Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.
|
|
|
- Erica Bell
- 9 years ago
- Views:
Transcription
1 RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in It has since put users at risk through popular online activities like social networking and downloading content. These fraud services are knownn as premiumm servicee abusers, mobile malware that subscribe users to premium-rated short message services. Some of them also connect to premiumm numbers without the user s consent, which leads to additional and unwanted charges. Premium service abusers may favor malicious domains as hosts but they can also spread as fake apps downloaded from third-party or legitimate app stores. Users often get them from poisoned search engine results that lead to fake app download sites, which then install malware. Premiumm service abusers comprise over 40% of o the global threats to Android devices. They not only affect Android, but also the Java Microo Edition (formerly J2ME) platform. Users of the ios platform are also at risk, as shown by a rogue Angry Birds Star Wars app that tricks them into giving out their mobile numbers via browser-based social engineering tactics. Premiumm service abusers prove the active dynamics of mobile cybercrime, which grows alongside the increasing mobile traffic. Seeingg that mobile threats can be agile, jumping fromm PCs to mobile devices, it is only wise for individuals and companies alike to use comprehensive solutions that protect both.
2 Why Russia? Premium service abusers primarily target Russia. This is partly due to the lack of standard app stores in the country, which makes third-party app stores popular. With over 2,800 unique infections from November to May 2013 alone, the threat aggravates the risks in the Russian mobile landscape. Other top targets include Russian-speakingg countries, Ukraine and Uzbekistan. Figure 1 shows that more people are downloading malicious.apk and.jar files. These are mostly hosted in the Czech Republic and Germany. Still, research suggests that there are onlyy a couple of servers that dominate most domains. This indicates that only a handful of o players control the large fraud services market. 2,500 2,000 1,500 1, JAR APK 0 Nov Dec Jan Feb Mar Apr May Figure 1: Distribution of.apk and.jar files downloadedd from November 2012 to May 2013 Figure 2: Top SMS fraud host countries most affected by SMS fraud Figure 3: Countries most affected by SMS fraud 2
3 Free Content Search Leads to Malware They use advertising network affiliates to pushh Fake apps are often obtained when users get malicious links via mobile apps, providers, sites, redirected to file download sites. The sites use SMS, QR codes, and links in spam. They thenn blackhat search engine optimization (SEO) to get paid via these affiliate networks without the appear as top search resultss for popular users consent. keywords like Bad Piggies and Download Flash for Android. Some apps also gather device information like International Mobile Station Equipment These download sites are either constructed Identityy (IMEI) number, International Mobile blog sites with Russian text, a fake Google Play Subscriber Identity (IMSI) number, brand, site, rogue app stores, or specific download sites model, manufacturer, and OS software for apps usually defined on the host name. Cybercriminals usually trick users to subscribe development kit (SDK) version. Mobile numbers and other personal informationn to free content then charge recurring payments. exorbitant or are then sold in the underground cybercrime market.. MOBILE DATA 1M numbers 10K numbers PRICE US$70 US$10 Customized database with personal data US$ $35 for 1,000 numbers Figure 4: Fake Adobe Flash Player for Androidd tricks users into downloading malware Table 1: Underground prices of collected mobile numbers from Russian network operators TYPES OF MALICIOUS DOWNLOAD SITES Malicious apps in a constructed blog site with Russian text Roguee Google Play app store Specific app download site Table 2: Types off malicious download sites 3
4 Permissions, Privacy, and a Little Push Most premium service abusers exploit app permissions for malicious activities like sending, receiving, and reading text messages as well as obtaining access to contacts and locations. The proliferation of FAKE and BOXER malware, meanwhile, show the prevalence of Russian SMS fraud services in the overall mobile threat landscape. Push notifications can also be dangerous for users, as many malware and high-risk apps push ads that can lead to malicious downloads. Aggressive adware like ARPUSH and LEADBLT variants use push notifications to Figure 5: Sample push notification that can be usedd victimize mobile users as well. to redirect users to malicious mobile sites What Can Users Do? Russian SMS fraud services and malicious apps from legitimate and/or third-party app stores can cause users to suffer financial losses from sending messages to premium numbers. Similarly, user privacy and reputation are put at risk with the amount of access that malicious apps can obtain and use for cybercriminal activities. But they can be effectively fought off with a robust and comprehensive threat solution anchored on reliable, global threat intelligence. Individuals and businesses can both benefit from using accurate web and IP reputation technologies that can correlate threats and block access to malicious app sources like standalone websites and third-party app stores. It is also important to collect mobile threat intelligence and use a mobile app reputationn technology to identify malicious and high-riskk apps. Proper discretion should be applied whenn searching for and downloading seemingly malicious and high-risk apps. Check appp permissions and only download from official app stores. Look at the routines of the apps youu download as well and exercise caution when it i comes to push ads that appear as notifications. More importantly, user devices can be further protected by threatt solutions that not only proactively block threats on a single device type but across all possible threat vectors. 4
5 TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect thee most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are nott binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonablee efforts to include accurate and up-to-date information herein, Trendd Micro makes no warranties or epresentations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use off this document, or any errors or omissions in the content thereof. Use of this informationn constitutes acceptance for use in an as is condition. Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative i solutions for consumers, businesses and governmentss provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threatt intelligence, thee Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts aroundd the globe. For more information, visitt by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trendd Micro t-ball logoo are trademarks or egistered trademarks of Trend Micro, Incorporated. All other product or companyy names may be trademarks or registered trademarks of their owners N. De Anza Blvd. Cupertino, CA U.S. toll free: Phone: Fax:
A number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
43% Figure 1: Targeted Attack Campaign Diagram
TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
This document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
The Mobile Cybercriminal Underground Market in China
A Trend Micro Research Paper Cybercriminal Underground Economy Series The Mobile Cybercriminal Underground Market in China Lion Gu Forward-Looking Threat Research Team Contents Cybercriminal Underground
As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:
TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data
DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check
A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your
How Do Threat Actors Move Deeper Into Your Network?
