Click here to download all references as Bib-File.
2023-07-13 ⋅ Trend Micro ⋅ Detecting BPFDoor Backdoor Variants Abusing BPF Filters BPFDoor Symbiote |
2023-05-30 ⋅ Trend Micro ⋅ Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals ROMCOM RAT |
2022-11-08 ⋅ DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
2022-03-17 ⋅ Trendmicro ⋅ Cyclops Blink Sets Sights on Asus Routers CyclopsBlink |
2022-03-17 ⋅ Trendmicro ⋅ Cyclops Blink Sets Sights on Asus Routers (Appendix) CyclopsBlink |
2022-01-20 ⋅ Trend Micro ⋅ Backing Your Backup Defending NAS Devices Against Evolving Threats QNAPCrypt QSnatch |
2021-10-15 ⋅ Trend Micro ⋅ Ransomware Operators Found Using New "Franchise" Business Model Glupteba IcedID Mount Locker |
2021-06-08 ⋅ Trend Micro ⋅ Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2021-01-19 ⋅ Trend Micro ⋅ VPNFilter Two Years Later: Routers Still Compromised VPNFilter |
2020-07-28 ⋅ Trend Micro ⋅ Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902 Mirai |
2018-06-07 ⋅ Trend Micro ⋅ New KillDisk Variant Hits Latin American Financial Organizations Again BOOTWRECK |
2017-12-14 ⋅ Trend Micro ⋅ Dissecting PRILEX and CUTLET MAKER ATM Malware Families Prilex |
2016-09-05 ⋅ Trend Micro ⋅ Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Umbreon |
2014-10-27 ⋅ Trend Micro ⋅ Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10 ⋅ Trend Micro ⋅ Operation Pawn Storm: Using Decoys to Evade Detection |
2014-01-27 ⋅ Trend Micro ⋅ CPL Malware: Malicious Control Panel Items Banload Mevade |