Defending the Expanding Attack Surface: Trend Micro 2022 Midyear Cybersecurity Report
Common Information
Type | Value |
---|---|
UUID | 343f5a56-3db6-438b-8374-087a72dbcac7 |
Fingerprint | 55a9864072dad57acbd4b120bd146705d9fc5beeab3c4acf8249cad6f00db186 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Sept. 20, 2022, 3:29 p.m. |
Added to db | April 14, 2024, 10:29 a.m. |
Last updated | Aug. 30, 2024, 10:47 p.m. |
Headline | Defending the Expanding Attack Surface: Trend Micro 2022 Midyear Cybersecurity Report |
Title | Defending the Expanding Attack Surface: Trend Micro 2022 Midyear Cybersecurity Report |
Detected Hints/Tags/Attributes | 327/3/224 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 1 | cve-2018-1337924 |
|
Details | CVE | 10 | cve-2018-13374 |
|
Details | CVE | 1 | cve-2021-3120731 |
|
Details | CVE | 4 | cve-2017-14100 |
|
Details | CVE | 3 | cve-2014-3567 |
|
Details | CVE | 2 | cve-2000-0884 |
|
Details | CVE | 172 | cve-2022-30190 |
|
Details | CVE | 3 | cve-2010-0817 |
|
Details | CVE | 3 | cve-2011-1264 |
|
Details | CVE | 25 | cve-2021-35394 |
|
Details | CVE | 3 | cve-2005-1380 |
|
Details | CVE | 3 | cve-2010-3936 |
|
Details | CVE | 4 | cve-2017-0068 |
|
Details | CVE | 11 | cve-2010-2861 |
|
Details | CVE | 2 | cve-2013-3336 |
|
Details | CVE | 22 | cve-2014-0224 |
|
Details | CVE | 1 | cve-2008-1451 |
|
Details | CVE | 45 | cve-2018-10562 |
|
Details | CVE | 397 | cve-2021-44228 |
|
Details | CVE | 87 | cve-2022-22965 |
|
Details | CVE | 7 | cve-2021-44142 |
|
Details | CVE | 1 | cve-2021-4422858 |
|
Details | CVE | 1 | cve-2021-4504659 |
|
Details | CVE | 6 | cve-2017-14495 |
|
Details | CVE | 2 | cve-2006-4154 |
|
Details | CVE | 1 | cve-2009-2524 |
|
Details | CVE | 4 | cve-2010-2730 |
|
Details | CVE | 6 | cve-2021-29441 |
|
Details | CVE | 3 | cve-2014-0098 |
|
Details | CVE | 122 | cve-2022-26134 |
|
Details | CVE | 6 | cve-2017-8543 |
|
Details | CVE | 5 | cve-2017-11815 |
|
Details | CVE | 4 | cve-2021-38425 |
|
Details | CVE | 8 | cve-2021-38429 |
|
Details | CVE | 6 | cve-2021-38487 |
|
Details | CVE | 4 | cve-2021-43547 |
|
Details | CVE | 6 | cve-2021-38447 |
|
Details | CVE | 6 | cve-2021-38445 |
|
Details | CVE | 4 | cve-2021-38423 |
|
Details | CVE | 4 | cve-2021-38435 |
|
Details | CVE | 4 | cve-2021-38439 |
|
Details | CVE | 4 | cve-2021-38427 |
|
Details | CVE | 4 | cve-2021-38433 |
|
Details | CVE | 4 | cve-2021-38443 |
|
Details | CVE | 4 | cve-2021-38441 |
|
Details | CVE | 1 | cve-2021-3844764 |
|
Details | CVE | 3 | cve-2022-22639 |
|
Details | CVE | 1 | cve-2022-2946472 |
|
Details | CVE | 23 | cve-2022-29464 |
|
Details | CVE | 150 | cve-2018-13379 |
|
Details | CVE | 31 | cve-2021-22986 |
|
Details | CVE | 128 | cve-2019-11510 |
|
Details | CVE | 15 | cve-2019-11539 |
|
Details | CVE | 21 | cve-2021-22893 |
|
Details | CVE | 161 | cve-2019-19781 |
|
Details | CVE | 19 | cve-2019-1579 |
|
Details | CVE | 77 | cve-2020-5902 |
|
Details | CVE | 24 | cve-2021-20016 |
|
Details | CVE | 2 | cve-2021-1609 |
|
Details | CVE | 2 | cve-2021-1610 |
|
Details | CVE | 217 | cve-2020-1472 |
|
Details | CVE | 143 | cve-2021-31207 |
|
Details | CVE | 67 | cve-2021-45046 |
|
Details | CVE | 34 | cve-2022-0847 |
|
Details | Domain | 245 | shutterstock.com |
|
Details | Domain | 19 | cve.org |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 47 | intel471.com |
|
Details | Domain | 60 | documents.trendmicro.com |
|
Details | Domain | 35 | www.europol.europa.eu |
|
Details | Domain | 6 | www.advintel.io |
|
Details | Domain | 20 | www.trustwave.com |
|
