• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Martin Roesler (Director, Threat Research)

Martin Roesler

Director, Threat Research

EyePyramid and a Lesson on the Perils of Attribution

  • Posted on:January 30, 2017
  • Posted in:Malware
  • Posted by:
    Martin Roesler (Director, Threat Research)
0

In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe.

Read More
Tags: attributionEyePyramid

Law Enforcement and the Deep Web: Willing, but Underfunded

  • Posted on:July 28, 2016
  • Posted in:Deep Web
  • Posted by:
    Martin Roesler (Director, Threat Research)
0

As everyone knows by now, recently there have been some attacks in Germany that have people worried about their security. One question that comes up is – how were the attackers able to obtain their weapons?

In the recent Munich shooting, the attacker obtained his gun (a Glock 17 pistol) from an underground market. I was recently interviewed by the Handelblatt newspaper about underground markets.

Read More
Tags: Deep Webinvestigationlaw enforcement

The Long Arm of the Law: Multiple Cybercriminals Sent Behind Bars

  • Posted on:May 2, 2016
  • Posted in:Malware
  • Posted by:
    Martin Roesler (Director, Threat Research)
0

April 2016 was a great month for putting cybercriminals in prison. On April 12 Paunch, the creator of the infamous Blackhole exploit kit, was sentenced to seven years in a Russian prison. This was soon followed by Aleksandr Panin, the creator of SpyEye: he was sentenced by a United States federal court to nine and a half years in prison for his role in creating SpyEye. One of his partners, Hamza Bendelladj, was sentenced to fifteen years.

The most recent case involved Esthost, a company we know very well from our research. Vladimir Tsastsin became the latest member of the Esthost gang to be sentenced to jail; he will spend more than 7 years in prison. He was also ordered to forfeit more than $2.5 million in property.

Read More
Tags: arrestscybercrimelaw enforcement

What We Can Learn From the Bangladesh Central Bank Cyber Heist

  • Posted on:March 15, 2016
  • Posted in:Malware, Targeted Attacks
  • Posted by:
    Martin Roesler (Director, Threat Research)
0

The reported hacking of the Bangladesh central bank’s accounts with the U.S. Federal Reserve once again shows how bad the impact of cyberattacks to organizations, enterprises or even nation-states can be. Peel off all the other layers in this narrative for a moment—the amount of money stolen, the alleged players, the politics—and at its core, we have the same tactics and procedures any enterprising criminal will carry out against his or her intended target.

Read More
Tags: cybercrimecybercrime underground

Old-School Law Enforcement vs The Deep Web

  • Posted on:September 9, 2015
  • Posted in:Malware
  • Posted by:
    Martin Roesler (Director, Threat Research)
0

The Deep Web is back in the news. Agora, one of the biggest darknet marketplaces, announced two weeks ago that it will go offline to bolster its defenses against law enforcement agencies who want to take them down. Meanwhile, a Deep Web user was indicted on federal charges of drug trafficking and money laundering. These…

Read More
Tags: Deep Weblaw enforcementTorTor network
Page 1 of 412 › »

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • Microsoft November 2019 Patch Tuesday Reveals 74 Patches Before Major Windows Update
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.