2019 Annual Security Roundup: The Sprawling Reach of Complex Threats
Common Information
Type | Value |
---|---|
UUID | 72158fcf-311a-43c8-ac32-0680c38f00a9 |
Fingerprint | c1c9a15500f99132be8a5ade4634d06900947c5ab1b498abb5696b4ac7ea9243 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Feb. 21, 2020, 4:15 p.m. |
Added to db | April 14, 2024, 10:42 a.m. |
Last updated | Aug. 30, 2024, 10:50 p.m. |
Headline | 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats |
Title | 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats |
Detected Hints/Tags/Attributes | 443/4/224 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 197 | cve-2019-0708 |
|
Details | CVE | 73 | cve-2014-8361 |
|
Details | CVE | 3 | cve-2019-8519 |
|
Details | CVE | 5 | cve-2019-8635 |
|
Details | CVE | 92 | cve-2018-4878 |
|
Details | CVE | 106 | cve-2018-8174 |
|
Details | CVE | 16 | cve-2019-0752 |
|
Details | CVE | 59 | cve-2018-15982 |
|
Details | CVE | 1 | cve-2017-2885 |
|
Details | CVE | 57 | cve-2014-6271 |
|
Details | CVE | 20 | cve-2014-7169 |
|
Details | CVE | 2 | cve-2019-6445 |
|
Details | CVE | 5 | cve-2017-11815 |
|
Details | CVE | 2 | cve-2019-6443 |
|
Details | CVE | 2 | cve-2015-0297 |
|
Details | CVE | 2 | cve-2009-1536 |
|
Details | CVE | 4 | cve-2010-2730 |
|
Details | CVE | 21 | cve-2017-0147 |
|
Details | CVE | 3 | cve-2014-0098 |
|
Details | CVE | 1 | cve-2018-122270 |
|
Details | CVE | 28 | cve-2017-9805 |
|
Details | CVE | 122 | cve-2017-5638 |
|
Details | CVE | 15 | cve-2014-6277 |
|
Details | CVE | 17 | cve-2014-6278 |
|
Details | CVE | 9 | cve-2015-8562 |
|
Details | CVE | 22 | cve-2014-0224 |
|
Details | CVE | 15 | cve-2018-8414 |
|
Details | CVE | 3 | cve-2009-2532 |
|
Details | CVE | 4 | cve-2017-14100 |
|
Details | CVE | 117 | cve-2018-0802 |
|
Details | CVE | 58 | cve-2018-0798 |
|
Details | CVE | 1 | cve-2019-11246 |
|
Details | Domain | 245 | shutterstock.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 24 | duo.com |
|
Details | Domain | 89 | arstechnica.com |
|
Details | Domain | 9 | blog.emsisoft.com |
|
Details | Domain | 1 | go.sentinelone.com |
|
Details | Domain | 27 | apnews.com |
|
Details | Domain | 3 | www.foxbusiness.com |
|
Details | Domain | 71 | news.sophos.com |
|
Details | Domain | 31 | blog.morphisec.com |
|
Details | Domain | 177 | www.wired.com |
|
Details | Domain | 13 | www.boho.or.kr |
|
Details | Domain | 3 | filedownload.do |
|
Details | Domain | 24 | www.businesswire.com |
|
Details | Domain | 3 | office365itpros.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 18 | blog.trendmicro.co.jp |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 3 | pdf.ic3.gov |
|
Details | Domain | 1 | www.oregonlive.com |
|
Details | Domain | 145 | threatpost.com |
|
Details | Domain | 216 | www.symantec.com |
|
Details | Domain | 80 | portal.msrc.microsoft.com |
|
Details | Domain | 175 | www.zdnet.com |
|
Details | Domain | 16 | searchsecurity.techtarget.com |
|
Details | Domain | 167 | www.ic3.gov |
|
Details | Domain | 368 | microsoft.com |
|
Details | Domain | 1 | netmarketshare.com |
|
Details | Domain | 128 | support.microsoft.com |
|
Details | Domain | 62 | www.zerodayinitiative.com |
|
Details | Domain | 16 | www.marketsandmarkets.com |
|
Details | Domain | 84 | www.forbes.com |
|
Details | Domain | 138 | www.darkreading.com |
|
Details | Domain | 67 | citizenlab.ca |
|
Details | Domain | 57 | www.clearskysec.com |
|
Details | Domain | 60 | documents.trendmicro.com |
|
Details | Domain | 8 | www.marketwatch.com |