Details | Domain | 132 | trendmicro.com |
|
Details | Domain | 30 | fortune.com |
|
Details | Domain | 145 | threatpost.com |
|
Details | Domain | 1 | www.rnz.co.nz |
|
Details | Domain | 243 | cve.mitre.org |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 78 | securityaffairs.co |
|
Details | Domain | 224 | unit42.paloaltonetworks.com |
|
Details | Domain | 3 | www.fortunebusinessinsights.com |
|
Details | Domain | 338 | kaspersky.com |
|
Details | Domain | 59 | www.cybereason.com |
|
Details | Domain | 1373 | twitter.com |
|
Details | Domain | 41 | www.hhs.gov |
|
Details | Domain | 571 | www.cve.org |
|
Details | Domain | 469 | www.cisa.gov |
|
Details | Domain | 73 | techcrunch.com |
|
Details | Domain | 62 | www.zerodayinitiative.com |
|
Details | Domain | 177 | www.wired.com |
|
Details | Domain | 14 | www.samba.org |
|
Details | Domain | 2 | www.rti.com |
|
Details | Domain | 170 | support.apple.com |
|
Details | Domain | 55 | exploit.py |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 34 | packetstormsecurity.com |
|
Details | Domain | 1 | docs.wso2.com |
|
Details | Domain | 1 | pages.awscloud.com |
|
Details | Domain | 60 | www.gartner.com |
|
Details | Domain | 6 | www.globenewswire.com |
|
Details | Domain | 37 | www.redhat.com |
|
Details | Domain | 6 | www.watchguard.com |
|
Details | Domain | 9 | www.asus.com |
|
Details | Domain | 151 | www.bbc.com |
|
Details | File | 345 | vssadmin.exe |
|
Details | File | 3 | wp-operation-earth-berberoka.pdf |
|
Details | File | 3 | netdooka-framework-distributed-via-privateloader-ppi.html |
|
Details | File | 1 | predictions-for-2022.pdf |
|
Details | File | 1 | resurgence-of-the-emotet-botnet-malw.html |
|
Details | File | 2 | cyberattacks-are-prominent-in-the-russia-ukraine-conflict.html |
|
Details | File | 2 | apache-log4j-vulnerability.html |
|
Details | File | 1 | tesla-ave-maria-delivered-via-malspam.html |
|
Details | File | 1 | conti-ransomware-leak-shows-group-operates-like-normal-tech-company.html |
|
Details | File | 2 | blackcat-ransomware.html |
|
Details | File | 3 | new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html |
|
Details | File | 1 | routine.html |
|
Details | File | 1 | hive-ransomware-analyst-note-tlpwhite.pdf |
|
Details | File | 2 | nokoyawa-ransomware-possibly-related-to-hive-.html |
|
Details | File | 2 | cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html |
|
Details | File | 1 | spring4shell-exploited-to-deploy-cryptocurrency-miners.html |
|
Details | File | 64 | security.html |
|
Details | File | 1 | dnsmasq-reality-check-remediation-practices.html |
|
Details | File | 1 | distribution-service-dds-protocol.pdf |
|
Details | File | 1 | privilege-escalation-vulnerability-a-deep-di.html |
|
Details | File | 1 | of-local-vulnerabilities-through-trend-mi.html |
|
Details | File | 55 | exploit.py |
|
Details | File | 1 | wso-arbitrary-file-upload-remote-code-execution.html |
|
Details | File | 1 | patch-your-wso2-cve-2022-29464-exploited-to-install-linux-compatible-cobalt-strike-beacons-other-malware.html |
|
Details | File | 1 | benchmarking-study-quantifies-cloud-adoption-benefits.pdf |
|
Details | File | 2 | navigating-the-landscape-of-cloud-based-cryptocurrency-mining.pdf |
|
Details | File | 1 | scanning-and-brute-force.html |
|
Details | File | 2 | tracking-the-activities-of-teamtnt.pdf |
|
Details | File | 3 | analysis-of-kinsing-malwares-use-of-rootkit.html |
|
Details | File | 1 | analysis-of-a-convoluted-attack-chain-involving-ngrok.html |
|
Details | File | 1 | market-research.html |
|
