effectively earn cash by selling access to the infected …
John Leyden, 13 Apr 2015
Panic button

Windows Server 2003 end of support draws ever closer

Regcast Sign up RIGHT NOW to watch The Register’s how-to Regcast on coping with Windows Server 2003 End of Service (EoS). Watch this live, on June 12 at 11:00 BST - if you can't make it, just sign up and we will email you when the recording is available. Handy synopsis for you Flash forward to a time when we rest contentedly in the …
David Gordon, 22 May 2015

Crooks are using proxy servers to build more convincing phishing sites – new claim

Crooks using phishing pages to grab victims' passwords have apparently upped their game – by using proxy servers rather than static pages to craft legit-looking websites. Normally, thieves recreate a web page – such as a login page for an online shop or webmail – and stick it on a compromised server, then direct marks towards …
John Leyden, 07 Nov 2014
<coat/> <door> <door/> shirt at Cash'n'Carrion

Securobods warn of wide open backdoor in Netis/Netcore routers

Update Routers sold under the brand Netis by Chinese security vendor Netcore have a hardcoded password that leaves users with a wide-open backdoor that could easily be exploited by attackers, claim researchers. The backdoor allows cyber-criminals to easily change settings or run arbitrary code on routers, securobods at Trend Micro warn …
John Leyden, 27 Aug 2014
management regulation1

Symantec to cough up $17m after bloody dust-up with patent troll

Symantec must pay out $17m after losing a patent infringement battle to IP-hoarding house Intellectual Ventures. A jury in Delaware found in favor of Intellectual Ventures on two of three infringement claims, awarding the biz $8m in damages for one claim and $9m for the other. Symantec was found to have infringed on two patents …
Shaun Nichols, 10 Feb 2015
The Register breaking news

Trend Micro lays down bread for humyo cloud service

Trend Micro has bought UK-based consumer and micro business cloud storage service provider humyo, with the target's file synchronisation technology apparently the cherry on the cake. This technology syncs files between a users' connected devices and humyo's cloud vault, meaning the humyo cloud is like Dropbox with added …
Chris Mellor, 14 Jun 2010

Not sure what RFID is? Can't hack? You can STILL be a card fraudster with this Android app

Cybercrooks have developed an Android app that makes it possible to hack RFID payment cards, researchers discovered after a Chilean transport system was defrauded. The app at the centre of the scam hacked into the user’s radio frequency ID (RFID) bus transit card in order to recharge credits. The fraud-enabling Android tool, …
John Leyden, 03 Dec 2014

Bank-heist malware's servers phone home to Russian spookhaus

Trend Micro researcher Maxim Goncharov says one of the world's most sophisticated and dangerous bank-robbing trojans is now pointing to Russia's Federal Security Service (FSB). Goncharov says the Carbanak trojan's command and control servers now point to the FSB in what could be a joke or gaffe by malware authors. Carbanak in …
Darren Pauli, 25 May 2015

Robin Hood virus: Chinese hackers target nation's wealthy

It seems China's state-supported hackers are being overshadowed by the black hat scene as the latter appears to have doubled in size – with some brazen crackers turning to carding the nation's wealthiest. A Trend Micro report dubbed The Chinese Underground in 2013 [PDF] issued this week reveals the black hat hacking scene has …
Darren Pauli, 05 Sep 2014
Petrol behind bars in Willowra

Anonymous HACKED GAS STATIONS - and could cause FUEL SHORTAGES

Hackers – possibly affiliated with Anonymous – have already attacked at least one internet-connected gas (petrol) station pump monitoring system. Evidence of malfeasance, uncovered by Trend Micro, comes three weeks after research about automated tank gauge vulnerabilities from Rapid7, the firm behind Metasploit. Automated tank …
John Leyden, 11 Feb 2015
Adobe Flash installer

Trouble comes in threes: Yet ANOTHER Flash 0-day vuln patch looming

Adobe plans to patch Flash yet again after yet another zero-day vulnerability in the web video software leaves PCs prone to hijacking. The PSA15-02 security advisory details a security hole that hackers are already exploiting to compromise vulnerable systems. An upcoming update to squash the critical bug makes it three patches …
John Leyden, 02 Feb 2015
Pwned