|
Details | Domain | 30 | fortune.com |
|
Details | Domain | 2 | blog.confiant.com |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | File | 2125 | cmd.exe |
|
Details | File | 6 | exe.pdf |
|
Details | File | 68 | mscoree.dll |
|
Details | File | 3 | schost.exe |
|
Details | File | 3 | fortiavat.exe |
|
Details | File | 1122 | svchost.exe |
|
Details | File | 1 | russia-hacking-disinformation-election.html |
|
Details | File | 1 | ransomware%20research%20data%20summary%202018.pdf |
|
Details | File | 1 | epf2235.pdf |
|
Details | File | 2 | ic3report.pdf |
|
Details | File | 1 | million.html |
|
Details | File | 1 | 180927.aspx |
|
Details | File | 2 | operating-system-market-share.aspx |
|
Details | File | 1 | scada-market-19487518.html |
|
Details | File | 4 | data.pdf |
|
Details | File | 1 | leak-analysis-and-overview.pdf |
|
Details | File | 1 | wp_new_muddywater_findings_uncovered.pdf |
|
Details | File | 1 | wp-a-security-analysis-of-radio-remote-controllers.pdf |
|
Details | File | 1 | generativemalwareoutbreakdetection.pdf |
|
Details | File | 1 | features.pdf |
|
Details | md5 | 1 | 234360e2e36b424b8849e51e57fe53c5 |
|
Details | MITRE ATT&CK Techniques | 49 | T1193 |
|
Details | MITRE ATT&CK Techniques | 52 | T1195 |
|
Details | MITRE ATT&CK Techniques | 245 | T1203 |
|
Details | MITRE ATT&CK Techniques | 695 | T1059 |
|
Details | MITRE ATT&CK Techniques | 480 | T1053 |
|
Details | MITRE ATT&CK Techniques | 80 | T1064 |
|
Details | MITRE ATT&CK Techniques | 121 | T1218 |
|
Details | MITRE ATT&CK Techniques | 50 | T1072 |
|
Details | MITRE ATT&CK Techniques | 420 | T1204 |
|
Details | MITRE ATT&CK Techniques | 279 | T1060 |
|
Details | MITRE ATT&CK Techniques | 29 | T1088 |
|
Details | MITRE ATT&CK Techniques | 12 | T1009 |
|
Details | MITRE ATT&CK Techniques | 41 | T1089 |
|
Details | MITRE ATT&CK Techniques | 504 | T1140 |
|
Details | MITRE ATT&CK Techniques | 67 | T1107 |
|
Details | MITRE ATT&CK Techniques | 348 | T1036 |
|
Details | MITRE ATT&CK Techniques | 440 | T1055 |
|
Details | MITRE ATT&CK Techniques | 289 | T1003 |
|
Details | MITRE ATT&CK Techniques | 179 | T1087 |
|
Details | MITRE ATT&CK Techniques | 585 | T1083 |
|
Details | MITRE ATT&CK Techniques | 185 | T1518 |
|
Details | MITRE ATT&CK Techniques | 1006 | T1082 |
|
Details | MITRE ATT&CK Techniques | 100 | T1007 |
|
Details | MITRE ATT&CK Techniques | 492 | T1105 |
|
Details | MITRE ATT&CK Techniques | 17 | T1077 |
|
Details | MITRE ATT&CK Techniques | 111 | T1119 |
|
Details | MITRE ATT&CK Techniques | 534 | T1005 |
|
Details | MITRE ATT&CK Techniques | 67 | T1039 |
|
Details | MITRE ATT&CK Techniques | 219 | T1113 |
|
Details | MITRE ATT&CK Techniques | 60 | T1043 |
|
Details | MITRE ATT&CK Techniques | 22 | T1024 |
|
Details | MITRE ATT&CK Techniques | 96 | T1132 |
|
Details | MITRE ATT&CK Techniques | 75 | T1001 |
|
Details | MITRE ATT&CK Techniques | 141 | T1219 |
|
Details | MITRE ATT&CK Techniques | 444 | T1071 |
|
Details | MITRE ATT&CK Techniques | 23 | T1032 |
|
Details | MITRE ATT&CK Techniques | 149 | T1102 |
|
Details | MITRE ATT&CK Techniques | 422 | T1041 |
|
Details | MITRE ATT&CK Techniques | 24 | T1002 |
|
Details | MITRE ATT&CK Techniques | 28 | T1022 |
|
Details | MITRE ATT&CK Techniques | 23 | T1192 |
|
Details | MITRE ATT&CK Techniques | 306 | T1078 |
|
Details | MITRE ATT&CK Techniques | 41 | T1086 |
|
Details | MITRE ATT&CK Techniques | 48 | T1480 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 125 | T1110 |
|
