• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Robert McArdle (Senior Threat Researcher)

Robert McArdle

Senior Threat Researcher

Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration

  • Posted on:December 7, 2016
  • Posted in:Botnets, Malware
  • Posted by:
    Robert McArdle (Senior Threat Researcher)
0

On November 30th, an international law enforcement operation stamped out Avalanche, a large-scale content and management platform designed for the delivery of bullet-proof botnets. Avalanche’s scale and scope spanned victims from 180 countries, over 800,000 domains in 60+ top-level domains (TLD), more than one million phishing and spam e-mails, 500,000 infected machines worldwide, and 130TB of captured and analyzed data.

The coordinated effort from international law enforcement agencies that include Germany’s Public Prosecutor’s Office Verden and the Lüneburg Police, the U.S.’s Attorney Office for the Western District of Pennsylvania, Department of Justice and the Federal Bureau of Investigation (FBI), Europol, and Eurojust as well as partners in ShadowServer, resulted in one of the most successful anti-cybercrime operations in recent years.

Read More
Tags: Avalanchebanking malwarebotnetlaw enforcement

Is the Internet of Everything Under Attack?

  • Posted on:January 5, 2014
  • Posted in:Exploits, Internet of Things, Malware, Mobile
  • Posted by:
    Robert McArdle (Senior Threat Researcher)
0

The “Internet of Everything” (also known as the Internet of Things) became one of the biggest technology buzzwords of 2013, as can easily be seen in Google Trends. This term refers to the increased digitisation of everyday objects – any new technology device is being designed with connectivity in mind, whether that device is a smart…

Read More
Tags: Augmented RealityGoogle GlassInternet of ThingsSCADASteam Machine

A .BIT Odd

  • Posted on:November 19, 2013
  • Posted in:Bad Sites, Malware
  • Posted by:
    Robert McArdle (Senior Threat Researcher)
0

Like many security researchers, I see a lot of new malicious sites every week, far too many in fact. One thing that sets security researchers apart is that we can see a top-level domain (TLD) like .cc and recall instantly that it belongs to the Cocos Islands in the Indian Ocean, with a tiny population,…

Read More
Tags: .BITNameCoinTLDtop-level domain

Cybercrime in the Deep Web

  • Posted on:October 4, 2013
  • Posted in:Bad Sites
  • Posted by:
    Robert McArdle (Senior Threat Researcher)
0

Earlier, we published a blog post talking about the recent shut down of the Silk Road marketplace. There, we promised to release a new white paper looking at cybercrime activity on the Deep Web in more detail. This paper can now be found on our site here. While the Deep Web has often been uniquely associated…

Read More
Tags: Deep WebdeepwebRussian undergroundsilk roadunderground

Deep Web and Cybercrime – It Is Not Just the Silk Road

  • Posted on:October 3, 2013
  • Posted in:Bad Sites
  • Posted by:
    Robert McArdle (Senior Threat Researcher)
0

The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner…

Read More
Tags: arrestsDeep WebdeepwebFBIsilk roadTor
Page 1 of 1012 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.