We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials and other sensitive user information, including private keys.
Tag: Trend Micro Research : Mobile
Security Vendor News
An Investigation of Cryptocurrency Scams and Schemes
by Cifer Fang •
We provide an overview of the diverse range of NFT- and cryptocurrency-related scams that malicious actors use to steal assets worldwide.
Security Vendor News
SMS PVA Part 3: Countries Most Impacted by Service
by Trend Micro Research, News, Perspectives •
In this final part, we discuss the countries most affected by SMS PVA services as well as lay out several recommendations to mitigate the risks of such threats.
Security Vendor News
SMS PVA Part 2: Underground Service for Cybercriminals
by Trend Micro Research, News, Perspectives •
In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services.
Security Vendor News
Global Cyberattacks Tied to the Russian Invasion of Ukraine
by Trend Micro Research, News, Perspectives •
Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.
Security Vendor News
Global Cyberattacks: Managing Risk in Chaotic Times
by Trend Micro Research, News, Perspectives •
As global tension rises, cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices are presented to manage your cyber risk.
Security Vendor News
SMS PVA Part 1: Underground Service for Cybercriminals
by Trend Micro Research, News, Perspectives •
In this three-part blog entry, our team explored SMS PVA, a service built on top of a global bot network that compromises smartphone cybersecurity as we know it.
Security Vendor News
This Week in Security News – February 18, 2022
by Jon Clay •
SMS PVA services’ use of infected Android phones reveals flaws in SMS verification, and ‘Russian state-sponsored cyber actors’ cited in hacks of U.S. defense contractors
Security Vendor News
SMS PVA Services’ Use of Infected Android Phones Reveals Flaws in SMS Verification
by Zhengyu Dong •
Certain SMS PVA services allow their customers to create disposable user profiles or register multiple accounts on many popular online platforms. These services can be abused by criminals to conduct fraud or other malicious activities.
Security Vendor News
This Week in Security News – February 11, 2022
by Jon Clay •
Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins
Security Vendor News
This Week in Security News – January 28th, 2022
by Jon Clay •
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest…
Security Vendor News
TianySpy Malware Uses Smishing Disguised as Message From Telco
by Trend Micro Research, News, Perspectives •
Trend Micro confirmed a new mobile malware infection chain targeting both Android and iPhone devices. The malware might have been designed to steal credentials associated with membership websites of major Japanese telecommunication services.
Security Vendor News
This Week in Security News – January 7, 2022
by Jon Clay •
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.
Security Vendor News
This Week in Security News – December 10, 2021
by Jon Clay •
This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.
Security Vendor News
Private 5G Security Risks in Manufacturing Part 4
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Does Home IoT Compromise Enterprise Security?
by William Malik •
The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office.
Security Vendor News
Does Home IoT Compromise Enterprise Security?
by William Malik •
The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office.
Security Vendor News
Security Risks with Private 5G Networks in Manufacturing Part. 3
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private compa…
Security Vendor News
Private 5G Security Risks in Manufacturing Part 3
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Private 5G Security Risks in Manufacturing Part 2
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Security Risks with Private 5G in Manufacturing Companies Part. 2
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private compa…
Security Vendor News
Analyzing Email Services Abused for Business Email Compromise
by Marshall Chen •
We analyzed five major types of email channels, and the techniques in keywords and domain names BEC actors use to appear legitimate to potential victims.
Security Vendor News
Analyzing Email Services Abused for Business Email Compromise
by Marshall Chen •
We analyzed five major types of email channels, and the techniques in keywords and domain names BEC actors use to appear legitimate to potential victims.
Security Vendor News
Private 5G Security Risks in Manufacturing Part 1
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Security Risks with Private 5G in Manufacturing Companies Part. 1
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private compa…
Security Vendor News
This Week in Security News – September 17, 2021
by Jon Clay •
2021 Midyear Cybersecurity Report and Apple emergency patches fix zero-click iMessage bug used to inject NSO spyware
Security Vendor News
Analyzing The ForcedEntry Zero-Click iPhone Exploit Used By Pegasus
by Mickey Jin •
Citizen Lab has released a report on a new iPhone threat dubbed ForcedEntry. This zero-click exploit seems to be able to circumvent Apple’s BlastDoor security, and allow attackers access to a device without user interaction.
Security Vendor News
This Week in Security News – September 10, 2021
by Jon Clay •
Biden announces cybersecurity initiative partnership, US Government seeks public feedback on draft federal zero trust strategy and more.
Security Vendor News
This Week in Security News – September 3, 2021
by Jon Clay •
Proxytoken vulnerability can modify Exchange server configs and Lockbit jumps its own countdown, publishes Bangkok Air files
Security Vendor News
What the Norton-Avast Merger Means for Cybersecurity
by Trend Micro Research, News, Perspectives •
Recently two consumer cybersecurity vendors merged their respective businesses, what will the impact be on customers, and the cybersecurity industry?
Security Vendor News
Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service
by Cifer Fang •
We recently discovered eight deceptive mobile apps that masquerade as cryptocurrency cloud mining applications where users can earn cryptocurrency by investing money into a cloud-mining operation.
Security Vendor News
Risks in Telecommunications IT
by Craig Gibson •
We summarize the characteristics, threats, and recommendations to improve the security posture of enterprises’ and telecommunications companies’ IT infrastructure.
Security Vendor News
Updated XCSSET Malware Targets Telegram, Other Apps
by Mickey Jin •
In our last update on the XCSSET campaign, we updated some of its features targeting latest macOS 11 (Big Sur). Since then, the campaign added more features to its toolset, which we have continually monitored. We have also discovered the mechanism used…
Security Vendor News
StrongPity APT Group Deploys Android Malware for the First Time
by Zhengyu Dong •
We recently conducted an investigation into a malicious Android malware sample, which we believe can be attributed to the StrongPity APT group, that was posted on the Syrian e-Gov website. To the best of our knowledge, this is the first time that the g…
Security Vendor News
Threats Ride on the Covid-19 Vaccination Wave
by Paul Pajares •
We continue monitoring cybercriminals and threats that abuse the pandemic. In this update, we detail trends in malicious activities and deployments that exploit vaccination developments and processes worldwide.