Researchers at Trend Micro examined three years worth of malware from OnionDog — around 200 total samples — and found evidence that the malware was likely developed and used in joint U.S./South Korean military exercises.
Microsoft added that an unauthenticated attacker in an enterprise setting could remotely trigger the flaw through an SMB connection, which Trend Micro researchers said is "pretty close to wormable," referring to its spreadability.
The HITRUST Alliance and Trend Micro have announced a partnership to create the HITRUST Cyber Threat Management and Response Center, which will expand HITRUST’s cyber threat information sharing program for health care.
According to Gilbert Sison and Janus Agcaoili, two security researchers at Trend Micro, the most recent version of the Cerber ransomware can dump browser passwords and can steal files related to Bitcoin wallets.
Trend Micro researchers are keen to explain that there are malware that are fileless only while entering a user’s system (and they eventually reveal themselves when they execute their payload), and there are completely fileless malware attacks, where the entire infection chain is fileless.
"Every place we move to in technology creates a seam for bad actors," said Trend Micro's chief security officer, Ed Cabrera, whose company sells IT security services and issues reports on global cyber trends.