Details | MITRE ATT&CK Techniques | 42 | T1040 |
|
Details | MITRE ATT&CK Techniques | 26 | T1065 |
|
Details | MITRE ATT&CK Techniques | 92 | T1048 |
|
Details | Threat Actor Identifier - APT | 181 | APT33 |
|
Details | Threat Actor Identifier - FIN | 73 | FIN6 |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/evasive- |
|
Details | Url | 16 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats |
|
Details | Url | 16 | https://www.trendmicro.com/vinfo/us |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/ransomware-bec- |
|
Details | Url | 14 | https://www.trendmicro.com/vinfo/us/security/news |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/maze-ransomware- |
|
Details | Url | 1 | https://duo.com/decipher/maze-turns-ransomware-incidents-into-data-breaches. |
|
Details | Url | 1 | https://arstechnica.com/information-technology/2019/11/louisiana-was-hit-by-ryuk- |
|
Details | Url | 3 | https://www.bleepingcomputer.com/news/security/ryuk- |
|
Details | Url | 4 | https://www.trendmicro.com/vinfo/us/security/news/cyber- |
|
Details | Url | 9 | https://www.nytimes |
|
Details | Url | 1 | https://blog.emsisoft.com/en/34822/the-state-of-ransomware-in-the-us-report-and- |
|
Details | Url | 1 | https://apnews.com/234360e2e36b424b8849e51e57fe53c5. |
|
Details | Url | 1 | https://www.foxbusiness.com/technology/ransomware-fbi-paying-cyber-criminals. |
|
Details | Url | 1 | https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-recap- |
|
Details | Url | 1 | https://blog.morphisec.com/connectwise-control-abused-again-to-deliver-zeppelin- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/what-you-need-to-know-about- |
|
Details | Url | 1 | https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/. |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/cryptomix-clop- |
|
Details | Url | 1 | https://www.boho.or.kr/filedownload.do?attach_file_seq=2235&attach_file_id=epf2235.pdf |
|
Details | Url | 1 | https://www.businesswire.com/news/home/20191219005130/en/trend-micro-cyber-risk-index- |
|
Details | Url | 1 | https://office365itpros.com/2019/10/24/office-365-hits-200-million-monthly-active-users/. |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/research-and-analysis |
|
Details | Url | 17 | https://blog.trendmicro.com |
|
Details | Url | 1 | https://blog.trendmicro.co.jp/archives/22696. |
|
Details | Url | 1 | https://www.microsoft.com/security/blog/2019/12/11/the-quiet-evolution-of-phishing/. |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/delving-into-the- |
|
Details | Url | 1 | https://pdf.ic3.gov/2019_ |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/bec-scammers-steal-us- |
|
Details | Url | 1 | https://www.oregonlive.com/education/2019/08/portland-public-schools-nearly-scammed-out-of-29- |
|
Details | Url | 13 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and- |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/colorado-town-wires-over-1-million-to- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/research-and-analysis/predictions/2019. |
|
Details | Url | 1 | https://threatpost.com/rsac-2019-bec-scammer-gang-takes-aim-at-boy- |
|
Details | Url | 1 | https://www.symantec.com/blogs/feature-stories/wannacry-lessons-learned-1-year-later. |
|
Details | Url | 1 | https://portal.msrc.microsoft.com/en-us/security-guidance/advisory |
|
Details | Url | 4 | https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and- |
|
Details | Url | 1 | https://www.zdnet.com/article/bad-rabbit-ransomware-spread- |
|
