Defending the Expanding Attack Surface: Trend Micro 2022 Midyear Cybersecurity Report
Image Description
Common Information
Type Value
UUID 343f5a56-3db6-438b-8374-087a72dbcac7
Fingerprint 55a9864072dad57acbd4b120bd146705d9fc5beeab3c4acf8249cad6f00db186
Analysis status DONE
Considered CTI value 2
Text language
Published Sept. 20, 2022, 3:29 p.m.
Added to db April 14, 2024, 10:29 a.m.
Last updated Aug. 30, 2024, 10:47 p.m.
Headline Defending the Expanding Attack Surface: Trend Micro 2022 Midyear Cybersecurity Report
Title Defending the Expanding Attack Surface: Trend Micro 2022 Midyear Cybersecurity Report
Detected Hints/Tags/Attributes 327/3/224
Attributes
Details Type #Events CTI Value
Details CVE 1
cve-2018-1337924
Details CVE 10
cve-2018-13374
Details CVE 1
cve-2021-3120731
Details CVE 4
cve-2017-14100
Details CVE 3
cve-2014-3567
Details CVE 2
cve-2000-0884
Details CVE 172
cve-2022-30190
Details CVE 3
cve-2010-0817
Details CVE 3
cve-2011-1264
Details CVE 25
cve-2021-35394
Details CVE 3
cve-2005-1380
Details CVE 3
cve-2010-3936
Details CVE 4
cve-2017-0068
Details CVE 11
cve-2010-2861
Details CVE 2
cve-2013-3336
Details CVE 22
cve-2014-0224
Details CVE 1
cve-2008-1451
Details CVE 45
cve-2018-10562
Details CVE 397
cve-2021-44228
Details CVE 87
cve-2022-22965
Details CVE 7
cve-2021-44142
Details CVE 1
cve-2021-4422858
Details CVE 1
cve-2021-4504659
Details CVE 6
cve-2017-14495
Details CVE 2
cve-2006-4154
Details CVE 1
cve-2009-2524
Details CVE 4
cve-2010-2730
Details CVE 6
cve-2021-29441
Details CVE 3
cve-2014-0098
Details CVE 122
cve-2022-26134
Details CVE 6
cve-2017-8543
Details CVE 5
cve-2017-11815
Details CVE 4
cve-2021-38425
Details CVE 8
cve-2021-38429
Details CVE 6
cve-2021-38487
Details CVE 4
cve-2021-43547
Details CVE 6
cve-2021-38447
Details CVE 6
cve-2021-38445
Details CVE 4
cve-2021-38423
Details CVE 4
cve-2021-38435
Details CVE 4
cve-2021-38439
Details CVE 4
cve-2021-38427
Details CVE 4
cve-2021-38433
Details CVE 4
cve-2021-38443
Details CVE 4
cve-2021-38441
Details CVE 1
cve-2021-3844764
Details CVE 3
cve-2022-22639
Details CVE 1
cve-2022-2946472
Details CVE 23
cve-2022-29464
Details CVE 150
cve-2018-13379
Details CVE 31
cve-2021-22986
Details CVE 128
cve-2019-11510
Details CVE 15
cve-2019-11539
Details CVE 21
cve-2021-22893
Details CVE 161
cve-2019-19781
Details CVE 19
cve-2019-1579
Details CVE 77
cve-2020-5902
Details CVE 24
cve-2021-20016
Details CVE 2
cve-2021-1609
Details CVE 2
cve-2021-1610
Details CVE 217
cve-2020-1472
Details CVE 143
cve-2021-31207
Details CVE 67
cve-2021-45046
Details CVE 34
cve-2022-0847
Details Domain 245
shutterstock.com
Details Domain 19
cve.org
Details Domain 604
www.trendmicro.com
Details Domain 47
intel471.com
Details Domain 60
documents.trendmicro.com
Details Domain 35
www.europol.europa.eu
Details Domain 6
www.advintel.io
Details Domain 20
www.trustwave.com
Details Domain 132
trendmicro.com
Details Domain 30
fortune.com
Details Domain 145
threatpost.com
Details Domain 1
www.rnz.co.nz
Details Domain 243
cve.mitre.org
Details Domain 251
www.bleepingcomputer.com
Details Domain 78
securityaffairs.co
Details Domain 224
unit42.paloaltonetworks.com
Details Domain 3
www.fortunebusinessinsights.com
Details Domain 338
kaspersky.com
Details Domain 59
www.cybereason.com
Details Domain 1373
twitter.com
Details Domain 41
www.hhs.gov
Details Domain 571
www.cve.org
Details Domain 469
www.cisa.gov
Details Domain 73
techcrunch.com
Details Domain 62
www.zerodayinitiative.com
Details Domain 177
www.wired.com
Details Domain 14
www.samba.org
Details Domain 2
www.rti.com
Details Domain 170
support.apple.com
Details Domain 55
exploit.py
Details Domain 4127
github.com
Details Domain 34
packetstormsecurity.com
Details Domain 1
docs.wso2.com
Details Domain 1
pages.awscloud.com
Details Domain 60
www.gartner.com
Details Domain 6
www.globenewswire.com
Details Domain 37
www.redhat.com
Details Domain 6
www.watchguard.com
Details Domain 9
www.asus.com
Details Domain 151
www.bbc.com
Details File 345
vssadmin.exe
Details File 3
wp-operation-earth-berberoka.pdf
Details File 3