Details | File | 1 | kubelets-analyzing-the-security-of-publicly-exposed-kubernetes-clusters.html |
|
Details | File | 4 | the-shared-responsibility-model.html |
|
Details | File | 1 | attack-surface-management.html |
|
Details | File | 7 | one-platform.html |
|
Details | File | 2 | cyclops-blink-sets-sights-on-asus-routers--.html |
|
Details | File | 1 | cryptocurrency%20scams%20and%20schemes.pdf |
|
Details | File | 1 | credentials--crypto-related-keys.html |
|
Details | Github username | 2 | hakivvi |
|
Details | IPv4 | 1 | 4.13.17.56 |
|
Details | MITRE ATT&CK Techniques | 7 | T0804 |
|
Details | MITRE ATT&CK Techniques | 8 | T0814 |
|
Details | MITRE ATT&CK Techniques | 9 | T0827 |
|
Details | MITRE ATT&CK Techniques | 5 | T0880 |
|
Details | MITRE ATT&CK Techniques | 3 | T0802 |
|
Details | MITRE ATT&CK Techniques | 6 | T0846 |
|
Details | MITRE ATT&CK Techniques | 5 | T0856 |
|
Details | MITRE ATT&CK Techniques | 6 | T0862 |
|
Details | MITRE ATT&CK Techniques | 7 | T0839 |
|
Details | MITRE ATT&CK Techniques | 7 | T0873 |
|
Details | Url | 1 | https://www.trendmicro.com/explore/trend_global_risk_research_2/the-challenge- |
|
Details | Url | 2 | https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/a/earth-lusca-employs- |
|
Details | Url | 2 | https://documents.trendmicro |
|
Details | Url | 2 | https://www.trendmicro.com/en_us/research/22/e |
|
Details | Url | 1 | https://intel471.com/blog/privateloader-malware. |
|
Details | Url | 1 | https://documents.trendmicro.com/assets/rpt/rpt-toward-a-new-momentum-trend-micro-security- |
|
Details | Url | 1 | https://www.europol.europa.eu/media-press/newsroom/news/world%e2%80%99s-most-dangerous-malware- |
|
Details | Url | 1 | https://success.trendmicro.com/dcx/s/solution/1118391-malware-awareness-emotet-resurgence?language=en_ |
|
Details | Url | 1 | https://www.advintel.io/post/corporate-loader-emotet-history-of-x-project- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/e/bruised-but-not-broken--the- |
|
Details | Url | 2 | https://www.trendmicro.com/en_us/research/22/c/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.html |
|
Details | Url | 1 | https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/stormous-the- |
|
Details | Url | 4 | https://unit42.paloaltonetworks |
|
Details | Url | 1 | https://fortune.com/2022/04/11/anonymous-cyber-war-russia- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/19/j/autoit-compiled-negasteal-agent- |
|
Details | Url | 25 | https://www.trendmicro |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/ph/security/news/ransomware-by-the-numbers |
|
Details | Url | 1 | https://threatpost.com/accenture-lockbit-ransomware-attack/168594/. |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/addressing-threats-like-ryuk-via-trend- |
|
Details | Url | 1 | https://www.rnz.co.nz/news/national/442795/waikato-hospitals-hit-by-cyber-security-incident. |
|
Details | Url | 106 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/conti-ransomware-now-hacking- |
|
Details | Url | 2 | https://www.cnbc |
|
Details | Url | 1 | https://securityaffairs.co/wordpress/125459/cyber-crime/blackcat-ransomware.html |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/blackcat-ransomware/. |
|
Details | Url | 1 | https://www.fortunebusinessinsights.com |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/babuk-ransomwares-full-source-code- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/e/examining-the-black-basta-ransomwares-infection- |
|
Details | Url | 1 | https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware. |
