Better Together: AWS and Trend Micro

This post relays the latest threat detection tool innovation of AWS – Amazon GuardDuty Malware Protection. This tool works closely with Trend Micro cloud solutions, providing another valuable layer of defense in our fight against a shared adversary.

Read more

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Credit to Author: Alfredo Oliveira| Date: Thu, 21 Jul 2022 00:00:00 +0000

In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking.

Read more

Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

Credit to Author: Magno Logan| Date: Thu, 07 Jul 2022 00:00:00 +0000

We investigate cloud-based cryptocurrency miners that leverage GitHub Actions and Azure virtual machines, including the cloud infrastructure and vulnerabilities that malicious actors exploit for easy monetary gain.

Read more

Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Credit to Author: Mohamed Fahmy| Date: Tue, 28 Jun 2022 00:00:00 +0000

We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration.

Read more

Why It’s Time to Map the Digital Attack Surface

Credit to Author: Bharat Mistry| Date: Mon, 06 Jun 2022 00:00:00 +0000

Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces.

Read more

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

Credit to Author: Magno Logan| Date: Tue, 24 May 2022 00:00:00 +0000

While researching cloud-native tools, our Shodan scan revealed over 200,000 publicly exposed Kubernetes clusters and kubelet ports that can be abused by criminals.

Read more