Tag Trend Micro

Cybercriminals Launch Over 100,000 Malicious Android Apps to Capture OTP Codes

A recent investigation has uncovered a significant malicious campaign leveraging harmful Android applications to pilfer users’ SMS messages, with activity dating back to at least February 2022. This large-scale operation purportedly involves over 107,000 unique malicious app samples aimed at intercepting one-time passwords (OTPs) that are essential for online account…

Read MoreCybercriminals Launch Over 100,000 Malicious Android Apps to Capture OTP Codes

Ransomware Hackers Exploit Cloud Service Platforms as Their Playground

In recent years, the landscape of cybercrime has become increasingly perilous, with ransomware attacks surging in both frequency and sophistication. Cybercriminal organizations have gained notoriety for infiltrating targeted networks, encrypting vital databases, and effectively locking out businesses from their critical data until a ransom is paid. This evolving approach to…

Read MoreRansomware Hackers Exploit Cloud Service Platforms as Their Playground

Kasseika Ransomware Employs BYOVD Technique to Bypass Security Before Encryption

The Kasseika ransomware group has emerged as the latest threat actor exploiting the Bring Your Own Vulnerable Driver (BYOVD) technique to disable security processes on compromised Windows systems. This method allows cybercriminals to terminate antivirus software, facilitating the deployment of ransomware. Kasseika joins other prominent groups, including Akira, AvosLocker, BlackByte,…

Read MoreKasseika Ransomware Employs BYOVD Technique to Bypass Security Before Encryption

Exit Scam: BlackCat Ransomware Group Disappears Following $22 Million Ransom Collection

Recent developments surrounding the BlackCat ransomware group have raised significant concerns within the cybersecurity community, as the actors appear to have executed a strategic exit from their operations. Following the upload of a fraudulent law enforcement seizure banner, BlackCat has reportedly shuttered its darknet presence, a move indicative of a…

Read MoreExit Scam: BlackCat Ransomware Group Disappears Following $22 Million Ransom Collection

Void Banshee APT Leverages Microsoft MHTML Vulnerability to Distribute Atlantida Stealer

Void Banshee APT Exploits Microsoft MHTML Vulnerability in Information Theft Campaign An advanced persistent threat (APT) group known as Void Banshee has been detected leveraging a newly identified security vulnerability in the Microsoft MHTML browser engine. This zero-day exploit is being used to distribute an information-stealing malware known as Atlantida.…

Read MoreVoid Banshee APT Leverages Microsoft MHTML Vulnerability to Distribute Atlantida Stealer

Recognizing, Enduring, and Rebounding from Cyber-Attacks

Cyber Security Landscape Amidst Rising Threats: Insights from the 2024 Breaches Survey The recently released 2024 Cyber Security Breaches Survey paints a concerning picture for UK businesses grappling with escalating cyber threats. As the frequency and sophistication of cyber-attacks continue to rise, particularly targeting larger enterprises, organizations are increasingly challenged…

Read MoreRecognizing, Enduring, and Rebounding from Cyber-Attacks

Microsoft Releases Fixes for 90 Vulnerabilities, Featuring 10 Critical Zero-Day Flaws

On Tuesday, Microsoft released a set of critical updates addressing a total of 90 security vulnerabilities within its software, including ten zero-day exploits. Notably, six of these zero-days are actively being leveraged in real-world attacks, raising significant concerns regarding the potential for widespread exploitation in the wild. The vulnerabilities span…

Read MoreMicrosoft Releases Fixes for 90 Vulnerabilities, Featuring 10 Critical Zero-Day Flaws

CISA Alerts on Serious Jenkins Vulnerability Being Targeted in Ransomware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added a significant vulnerability related to Jenkins to its Known Exploited Vulnerabilities (KEV) catalog due to its exploitation in ransomware attacks. This vulnerability, designated as CVE-2024-23897 with a critical CVSS score of 9.8, is classified as a path traversal flaw that…

Read MoreCISA Alerts on Serious Jenkins Vulnerability Being Targeted in Ransomware Attacks

Cybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks

Cybersecurity experts have identified a significant vulnerability in Jenkins, a widely-used continuous integration and delivery platform. Attackers can exploit improperly configured Jenkins Script Console instances to facilitate malicious activities, including cryptocurrency mining. Shubham Singh and Sunil Bharti from Trend Micro recently detailed this risk, noting that misconfigurations related to authentication…

Read MoreCybercriminals Target Jenkins Script Console for Cryptocurrency Mining Attacks