|
Details | Url | 1 | https://twitter.com/malwrhunterteam/status/1519301421958578177. |
|
Details | Url | 1 | https://www.hhs.gov/sites/default/files/hive-ransomware-analyst-note-tlpwhite.pdf |
|
Details | Url | 2 | https://www.trendmicro.com/en_us/research/22/c/nokoyawa-ransomware-possibly-related-to-hive-.html |
|
Details | Url | 1 | https://www.cve.org/about/metrics#publishedcverecords |
|
Details | Url | 1 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog. |
|
Details | Url | 1 | https://techcrunch.com/2022/06/01/china-backed-hackers-are-exploiting-unpatched-microsoft-zero-day/. |
|
Details | Url | 1 | https://www.zerodayinitiative.com/blog/2022/6/14/the-june-2022-security-update-review. |
|
Details | Url | 1 | https://www.trendmicro.com/en_ph |
|
Details | Url | 15 | https://www.trendmicro.com/en_us |
|
Details | Url | 1 | https://www.zerodayinitiative.com/blog/2022/2/1/cve- |
|
Details | Url | 1 | https://www.samba.org/samba/history |
|
Details | Url | 1 | https://www.trendmicro.com/en_ph/research/17/j/dnsmasq-reality-check-remediation-practices.html |
|
Details | Url | 1 | https://www.rti.com/products/dds-standard#: |
|
Details | Url | 1 | https://documents.trendmicro.com/assets/white_papers/wp-a-security-analysis-of-the-data- |
|
Details | Url | 3 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021 |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/d/detecting-exploitation- |
|
Details | Url | 1 | https://www.cisa.gov/uscert/ncas/current- |
|
Details | Url | 1 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022 |
|
Details | Url | 1 | https://github.com/hakivvi |
|
Details | Url | 1 | https://packetstormsecurity.com/files/166921/wso-arbitrary-file-upload-remote-code-execution.html |
|
Details | Url | 1 | https://docs.wso2.com |
|
Details | Url | 1 | https://pages.awscloud.com/rs/112-tzm-766/images/cloud-value- |
|
Details | Url | 1 | https://www.gartner.com/en/newsroom/press-releases/2022-04-19-gartner- |
|
Details | Url | 5 | https://documents.trendmicro.com/assets/white_papers/wp- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/18/k/outlaw-group-distributes-botnet-for-cryptocurrency-mining- |
|
Details | Url | 3 | https://www.trendmicro.com/en_us/research/20/k/analysis-of-kinsing-malwares-use-of-rootkit.html |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/hackers-start-pushing-malware-in- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/how-cybercriminals-abuse- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/20/i/analysis-of-a-convoluted-attack-chain-involving-ngrok.html |
|
Details | Url | 2 | https://www.globenewswire.com/news- |
|
Details | Url | 4 | https://www.trendmicro.com/vinfo/us/security/news/security-technology/container-security- |
|
Details | Url | 1 | https://www.redhat.com/en/resources/kubernetes-adoption-security-market-trends-overview. |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/e/the-fault-in-our- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/ciso/22/d/attack-surface-management.html |
|
Details | Url | 2 | https://www.trendmicro.com/en_us/research/22/c/cyclops-blink-sets-sights-on-asus-routers--.html |
|
Details | Url | 1 | https://www.watchguard.com/wgrd-news/blog/important-detection-and-remediation- |
|
Details | Url | 1 | https://www.asus.com/content/asus- |
|
Details | Url | 1 | https://www.bbc.com/news/technology-61796155. |
|
Details | Url | 1 | https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/c/an-investigation- |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/e/fake-mobile-apps-steal-facebook- |