• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Chinese underground

Prototype Nation: Emerging Innovations in Cybercriminal China

  • Posted on:November 23, 2015 at 4:57 am
  • Posted in:Malware
  • Author:
    Lion Gu (Senior Threat Researcher)
0

Cybercrime doesn’t wait for anything or anyone. Two years after publishing our last report on the wares and services traded in the bustling Chinese underground, we found that the market’s operations have further expanded. From traditional malware, Chinese cybercriminals are now looking toward newer innovations and technologies to boost their operations. The Chinese underground now…

Read More
Tags: ATM skimmerblack marketChinese cybercrimeChinese undergroundCUEScybercrimecybercriminal undergroundcybercriminal underground economy seriesPOS

Tracking Activity in the Chinese Mobile Underground

  • Posted on:November 13, 2014 at 4:04 pm
  • Posted in:Mobile
  • Author:
    Lion Gu (Senior Threat Researcher)
0

We first lifted the veil on activities in the Chinese cybercriminal underground in 2012. Since then, we have continually reported about notable changes or activity found in this black market. A few months ago, we noted that the Chinese underground has continued to grow, as the cost of connectivity and hardware continues to fall, and…

Read More
Tags: AVARChinese undergroundcybercriminal undergroundMobile

The Chinese Underground In 2013

  • Posted on:September 3, 2014 at 2:04 am
  • Posted in:Mobile
  • Author:
    Lion Gu (Senior Threat Researcher)
0

The Chinese underground has continued to grow since we last looked at it. It is still highly profitable, the cost of connectivity and hardware continues to fall, and there are more and more users with poor security precautions in place. In short, it is a good time to be a cybercriminal in China. So long as there is…

Read More
Tags: Chinese undergroundCUESCybercrime Underground Economy Series

A Tour Through The Chinese Underground

  • Posted on:October 29, 2013 at 8:59 am
  • Posted in:Malware
  • Author:
    Lion Gu (Senior Threat Researcher)
0

The Chinese underground has played host to many cybercriminals over the years. In the research brief titled Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market, we provide some details of the current state of the Chinese underground economy. Last year, we looked into this underground sector, and this brief is a continuation of those…

Read More
Tags: ChinaChinese undergroundcybercrimeDDoSphishing

The Chinese Underground, Part 6: Size and Scale

  • Posted on:September 7, 2012 at 5:01 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

This is part of a series of blog posts discussing the Chinese underground. The previous parts may be found here: Part 1: Introduction Part 2: The Four Value Chains Part 3: Virtual Assets Theft Part 4: Internet Resources And Services Abuse Part 5: Blackhat Techniques, Tools, and Training The full paper can be found here….

Read More
Tags: Chinese underground
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.