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Latest Business Email Compromise Malware Found: Olympic Vision
A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic
THE SOUTH KOREAN FAKE BANKING APP SCAM
THE SOUTH KOREAN FAKE BANKING APP SCAM The Yanbian Gang Sets Sights on South Koreans Simon Huang Mobile Threat Research Team CONTENTS Introduction... 1 The Yanbian Gang... 2 Where Did the Gang Get Its
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
FastPOS: Quick and Easy Credit Card Theft
A TrendLabs Report FastPOS: Quick and Easy Credit Card Theft TrendLabs Security Intelligence Blog Trend Micro Cyber Safety Solutions Team June 2016 Contents Introduction...1 Installation...1 Information
Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue
SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
Network Detection Evasion Methods
A Trend Micro Research Paper Network Detection Evasion Methods Blending with Legitimate Traffic Jessa Dela Torre and Sabrina Sioting Contents Introduction...3 Known Threats That Use Advanced Evasion Techniques...3
Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond
Security Threats to Business, the Digital Lifestyle, and the Cloud Trend Micro Predictions for 2013 and Beyond In 2013, managing the security of devices, small business systems, and large enterprise networks
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team)
A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team) Contents Introduction...3 Ice IX as an Attack Vector...3
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Fraud Threat Intelligence
About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle
The Android Developers Guide to 3 rd -Party SDK Assessment and Security
SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed
MOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Solving the SMS Revenue Leakage Challenge
Whitepaper Table of Contents 1 Background 2 SMS fraud technical overview 3 Affected parties 4 Common methodologies 5 Ways to control the different types of SMS fraud Solving the SMS Revenue Leakage Challenge
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.
Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable
Follow the Data: Analyzing Breaches by Industry
Follow the Data: Analyzing Breaches by Industry Trend Micro Analysis of Privacy Rights Clearinghouse 25 215 Data Breach Records Numaan Huq Forward-Looking Threat Research (FTR) Team A TrendLabs SM Research
TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS
TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS g Maxim Goncharov A 2011 Trend Micro Research Paper Abstract Directing traffic to cash in on referrals is a common and legitimate method of making
Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response
Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response Dragonfly: Western Energy Companies Under Sabotage Threat 1 What is Dragonfly? Ongoing cyberespionage campaign Targeting the
G Data Mobile MalwareReport. Half-Year Report July December 2013. G Data SecurityLabs
G Data Mobile MalwareReport Half-Year Report July December 2013 G Data SecurityLabs Contents At a glance... 2 Android malware: share of PUPs increasing significantly... 3 Android.Application consists of
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).
Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 4,900 new Android malware samples every day 04-04 Half of Android malware is
Terms and Conditions
Terms and Conditions 1. About Us 1.1 www.phonefinder.co.za ("the Website") Phonefinder is an online cellular lead generation website, which enables users ("you, your") to enter their contact information
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
You are authorised to view and download one copy to a local hard drive or disk, print and make copies of such printouts, provided that:
Terms of Use The Standard Bank of South Africa Limited ( Standard Bank ) maintains this demonstration trading platform (the "Demo Trading Platform") and the virtual services/products ("Virtual Services")
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
G DATA MOBILE MALWARE REPORT
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q2/2015 1 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 6,100 new Android malware instances every day 04-04 Monitoring apps on mobile
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
Mobile Malware and Spyware: Working Through the Bugs. Detective Cindy Murphy 608-267-8824 [email protected]
Mobile Malware and Spyware: Working Through the Bugs Detective Cindy Murphy 608-267-8824 [email protected] The Mobile Malware Threat 155% increase in mobile malware from 2010 to 2011 614% increase
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Terms & Conditions Template
Terms & Conditions Template AGREEMENT BETWEEN USER AND [INSERT NAME] [INSERT NAME] Web Site is comprised of various Web pages operated by [INSERT NAME]. The [INSERT NAME] Web Site is offered to you conditioned
GFI White Paper. How Web Reputation increases your online protection
GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
The Police Trojan AN IN-DEPTH ANALYSIS
Trend Micro Research Paper 2012 The Police Trojan AN IN-DEPTH ANALYSIS By: David Sancho and Feike Hacquebord CONTENTS Introduction... 1 Technical Analysis... 1 Technical Findings... 4 Network Analysis...
App Terms and Conditions!
1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
Rogue DNS servers a case study
Rogue DNS servers a case study Feike Hacquebord Forward Looking Threat Research, Trend Micro Cupertino, CA, USA [email protected] Contents Introduction to DNS DNS Changer Trojans Rogue
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
