Revisiting 16shop Phishing Kit, Trend-Interpol Partnership

Credit to Author: Paul Pajares| Date: Fri, 01 Sep 2023 00:00:00 +0000

In this entry, we summarize the security analyses and investigations done on phishing-as-a-service 16shop through the years. We also outline the partnership between Trend Micro and Interpol in taking down the main administrators and servers of this massive phishing campaign.

Read more

Earth Estries Targets Government, Tech for Cyberespionage

Credit to Author: Ted Lee| Date: Wed, 30 Aug 2023 00:00:00 +0000

We break down a new cyberespionage campaign deployed by a cybercriminal group we named Earth Estries. Analyzing the tactics, techniques, and procedures (TTPs) employed, we observed overlaps with the advanced persistent threat (APT) group FamousSparrow as Earth Estries targets governments and organizations in the technology sector.

Read more

Stealthy Android Malware MMRat Carries Out Bank Fraud Via Fake App Stores

Credit to Author: Trend Micro Research| Date: Tue, 29 Aug 2023 00:00:00 +0000

The Trend Micro Mobile Application Reputation Service (MARS) team discovered a new, fully undetected Android banking trojan, dubbed MMRat, that has been targeting mobile users in Southeast Asia since late June 2023.

Read more

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO

Credit to Author: Ed Cabrera| Date: Mon, 21 Aug 2023 00:00:00 +0000

Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden’s cybersecurity executive order.

Read more

Monti Ransomware Unleashes a New Encryptor for Linux

Credit to Author: Nathaniel Morales| Date: Mon, 14 Aug 2023 00:00:00 +0000

The Monti ransomware collective has restarted their operations, focusing on institutions in the legal and governmental fields. Simultaneously, a new variant of Monti, based on the Linux platform, has surfaced, demonstrating notable differences from its previous Linux-based versions.

Read more

The Journey to Zero Trust with Industry Frameworks

Credit to Author: Alifiya Sadikali| Date: Wed, 09 Aug 2023 00:00:00 +0000

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Read more