Cybersecurity for Industrial Control Systems: Part 2

Trend Micro – Trend Micro – Legacy malware had the most detections in India, China, the US, and Taiwan. For coinminer, Equated malware, and WannaCry, India had the most detections.…

Cybersecurity for Industrial Control Systems: Part 1

Trend Micro – Trend Micro – Cybersecurity for Industrial Control Systems: Part 1 Ransomware In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints.…

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Trend Micro – Trend Micro – Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify We looked into exploitation attempts we observed in the wild and the abuse of…

PurpleFox Adds New Backdoor That Uses WebSockets

Trend Micro – Trend Micro – PurpleFox Adds New Backdoor That Uses WebSockets Cyber Threats In September 2021, the Trend Micro Managed XDR (MDR) team looked into suspicious activity related…

Ransomware Operators Found Using New “Franchise” Business Model

Trend Micro – Trend Micro – Shared infrastructure  To date, we have found fifteen onion addresses used by at least four different servers, and three others still unknown. Onion Address…

Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising

Trend Micro – Trend Micro – SHA256 File name Note Analysis 124FE26D53E2702B42AE07F8AEC5EE4E79E7424BCE6ECDA608536BBF0A7A2377 oneroom_setup.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ E667F9C109E20900CC8BADD09EDE6CDCE0BDC77164CFD035ACE95498E90D45E7 oneroom_game.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ 93FFE7CF56FEB3FB541AEF91D3FC04A5CF22DF428DC0B7E5FEB8EDDDC2C72699 Magicalgirl.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ AD13BB18465D259ACC6E4CEBA24BEFF42D50843C8FD92633C569E493A075FDDC…