Six Easy Steps to Help Keep Hackers at Bay
Cybercriminals are adopting complex and powerful techniques to “hack,” or take control of online accounts belonging to other people or organizations. Often, they do this by identifying the passwords belonging to an account user. This used to be a complicated task, but, as The Atlantic notes, discovering passwords today can be as simple as running […] more…What Connections Between Attacks Say About Them
In the process of investigating and analyzing targeted attacks, we have seen that attacks which may not be related at first glance may in fact be linked; conversely attacks that may seem unrelated may turn out to be connected. Knowing which is which can provide useful information in determining how to respond to an attack. […] more…Compromised US Government Webpage Used Zero-Day Exploit
A new Internet Explorer zero-day exploit has been spotted in a compromised website of the US Department of Labor. When users visit the compromised website, it loads a malicious script which Trend Micro detects as JS_DLAGENT.USR. This particular script was hosted on the compromised site itself. It loads another script (this time, hosted on a malicious […] more…The State of Cybersecurity in Latin America
Trend Micro, working with the Organization of American states, has released a study outlining the current state of cybersecurity in Latin America. The joint paper is titled Latin American and Caribbean Cybersecurity Trends and Government Responses. The region has a threat landscape that differs from other parts of the world with key differences in the threats […] more…Malicious PDFs On The Rise
Additional text and analysis by Kyle Wilhoit Throughout 2012, we saw a wide variety of APT campaigns leverage an exploit in Microsoft Word (CVE-2012-0158). This represented a shift, as previously CVE-2010-3333 was the most commonly used Word vulnerability. While we continue to see CVE-2012-0158 in heavy use, we have noticed increasing use of an exploit for […] more…Apache Web Server Attacks Continue to Evolve
For the past few months we have seen a gradual increase in server-level compromises. In fact, every week it seems we’re handling half a dozen or so and it continues to increase. It’s one of the reasons that I have started including this as a trend in my most recent Website Security presentations. Just last […] more…PCI Compliance Best Practices: 3 Areas to Focus On
With the PCI DSS 3.0 release only 6 months away, compliance should be on every merchant’s mind. Nevertheless, these regulations often come as an afterthought, especially for Level 3 and Level 4 businesses. As the number of online shoppers continues to grow, there are more and more opportunities for cybercriminals to strike. Increased vigilance on […] more…How Hackers Use Our Information Against Us
We hear an awful lot about hackers breaking into systems and taking down networks or stealing millions of data records. The general understanding we have for hacking is bad guys want to disrupt things to make a point or to make money. But how do they really use our personal information against us? Whether you […] more…Trojan:Android/Pincer.A
Protip: don’t install an Android application package file if it’s named “Certificate.apk”. It’s not legit (obviously). Trojan:Android/Pincer.A is able to forward SMS messages and perform other actions based on commands it receives from its C&C. When installed, it will appear in the application menu as “Certificate” and will display related bogus messages when run. Previous […] more…Cybercriminals Threaten Tax Day Once Again
The Internal Revenue Service (IRS) opened up the filing season on January 30, 2013 to help taxpayers prepare for the looming April 15 tax deadline. April 15 or colloquially known as Tax Day is when individual income tax returns are due to the federal government. Typical of cybercriminals, they have also prepared their own tax-related scams for taxpayers with […] more…Online World
The real world isn’t like the online world. In the real world, you only have to worry about the criminals who live in your city. But in the online world, you have to worry about criminals who could be on the other side of the planet. Online crime is always international because the Internet has […] more…2012 Web Malware Trends Report Summary
Sucuri is a website security company focused on the detection and remediation of web malware. In 2012, via our SiteCheck scanner, we scanned 9,953,729 unique domains. This small report is based on the data we were able to compile from that platform and our analysis of that same data. The Foundation Healthy Website View We […] more…Recent Breach at Evernote Offers a Lesson in Password Management
Just this weekend, some 50 million Evernote users, myself included, were asked to reset our account passwords after their security team saw signs of an attempted attack on information, including usernames, passwords, and application-linked email addresses. Luckily, there is no evidence to suggest that payment information for Evernote Business or Evernote Premium account holders has […] more…In-Depth Look: APT Attack Tools of the Trade
Recently, we shed some light on APT attack tools and how to identify them. Part of our daily tasks as threat researchers revolves around investigating APT actors, and the tools that they utilize to help better protect our customers. The purpose of this blog is to further investigate the tools that APT actors typically use […] more…Your Data and the Business of Online Scams
Like any other businesses, scammers operate within a certain model to ensure the continuity of their schemes. In my previous post, I discussed in details about a typical scammer’s profile, trust model, and the strategies they use to get hold and sustain customers. This time around, we’ll look into the business model that they use […] more…SMS Trojan Targets South Korean Android Devices
It’s a common misconception that mobile malware is a problem limited to users in a particular geographical region such as China or Eastern Europe. Last week, McAfee Labs mobile research department received a mobile malware sample that targets Android mobile phone users in South Korea. The sample pretends to be a popular coffee shop coupon […] more…More information
- Data Protection Firm BigID Raises $70 Million at $1 Billion Valuation
- Code Execution Flaw in Checkbox Survey Exploited in the Wild
- In DARPA challenge, smart machines compete to fend off cyberattacks
- Intel ships (hopefully stable) microcode for Skylake, Kaby Lake, Coffee Lake
- New Database Catalogs Cloud Vulnerabilities, Security Issues
- Linus Torvalds: Changes in hardware change Linux development
- Personal assistant bots like Siri and Cortana have a serious problem
- Sneaky phishing campaign beats two-factor authentication
- Actor Targeting Middle East Shows Excellent OPSEC
- CISA Warns of Exploited Vulnerabilities Impacting Dahua Products