netdooka-framework-distributed-via-privateloader-ppi.html
Details File 1
predictions-for-2022.pdf
Details File 1
resurgence-of-the-emotet-botnet-malw.html
Details File 2
cyberattacks-are-prominent-in-the-russia-ukraine-conflict.html
Details File 2
apache-log4j-vulnerability.html
Details File 1
tesla-ave-maria-delivered-via-malspam.html
Details File 1
conti-ransomware-leak-shows-group-operates-like-normal-tech-company.html
Details File 2
blackcat-ransomware.html
Details File 3
new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
Details File 1
routine.html
Details File 1
hive-ransomware-analyst-note-tlpwhite.pdf
Details File 2
nokoyawa-ransomware-possibly-related-to-hive-.html
Details File 2
cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html
Details File 1
spring4shell-exploited-to-deploy-cryptocurrency-miners.html
Details File 64
security.html
Details File 1
dnsmasq-reality-check-remediation-practices.html
Details File 1
distribution-service-dds-protocol.pdf
Details File 1
privilege-escalation-vulnerability-a-deep-di.html
Details File 1
of-local-vulnerabilities-through-trend-mi.html
Details File 55
exploit.py
Details File 1
wso-arbitrary-file-upload-remote-code-execution.html
Details File 1
patch-your-wso2-cve-2022-29464-exploited-to-install-linux-compatible-cobalt-strike-beacons-other-malware.html
Details File 1
benchmarking-study-quantifies-cloud-adoption-benefits.pdf
Details File 2
navigating-the-landscape-of-cloud-based-cryptocurrency-mining.pdf
Details File 1
scanning-and-brute-force.html
Details File 2
tracking-the-activities-of-teamtnt.pdf
Details File 3
analysis-of-kinsing-malwares-use-of-rootkit.html
Details File 1
analysis-of-a-convoluted-attack-chain-involving-ngrok.html
Details File 1
market-research.html
Details File 1
kubelets-analyzing-the-security-of-publicly-exposed-kubernetes-clusters.html
Details File 4
the-shared-responsibility-model.html
Details File 1
attack-surface-management.html
Details File 7
one-platform.html
Details File 2
cyclops-blink-sets-sights-on-asus-routers--.html
Details File 1
cryptocurrency%20scams%20and%20schemes.pdf
Details File 1
credentials--crypto-related-keys.html
Details Github username 2
hakivvi
Details IPv4 1
4.13.17.56
Details MITRE ATT&CK Techniques 7
T0804
Details MITRE ATT&CK Techniques 8
T0814
Details MITRE ATT&CK Techniques 9
T0827
Details MITRE ATT&CK Techniques 5
T0880
Details MITRE ATT&CK Techniques 3
T0802
Details MITRE ATT&CK Techniques 6
T0846
Details MITRE ATT&CK Techniques 5
T0856
Details MITRE ATT&CK Techniques 6
T0862
Details MITRE ATT&CK Techniques 7
T0839
Details MITRE ATT&CK Techniques 7
T0873
Details Url 1
https://www.trendmicro.com/explore/trend_global_risk_research_2/the-challenge-
Details Url 2
https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/a/earth-lusca-employs-
Details Url 2
https://documents.trendmicro
Details Url 2
https://www.trendmicro.com/en_us/research/22/e
Details Url 1
https://intel471.com/blog/privateloader-malware.
Details Url 1
https://documents.trendmicro.com/assets/rpt/rpt-toward-a-new-momentum-trend-micro-security-
Details Url 1
https://www.europol.europa.eu/media-press/newsroom/news/world%e2%80%99s-most-dangerous-malware-
Details Url 1
https://success.trendmicro.com/dcx/s/solution/1118391-malware-awareness-emotet-resurgence?language=en_
Details Url 1
https://www.advintel.io/post/corporate-loader-emotet-history-of-x-project-
Details Url 1
https://www.trendmicro.com/en_us/research/22/e/bruised-but-not-broken--the-
Details Url 2
https://www.trendmicro.com/en_us/research/22/c/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.html
Details Url 1
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/stormous-the-
Details Url 4
https://unit42.paloaltonetworks
Details Url 1
https://fortune.com/2022/04/11/anonymous-cyber-war-russia-
Details Url 1
https://www.trendmicro.com/en_us/research/19/j/autoit-compiled-negasteal-agent-
Details Url 25
https://www.trendmicro
Details Url 1
https://www.trendmicro.com/vinfo/ph/security/news/ransomware-by-the-numbers
Details Url 1
https://threatpost.com/accenture-lockbit-ransomware-attack/168594/.
