NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service

Credit to Author: Aliakbar Zahravi| Date: Thu, 05 May 2022 00:00:00 +0000

This report focuses on the components and infection chain ⁠of the NetDooka framework. Its scope ranges from the release of the first payload up until the release of the final RAT that is protected by a kernel driver.

Read more

AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate anti-virus component to disable detection and blocking solutions.

Read more

TM Named CWS “Strong Performer” by Research Firm


Trend Micro was named a strong performer in the Forrester Wave™: Cloud Workload Security, Q1 2022, achieving the highest possible score in the market presence category. That said, Trend Micro Cloud One secures far more than workloads and containers.

Read more

TM Named CWS “Strong Performer” in Forrester Wave 2022


Trend Micro was named a strong performer in the Forrester Wave™: Cloud Workload Security, Q1 2022, achieving the highest possible score in the market presence category. That said, Trend Micro Cloud One secures far more than workloads and containers.

Read more

An In-Depth Look at ICS Vulnerabilities Part 3


In our series wrap-up, we look into CVEs that affect critical manufacturing based on MITRE’s matrix. We also explore common ICS-affecting vulnerabilities identified in 2021.

Read more

An In-Depth Look at ICS Vulnerabilities Part 1


In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS.

Read more

Purple Fox Uses New Arrival Vector and Improves Malware Arsenal

Credit to Author: Sherif Magdy| Date: Fri, 25 Mar 2022 00:00:00 +0000

Purple Fox is an old threat that has been making waves since 2018. This most recent investigation covers Purple Fox’s new arrival vector and early access loaders. Users’ machines seem to be targeted with malicious payloads masquerading as legitimate application installers.

Read more

Cyberattacks are Prominent in the Russia-Ukraine Conflict

Credit to Author: Trend Micro Research| Date: Thu, 03 Mar 2022 00:00:00 +0000

Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.

Read more