Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

Trend Micro – Trend Micro – In this section, we cover how malicious actors are leveraging Windows runners in their attempts to mine cryptocurrency, as well as the persistence techniques…

Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Trend Micro – Trend Micro – Lateral movement to machines in the network After the initial infection with Cobalt Strike, we observed that the threat actor dropped node.exe, which is…

Security Above and Beyond CNAPPs

Trend Micro – Trend Micro – The cloud is driving transformative benefits for global organizations. But in rushing their applications and infrastructure into new computing environments, they’re also exposing business-critical…

How to better manage your digital attack surface risk

Trend Micro – Trend Micro – So, how can security leaders stay on top of their attack surface and ahead of the bad guys? By leveraging a unified cybersecurity platform…

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

Trend Micro – Trend Micro – Europe is on a knife-edge. With over 130,000 Russian troops amassed on the Ukrainian border, the region is witnessing the biggest build-up of firepower…

Post-pandemic growth starts with understanding risk

Trend Micro – Trend Micro – IT and business leaders have rarely seen eye-to-eye on cybersecurity, but today the friction seems more pronounced than ever. New Trend Micro research found…

TeamTNT Upgrades Arsenal, Refines Focus on Kubernetes and GPU Environments

Trend Micro – Trend Micro – TeamTNT Upgrades Arsenal Refines Focus on Kubernetes and GPU Environments Using a new batch of campaign samples, we take a look at its more…

Threat Actors Exploit Misconfigured Apache Hadoop YARN

Trend Micro – Trend Micro – SHA-265 Trend Micro Pattern Detection 25d19152363063eb2b1976b416452e63ad21c205f727837d38d17001831f17f3 Trojan.Linux.KINSING.AB ec5ed2498945a5b0b1c1f149e201d7395bf3cb1c50f471d820500028ffe19d53 Trojan.SH.KINSING.G d17b00fd7687d2de31b0dd3b43d468f1de281002228361ef3125b92de0c08772 Trojan.SH.CVE20207961.SM 6e25ad03103a1a972b78c642bac09060fa79c460011dc5748cbb433cc459938b Coinminer.Linux.MALXMR.PUWEMA 11547e36146e0b0956758d48faeb19d4db5e737dc942bc7498ed86a8010bdc8b Coinminer.Win32.MALXMR.TIAOODGJ 1caf7ed35dcb8eddb5bca9120294bc79e7d9a24d451bc0fbebb2195fa5826808 Coinminer.Win32.MALXMR.TIAOODGJ 7cd493e9a14eb33279a96fe025aae0ff37712a300e83dd334cff8ce138fd721a Coinminer.Win32.MALXMR.TIAOODGJ 83c4ff76659aec8db03942b3b7094736e4377048166839d3ab476067fbc2f892 Coinminer.Win32.MALXMR.TIAOODGJ 559a8ff34cf807e508d32e3a28864c687263587fe4ffdcefe3f462a7072dcc74 Coinminer.Win32.MALXMR.TIAOODDS/16.845.00 a5604893608cf08b7cbfb92d1cac20868808218b3cc453ca86da0abaeadc0537…