Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-10-14Trend MicroMarshall Chen, Loseway Lu, Paul Pajares, Fyodor Yarochkin
@online{chen:20211014:analyzing:ae5c6a4, author = {Marshall Chen and Loseway Lu and Paul Pajares and Fyodor Yarochkin}, title = {{Analyzing Email Services Abused for Business Email Compromise}}, date = {2021-10-14}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_in/research/21/j/analyzing-email-services-abused-for-business-email-compromise.html}, language = {English}, urldate = {2021-10-26} } Analyzing Email Services Abused for Business Email Compromise
2021-10-05Trend MicroFyodor Yarochkin, Janus Agcaoili, Byron Gelera, Nikko Tamana
@online{yarochkin:20211005:ransomware:e5f5375, author = {Fyodor Yarochkin and Janus Agcaoili and Byron Gelera and Nikko Tamana}, title = {{Ransomware as a Service: Enabler of Widespread Attacks}}, date = {2021-10-05}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-as-a-service-enabler-of-widespread-attacks}, language = {English}, urldate = {2021-10-20} } Ransomware as a Service: Enabler of Widespread Attacks
Cerber Conti DarkSide Gandcrab Locky Nefilim REvil Ryuk
2021-07-21Trend MicroZhengyu Dong, Fyodor Yarochkin, Steven Du
@online{dong:20210721:strongpity:f87c7bd, author = {Zhengyu Dong and Fyodor Yarochkin and Steven Du}, title = {{StrongPity APT Group Deploys Android Malware for the First Time}}, date = {2021-07-21}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/g/strongpity-apt-group-deploys-android-malware-for-the-first-time.html}, language = {English}, urldate = {2021-07-26} } StrongPity APT Group Deploys Android Malware for the First Time
2021-05-04Trend MicroMonte de Jesus, Fyodor Yarochkin, Paul Pajares
@online{jesus:20210504:new:38799c6, author = {Monte de Jesus and Fyodor Yarochkin and Paul Pajares}, title = {{New Panda Stealer Targets Cryptocurrency Wallets}}, date = {2021-05-04}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/e/new-panda-stealer-targets-cryptocurrency-wallets-.html}, language = {English}, urldate = {2021-05-04} } New Panda Stealer Targets Cryptocurrency Wallets
Panda Stealer
2021-04-30Trend MicroCedric Pernet, Fyodor Yarochkin, Vladimir Kropotov
@online{pernet:20210430:how:2434ac6, author = {Cedric Pernet and Fyodor Yarochkin and Vladimir Kropotov}, title = {{How Cybercriminals Abuse OpenBullet for Credential Stuffing}}, date = {2021-04-30}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/d/how-cybercriminals-abuse-openbullet-for-credential-stuffing-.html}, language = {English}, urldate = {2021-05-03} } How Cybercriminals Abuse OpenBullet for Credential Stuffing
2021-01-25Trend MicroMatsukawa Bakuei, Marshall Chen, Vladimir Kropotov, Loseway Lu, Fyodor Yarochkin
@online{bakuei:20210125:fake:eeac584, author = {Matsukawa Bakuei and Marshall Chen and Vladimir Kropotov and Loseway Lu and Fyodor Yarochkin}, title = {{Fake Office 365 Used for Phishing Attacks on C-Suite Targets}}, date = {2021-01-25}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/a/fake-office-365-used-for-phishing-attacks-on-c-suite-targets.html}, language = {English}, urldate = {2021-01-27} } Fake Office 365 Used for Phishing Attacks on C-Suite Targets
2020-10-06Trend MicroVladimir Kropotov, Robert McArdle, Fyodor Yarochkin
@techreport{kropotov:20201006:hacker:ddb4108, author = {Vladimir Kropotov and Robert McArdle and Fyodor Yarochkin}, title = {{The Hacker Infrastructure and Underground Hosting: Cybercrime Modi Operandi and OpSec}}, date = {2020-10-06}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-the-hacker-infrastructure-and-underground-hosting-cybercrime-modi-operandi-and-opsec.pdf}, language = {English}, urldate = {2021-11-08} } The Hacker Infrastructure and Underground Hosting: Cybercrime Modi Operandi and OpSec
2020-08-06Trend MicroMarshall Chen, Loseway Lu, Yorkbing Yap, Fyodor Yarochkin
@online{chen:20200806:water:e7860e3, author = {Marshall Chen and Loseway Lu and Yorkbing Yap and Fyodor Yarochkin}, title = {{Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts}}, date = {2020-08-06}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/water-nue-campaign-targets-c-suites-office-365-accounts/}, language = {English}, urldate = {2020-08-13} } Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts
2020Trend MicroVladimir Kropotov, Robert McArdle, Fyodor Yarochkin
@techreport{kropotov:2020:hacker:34fa1c6, author = {Vladimir Kropotov and Robert McArdle and Fyodor Yarochkin}, title = {{The Hacker Infrastructureand Underground Hosting:Services Used by Criminals}}, date = {2020}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-the-hacker-infrastructure-and-underground-hosting-services-used-by-criminals.pdf}, language = {English}, urldate = {2020-11-09} } The Hacker Infrastructureand Underground Hosting:Services Used by Criminals
2018-01-24Trend MicroCH Lei, Fyodor Yarochkin, Lenart Bermejo, Philippe Z Lin, Razor Huang
@online{lei:20180124:lazarus:63d2701, author = {CH Lei and Fyodor Yarochkin and Lenart Bermejo and Philippe Z Lin and Razor Huang}, title = {{Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More}}, date = {2018-01-24}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-campaign-targeting-cryptocurrencies-reveals-remote-controller-tool-evolved-ratankba/}, language = {English}, urldate = {2020-01-08} } Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More
PowerRatankba
2017-11-20Trend MicroRonnie Giagone, Lenart Bermejo, Fyodor Yarochkin
@online{giagone:20171120:cobalt:fb5c2ed, author = {Ronnie Giagone and Lenart Bermejo and Fyodor Yarochkin}, title = {{Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks}}, date = {2017-11-20}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/cobalt-spam-runs-use-macros-cve-2017-8759-exploit/}, language = {English}, urldate = {2019-10-29} } Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks
More_eggs Cobalt
2017-08-07Trend MicroLenart Bermejo, Ronnie Giagone, Rubio Wu, Fyodor Yarochkin
@online{bermejo:20170807:backdoorcarrying:317ebe3, author = {Lenart Bermejo and Ronnie Giagone and Rubio Wu and Fyodor Yarochkin}, title = {{Backdoor-carrying Emails Set Sights on Russian-speaking Businesses}}, date = {2017-08-07}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-carrying-emails-set-sights-on-russian-speaking-businesses/}, language = {English}, urldate = {2020-01-09} } Backdoor-carrying Emails Set Sights on Russian-speaking Businesses
More_eggs