Details Url 1
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/addressing-threats-like-ryuk-via-trend-
Details Url 1
https://www.rnz.co.nz/news/national/442795/waikato-hospitals-hit-by-cyber-security-incident.
Details Url 106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve
Details Url 1
https://www.bleepingcomputer.com/news/security/conti-ransomware-now-hacking-
Details Url 2
https://www.cnbc
Details Url 1
https://securityaffairs.co/wordpress/125459/cyber-crime/blackcat-ransomware.html
Details Url 1
https://unit42.paloaltonetworks.com/blackcat-ransomware/.
Details Url 1
https://www.fortunebusinessinsights.com
Details Url 1
https://www.bleepingcomputer.com/news/security/babuk-ransomwares-full-source-code-
Details Url 1
https://www.trendmicro.com/en_us/research/22/e/examining-the-black-basta-ransomwares-infection-
Details Url 1
https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware.
Details Url 1
https://twitter.com/malwrhunterteam/status/1519301421958578177.
Details Url 1
https://www.hhs.gov/sites/default/files/hive-ransomware-analyst-note-tlpwhite.pdf
Details Url 2
https://www.trendmicro.com/en_us/research/22/c/nokoyawa-ransomware-possibly-related-to-hive-.html
Details Url 1
https://www.cve.org/about/metrics#publishedcverecords
Details Url 1
https://www.cisa.gov/known-exploited-vulnerabilities-catalog.
Details Url 1
https://techcrunch.com/2022/06/01/china-backed-hackers-are-exploiting-unpatched-microsoft-zero-day/.
Details Url 1
https://www.zerodayinitiative.com/blog/2022/6/14/the-june-2022-security-update-review.
Details Url 1
https://www.trendmicro.com/en_ph
Details Url 15
https://www.trendmicro.com/en_us
Details Url 1
https://www.zerodayinitiative.com/blog/2022/2/1/cve-
Details Url 1
https://www.samba.org/samba/history
Details Url 1
https://www.trendmicro.com/en_ph/research/17/j/dnsmasq-reality-check-remediation-practices.html
Details Url 1
https://www.rti.com/products/dds-standard#:
Details Url 1
https://documents.trendmicro.com/assets/white_papers/wp-a-security-analysis-of-the-data-
Details Url 3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021
Details Url 1
https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root-
Details Url 1
https://www.trendmicro.com/en_us/research/22/d/detecting-exploitation-
Details Url 1
https://www.cisa.gov/uscert/ncas/current-
Details Url 1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022
Details Url 1
https://github.com/hakivvi
Details Url 1
https://packetstormsecurity.com/files/166921/wso-arbitrary-file-upload-remote-code-execution.html
Details Url 1
https://docs.wso2.com
Details Url 1
https://pages.awscloud.com/rs/112-tzm-766/images/cloud-value-
Details Url 1
https://www.gartner.com/en/newsroom/press-releases/2022-04-19-gartner-
Details Url 5
https://documents.trendmicro.com/assets/white_papers/wp-
Details Url 1
https://www.trendmicro.com/en_us/research/18/k/outlaw-group-distributes-botnet-for-cryptocurrency-mining-
Details Url 3
https://www.trendmicro.com/en_us/research/20/k/analysis-of-kinsing-malwares-use-of-rootkit.html
Details Url 1
https://www.bleepingcomputer.com/news/security/hackers-start-pushing-malware-in-
Details Url 1
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/how-cybercriminals-abuse-
Details Url 1
https://www.trendmicro.com/en_us/research/20/i/analysis-of-a-convoluted-attack-chain-involving-ngrok.html
Details Url 2
https://www.globenewswire.com/news-
Details Url 4
https://www.trendmicro.com/vinfo/us/security/news/security-technology/container-security-
Details Url 1
https://www.redhat.com/en/resources/kubernetes-adoption-security-market-trends-overview.
Details Url 1
https://www.trendmicro.com/en_us/research/22/e/the-fault-in-our-
Details Url 1
https://www.trendmicro.com/en_us/ciso/22/d/attack-surface-management.html
Details Url 2
https://www.trendmicro.com/en_us/research/22/c/cyclops-blink-sets-sights-on-asus-routers--.html
Details Url 1
https://www.watchguard.com/wgrd-news/blog/important-detection-and-remediation-
Details Url 1
https://www.asus.com/content/asus-
Details Url 1
https://www.bbc.com/news/technology-61796155.
Details Url 1
https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/c/an-investigation-
Details Url 1
https://www.trendmicro.com/en_us/research/22/e/fake-mobile-apps-steal-facebook-