Sony Pictures MEGAHACK: Securobods pull out probes, analyse badness

Security experts have been able to obtain and analyse samples of the malware linked to the Sony Pictures breach. An FBI advisory issued on Monday, leaked to Reuters, warned US businesses to be vigilant about a new strain of “destructive” malware. The link between the Sony breach and the malware described by the FBI is yet to be …
John Leyden, 04 Dec 2014

Another day, another nasty Android vuln

The security researcher who last year sucked thousands of IDs out of Apple's Developer Centre site has turned his gaze onto Android and turned up a bug that Trend Micro says is exploitable. According to Ibrahim Balic, the bug causes memory corruption on Android 4.2.2 , 4.3 and 2.3 at least, but he suspects all Android versions …

Attackers planting banking Trojans in industrial systems

Trend Micro researcher Kyle Wilhoit says the latest attacks on SCADA and industrial control networks are turning out to carry rather pedestrian banking Trojans, and have been on the rise since October 2014. Talking to DarkReading, Wilhoit said rather than Stuxnet-style attacks, ne'er-do-wells are dropping banking Trojans into …
Two upended shopping trolleys in an alleyway. Photo by Cyron, licensecd under CC 2.0

Bank-card-sniffing shop menace Punkey pinned down in US Secret Service investigation

Security researchers have identified a new strain of point-of-sale (POS) malware during an investigation led by the US Secret Service. Stolen payment card information and the IP addresses of more than 75 infected sales tills were found by security researchers at Trustwave during the probe. It's unclear how many victims the so- …
John Leyden, 16 Apr 2015
Malware

Attackers raid SWISS BANKS with DNS and malware bombs

Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system settings, researchers have warned. The attacks sported a clever implementation of malware that pointed victim machines to replica phishing bank sites when they attempt to …
Darren Pauli, 23 Jul 2014
The Register breaking news

Trend Micro to eyeball malware from cloud

Trend Micro has unveiled a major update to its flagship scanning tools that puts your virus signature database online, plus a modular security and system management suite with partner BigFix. Trend Micro's updated OfficeScan Client/Server Suite includes an interesting change to the way its flagship scanning software keeps its …
Austin Modine, 13 Apr 2009
Windows Vista teaser

Trend Micro boosts Vista package, extends Hotmail deal

Security provider Trend Micro yesterday announced a brace of Microsoft-based strategies, rolling out improvements for its combo offering on Vista and proclaiming that it will handle antivirus for Hotmail/Live webmail services for a further year. Users running Trend Micro Internet Security on Vista platforms get two enhancements …
Lewis Page, 26 Jun 2007

AT LAST: Australia gets its very own malware

Australians are being targeted by a new variant of the Carberp malware under what appears to be renewed criminal interest in the antipodes. The modified trojan, Carberp.C, was spread through a spam operation masquerading as a payment invoice. Virus writers pushed the malware out a day after coding it, Symantec researcher …
Darren Pauli, 19 Jan 2015
Flash Gordon

Attackers sling recent Flash 0day through 1800 domains

Some 1800 subdomains have been found slinging the Angler exploit kit using Adobe's most recent Flash zero day exploit, Cisco researcher Nick Biasini says. The lion's share of nasty subdomains were set up on 28 and 29 January and tied to about 50 GoDaddy registrant accounts. Biasini said the malvertising attacks used several …
Darren Pauli, 04 Feb 2015

Trend Micro buys leak prevention firm

Trend Micro has acquired data leak prevention firm Provilla, in an agreement that expands its business beyond its core antivirus and content security markets. Financial terms are undisclosed. Data leaks potentially expose firms to security, intellectual property, financial, privacy and compliance threats. Provilla's technology …
John Leyden, 25 Oct 2007
 Dummy hand grenades are used by the Marines from the 3rd Low Altitude Air Defense Battalion, for practice before throwing the M-67 Fragment Grenades at the firing range.jpg

Dropbox used as command and control for Taiwan time bomb

A remote access trojan (RAT) is using Dropbox for command and control in a targeted attack against the Taiwanese Government, malware analyst Maersk Menrige says. The upgraded PlugX RAT is the first targeted attack to use Dropbox to update command and control settings, Menrige said, as distinct from other malware and ransomware …
Darren Pauli, 30 Jun 2014

Motorola Mobility loses another patent suit to über-troll Intellectual Ventures

Motorola Mobility has suffered another defeat at the hands of patent hoarder Intellectual Ventures, with a Delaware jury finding that Moto infringed a patent describing a way for handheld devices to connect to docking stations. Law360 reports that the jury only deliberated for about an hour before deciding in Intellectual …
Neil McAllister, 30 Mar 2015

