• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Cybercrime

A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm

  • Posted on:April 25, 2017
  • Posted in:Business, Cybercrime, Security, Vulnerabilities & Exploits
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0
It's critical to hire a CISO that has experience and can lead a team.

Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…

Read More

Pawn Storm: The Power of Social Engineering

  • Posted on:April 25, 2017
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

In our latest report on Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.), researchers expose the scope and scale of the cyber espionage group’s attacks but more importantly their cyber tradecraft. Our researchers have observed activity going back seven years targeting government, military, media, and political organizations around the world.  In this report our researchers…

Read More

Why Scammers Want Your Tax Returns (and how to stop them)

  • Posted on:April 13, 2017
  • Posted in:Cybercrime, Data Privacy, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0
Hackers very often have to handle a lot of money, and keep it away from the authorities.

It’s almost here – April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting more intelligent every year.    How it works Business Email Compromise (BEC) scams have been on the rise since 2016, and…

Read More

The Culture of Cybercrime in West Africa

  • Posted on:March 9, 2017
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our ongoing partnership with INTERPOL to provide survey data and a deeper understanding of the regions cybercriminal ecosystem. While tactics play a role in the success…

Read More

Threat Actors will come up with new Targeted Attack Tactics that Circumvent Current Anti-evasion Solutions

  • Posted on:January 31, 2017
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In the Trend Micro 2017 Security Predictions report, we cover many of the threats that organizations will have to deal with this year and none could be more challenging that a targeted attack. We recently saw a report from the Identity Theft Resource Center which said 2016 had the most data breaches in US history. Within…

Read More

Trend Micro Collaboration With Law Enforcement Makes The World Safer For Exchanging Digital Information

  • Posted on:December 5, 2016
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:
    Bob McArdle
0
Some notable arrests in the realm of cybercrime have taken place recently.

On December 1, an international law enforcement operation involving Europol, FBI, German law enforcement and others resulted in the dismantling of an international criminal infrastructure platform called ‘Avalanche.’ Avalanche was a content-delivery and management platform designed for the delivery of so called Bullet Proof Botnets, with more than 20 different malware families leveraging it to…

Read More

Risk and Reward of Alternative Payment Systems

  • Posted on:October 26, 2016
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

The explosive growth of alternative payment systems (APS) globally has posed great opportunities for businesses and consumers alike but equally has posed significant challenges for international law enforcement and regulators. Not only are we seeing innovation and disruptive technology from non-banking payment service providers growing out of Silicon Valley but we are also seeing traditional…

Read More

The French Cybercrime Underground Economy

  • Posted on:September 14, 2016
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:Christopher Budd (Global Threat Communications)
0

All crime reflects the culture that it happens in. Whether something is even a crime or not depends on the culture of where you are. What is perfectly legal in one country can be a serious crime in another. What makes the difference, generally, is the different cultures in those counties. Cultural reflections in crime…

Read More

Protect your Supply Chain with a Third-Party Risk Management Program

  • Posted on:March 15, 2016
  • Posted in:Business, Cybercrime, Executive Insight
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Over the last 20 years, technology advancements, globalization and the Internet have revolutionized business practices and efficiency. Supply chain management is one of the areas that has benefitted most, as companies can now work with suppliers and business partners around the world. The bad news is the same holds true for cybercriminals and their networks…

Read More

What Can Defenders Learn From VTech?

  • Posted on:December 2, 2015
  • Posted in:Cloud Security, Cybercrime, Hacks
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
A knight's shield standing upright (no background) in a sketched style

The breach of VTech by an unknown cyber-criminal continues to escalate. After initial reports of a breach exposing personally identifiable data of it’s customers (despite VTech’s statement otherwise), the hacker released a limited set of personal messages and photos from VTech customers to prove a near-complete compromise. It’s been a bad week for VTech. Make no mistake, VTech…

Read More
Tags: data securityincident response
Page 3 of 4 « ‹ 234 ›

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.