Conti vs. LockBit: A Comparative Analysis of Ransomware Groups

Trend Micro – Trend Micro – Conti vs. LockBit: A Comparative Analysis of Ransomware Groups Ransomware We compare the targeting and business models of the Conti and LockBit ransomware groups…

NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service

Trend Micro – Trend Micro – NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service Malware This report focuses on the components and infection chain ⁠of the NetDooka…

AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell

Trend Micro – Trend Micro – Conclusion While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access…

An In-Depth Look at ICS Vulnerabilities Part 3

Trend Micro – Trend Micro – The items on this chart are showing what percentages of ICS-affecting vulnerabilities identified by 2021 advisories are caused by what kind of weaknesses –…

An In-Depth Look at ICS Vulnerabilities Part 1

Trend Micro – Trend Micro – In 2021, there were significant changes in the methods used by cyber attackers. More advanced destructive supply chain attacks also came to the surface…

Purple Fox Uses New Arrival Vector and Improves Malware Arsenal

Trend Micro – Trend Micro – In previous campaigns in 2019, HTTP file servers (HFS) were used by Purple Fox to run the C&C servers that host files on the…

SMS PVA Part 2: Underground Service for Cybercriminals

Trend Micro – Trend Micro – In this sample, we can see an Indonesian mobile number with an “ethnically” matching photograph in Whatsapp (presumed real account of the owner), but…

SMS PVA Part 1: Underground Service for Cybercriminals

Trend Micro – Trend Micro – SMS PVA Part 1: Underground Service for Cybercriminals Malware In this three-part blog entry, our team explored SMS PVA, a service built on top…

Cybersecurity for Industrial Control Systems: Part 2

Trend Micro – Trend Micro – Legacy malware had the most detections in India, China, the US, and Taiwan. For coinminer, Equated malware, and WannaCry, India had the most detections.…

Cybersecurity for Industrial Control Systems: Part 1

Trend Micro – Trend Micro – Cybersecurity for Industrial Control Systems: Part 1 Ransomware In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints.…