Details | Url | 1 | https://searchsecurity.techtarget.com/news/252466932/bluekeep-blues-more-than-800000-systems- |
|
Details | Url | 5 | https://www.microsoft.com/security |
|
Details | Url | 1 | https://www.ic3.gov/media/2018/180927.aspx |
|
Details | Url | 1 | https://portal.msrc |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/infosec-guide-remote- |
|
Details | Url | 1 | https://netmarketshare.com/operating-system-market-share.aspx?id=platformsdesktopversions |
|
Details | Url | 1 | https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020. |
|
Details | Url | 1 | https://www.zerodayinitiative.com/blog/2020/1/30/looking-back-at-the-zero-day-initiative- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/-the-iiot-attack-surface-threats-and- |
|
Details | Url | 1 | https://www.forbes.com/sites/forbestechcouncil/2019/11/18/the-5g-iot-revolution-is- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/mirai-variant- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/mirai-spawn-echobot-found- |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/back-to-back-campaigns-neko- |
|
Details | Url | 15 | https://blog.trendmicro.com/trendlabs-security-intelligence |
|
Details | Url | 1 | https://www.darkreading.com/endpoint/magecart-skimmers-spotted-on-2m-websites/d/d-id/1336011. |
|
Details | Url | 5 | https://blog.trendmicro |
|
Details | Url | 1 | https://blog.trendmicro.co.jp |
|
Details | Url | 1 | https://www.forbes.com/sites/tonybradley/2018/08/01/supply-chain-attacks-increase- |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/hiding-in-plain-text- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/monero- |
|
Details | Url | 12 | https://blog.trendmicro.com/trendlabs- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/security-technology/risks-under-the-radar- |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/fileless-cryptocurrency-miner-ghostminer-weaponizes-wmi- |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/emotet-ends-hiatus- |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/purple-fox-fileless-malware-with-rookit-component-delivered- |
|
Details | Url | 2 | https://documents.trendmicro |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/various-google-play-beauty-camera-apps-sends-users- |
|
Details | Url | 1 | https://citizenlab.ca/2019/09/poison-carp-tibetan-groups-targeted-with-1-click-mobile- |
|
Details | Url | 1 | https://www.clearskysec.com/wp-content/uploads/2019/05/iranian-nation-state-apt- |
|
Details | Url | 1 | https://documents.trendmicro.com/assets/white_papers/wp_new_muddywater_findings_uncovered.pdf |
|
Details | Url | 1 | https://www.marketwatch.com/story/apple-or-android-here-is-the-most-secure-phone-you-can- |
|
Details | Url | 1 | https://fortune.com/2018/09/29/apple-ios-12-iphone-security/. |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-8635-double-free-vulnerability-in-apple-macos-lets- |
|
Details | Url | 1 | https://blog.confiant.com/confiant-malwarebytes- |
|
Details | Url | 1 | https://blog.confiant.com/osx-shlayer-new-shurprise-unveiling-osx-tarmac-f965a32de887. |
|
Details | Url | 1 | https://blog.trendmicro.com/why-xdr-is-a-big-deal-and-is-different-from- |
|
Details | Url | 57 | https://attack.mitre.org |
|
Details | Url | 1 | https://documents.trendmicro.com/assets/white_papers/wp-a-security-analysis-of-radio-remote-controllers.pdf |
|
Details | Url | 7 | https://documents.trendmicro.com/assets/white_papers |
|
Details | Url | 26 | https://www.trendmicro.com |