Collecting In the Dark: Tropic Trooper Targets Transportation and Government

Credit to Author: Nick Dai| Date: Tue, 14 Dec 2021 00:00:00 +0000

Our long-term monitoring of the cyberespionage group Earth Centaur (aka Tropic Trooper) shows that the threat actors are equipped with new tools and techniques. The group seems to be targeting transportation companies and government agencies related to transportation.

Read more

Patch Now: Apache Log4j Vulnerability Called Log4Shell Actively Exploited

Credit to Author: Ranga Duraisamy| Date: Mon, 13 Dec 2021 00:00:00 +0000

Log4Shell., also known as CVE-2021-44228, was first reported privately to Apache on November 24 and was patched with version 2.15.0 of Log4j on December 9. It affects Apache Struts, Apache Solr, Apache Druid, Elasticsearch, Apache Dubbo, and VMware vCenter.

Read more

A Look Into Purple Fox’s Server Infrastructure

Credit to Author: Jay Yaneza| Date: Mon, 13 Dec 2021 00:00:00 +0000

By examining Purple Fox’s routines and activities, both with our initial research and the subject matter we cover in this blog post, we hope to help incident responders, security operation centers (SOCs), and security researchers find and weed out Purple Fox infections in their network.

Read more

Why You Need XDR in Today’s Threat Landscape

Credit to Author: Jon Clay| Date: Mon, 13 Dec 2021 00:00:00 +0000

Trend Micro’s VP of Threat Intelligence, Jon Clay, explores the latest trends in today’s threat landscape and why XDR is key to enabling more resilience.

Read more

This Week in Security News – December 10, 2021

Credit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000

This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.

Read more

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes

Credit to Author: Don Ovid Ladores| Date: Fri, 10 Dec 2021 00:00:00 +0000

We analyzed new samples of the Yanluowang ransomware. One interesting aspect of these samples is that the files are code-signed. They also terminate various processes which are related to database and backup management.

Read more

How Zero Trust and XDR Work Together


As the Zero Trust approach gains momentum, more organizations are looking to apply it to their security strategy. Learn how XDR and Zero Trust work together to enhance your security posture.

Read more

The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

Credit to Author: Veronica Chierzi| Date: Thu, 09 Dec 2021 00:00:00 +0000

In our study, we relied on the tactics, techniques, and procedures of MITRE ATT&CK to define the malware capabilities and characteristics of IoT Linux malware. We describe our findings and how IoT malware has been evolving.

Read more

The evolution of a Mac trojan: UpdateAgent’s progression

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 02 Feb 2022 17:00:00 +0000

Our discovery and analysis of a sophisticated Mac trojan in October exposed a year-long evolution of a malware family—and depicts the rising complexity of threats across platforms.

The post The evolution of a Mac trojan: UpdateAgent’s progression appeared first on Microsoft Security Blog.

Read more