• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   CUES

The German Underground: Buying and Selling Goods via Droppers

  • Posted on:December 8, 2015 at 7:00 am
  • Posted in:Deep Web, Malware
  • Author:
    Trend Micro
0

We have frequently talked about how the Deep Web is used as a venue for the illegal trade in weapons and drugs. This part of the cybercrime underground includes a German-speaking community. Our new research examines these sites in some detail.

Read More
Tags: CUESDeep WebdroppingGerman underground

Prototype Nation: Emerging Innovations in Cybercriminal China

  • Posted on:November 23, 2015 at 4:57 am
  • Posted in:Malware
  • Author:
    Lion Gu (Senior Threat Researcher)
0

Cybercrime doesn’t wait for anything or anyone. Two years after publishing our last report on the wares and services traded in the bustling Chinese underground, we found that the market’s operations have further expanded. From traditional malware, Chinese cybercriminals are now looking toward newer innovations and technologies to boost their operations. The Chinese underground now…

Read More
Tags: ATM skimmerblack marketChinese cybercrimeChinese undergroundCUEScybercrimecybercriminal undergroundcybercriminal underground economy seriesPOS

Japanese Cybercriminals New Addition To Underground Arena

  • Posted on:October 13, 2015 at 5:03 am
  • Posted in:Bad Sites, Deep Web
  • Author:
    Akira Urano (Senior Threat Researcher)
0

Our research into various cybercriminal underground communities has taken us to Japan. The Japanese Underground looks into this growing community, with a particular focus on the items they sell, such as passports, firearms, and child pornography.

Over the years we have tracked cybercrime activity and targeted attacks in Japan. Japan is no stranger to cyber attacks and malware-related incidents—from recent malvertising attacks in early October to EMDIVI malware targeting Japan companies, and even to banking malware centered in the region in 2014. Despite these incidents and more, our research on the cybercrime underground in Japan shows that the underground economy is still fairly younger and smaller compared with its foreign counterparts.

Read More
Tags: CUESJapanjapanese cybercrime underground

The Russian Underground—Revamped

  • Posted on:July 28, 2015 at 6:09 am
  • Posted in:Deep Web, Malware
  • Author:
    Maxim Goncharov (Senior Threat Researcher)
0

When big breaches happen and hundreds of millions of credit card numbers and SSNs get stolen, they resurface in other places. The underground now offers a vast landscape of shops, where criminals can buy credit cards and other things at irresistible prices. Million dollar breaches News and media coverage on significant breaches are increasingly shaping…

Read More
Tags: CUEScybercriminal economyRussian underground

Localized Tools and Services, Prominent in the Brazilian Underground

  • Posted on:November 18, 2014 at 5:00 am
  • Posted in:Malware
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

In our monitoring of the global threat landscape, we tend to notice that countries sometimes are affiliated with a particular cybercriminal activity. One classic example is Brazil, which is known for its association with banking malware. As we noted in a previous blog entry, “[0]nline banking theft is especially rampant in the country, whose history of…

Read More
Tags: banking malwareBrazilBrazilian cybercriminal undergroundCUEScybercrimeCybercrime Underground Economy Seriesunderground
Page 1 of 212

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • Microsoft November 2019 Patch Tuesday Reveals 74 Patches Before Major Windows Update
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.