Hackers pop German steel mill, wreck furnace

Talented hackers have caused "serious damage" after breaching a German steel mill and wrecking one of its blast furnaces. The hack of the unnamed mill, detailed in the annual report of the German Federal Office of Information Security, was pulled off after a victim fell for a phishing email. Hackers then pivoted to the …
Darren Pauli, 22 Dec 2014
channel

Trend Micro snaps up UK-based email crypto firm

Trend Micro, the security firm best known for its PC-cillin anti-virus software, has acquired UK-based email encryption firm Identum. Terms of the deal, announced Monday, were undisclosed. Identum's email encryption technology will be rolled into Trend's existing portfolio of content and web-security products under the Trend …
John Leyden, 25 Feb 2008
fingers pointing at man

Trend Micro CEO in SEC probe

The Securities and Exchange Commission (SEC) is considering enforcement action against the chief executive of Trend Micro, Eva Chen, involving her husband Daniel Chiang and the trading of stock in SINA Corporation, the Chinese online media and wireless services firm. Chiang is former co-chairman of SINA Corporation. SEC …
John Leyden, 05 Jul 2006

Not your father's spam: Trojan slingers attach badness to attachment WITHIN attachment

Cybercrooks are upping the ante by loading malware as an attachment inside another attachment in a bid to slip past security defences. A new variant of the Upatre Trojan comes bundled in spammed messages that imitate emails from known banks such as Lloyds Bank and Wells Fargo. The .MSG file of the malicious emails contains …
John Leyden, 08 Apr 2014

Hackers prowl for Trend Micro vuln

Hackers have begun actively scanning for recently announced vulnerabilities in Trend Micro's ServerProtect product. Security watchers at the Internet Storm Centre (ISC) have noted a huge upsurge of traffic on TCP port 5168, associated with security bugs in ServerProtect (an enterprise software product designed to protect …
John Leyden, 23 Aug 2007

VXers Shellshocking embedded BusyBox boxen

Malware writers have crafted new wares to attack embedded devices running BusyBox and not yet patched against the ShellShock vulnerability, researcher Rhena Inocencio says. Miscreants' tool of choice for such attacks is malware called "Bashlite" that, once executed on a victim machine, probes for devices such as routers and …
Darren Pauli, 17 Nov 2014

Like WhatsApp? Meet 'desktop' version... and his BANK ACCOUNT RAIDING Trojan pal

Scammers have slung together a scam designed to trick users into running malware disguised as a "desktop version" of the ultra-popular WhatsApp mobile messaging app. Links promoted through a run of spam emails that began appearing last week actually lead to a banking Trojan rather than a PC version of the mobile-only app, Trend …
John Leyden, 26 Feb 2014

Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't

A dispute has arisen about the seriousness of a vulnerability in Linux, dubbed "Grinch", that supposedly creates a privilege escalation risk. The flaw resides in the Linux authorisation system, which can unintentionally allow privilege escalation, granting a user “root", or full administrative, access. “With full root access, …
John Leyden, 19 Dec 2014
Apple Watch lineup

Hackers' delight? New Apple wrist-puter gives securobods the FEAR

Security pundits are already fretting over the security of the Apple Watch, just hours after the expensive gizmo was launched at a high profile US event. Ken Westin, security researcher at Tripwire, said that the security implications of the wearable device's Wi-Fi connection capabilities create a potential opportunity for …
John Leyden, 10 Mar 2015

Still using Adobe Flash? Oh well, get updating: 15 hijack flaws patched

People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software. If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux …
Shaun Nichols, 05 Feb 2015
chart

Trend Micro sees resellers grow

Since launching its "Worry Free" bundle of services in late 2005, Trend Micro has seen improved interest from the channel - it has signed up 50 per cent more resellers since launch. The package is aimed at smaller businesses. It provides a bundled package and simple maintenance. It will protect servers, clients and messaging …
John Oates, 12 Jun 2006

China's mobile underground revealed in new report

China plays host to a vast and highly sophisticated “mobile underground” where cyber criminals can buy the tools to launch attacks for as little as 100 yuan (£9.70), according to a new report from security vendor Trend Micro. The Mobile Cybercriminal Underground Market in China is the firm's follow up to two separate reports on …
Phil Muncaster, 04 Mar 2014