• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   underground

Malware Targeting Bitcoin ATMs Pops Up in the Underground

  • Posted on:August 7, 2018 at 5:00 am
  • Posted in:Deep Web, Malware
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

With the increasing popularity and real-world use of cryptocurrencies and the fact that cybercriminals will always try to exploit something that can make money for them, it shouldn’t come as a surprise that malware targeting Bitcoin ATMs have started appearing in underground markets.

Read More
Tags: Bitcoin ATMMalwareunderground

WannaCry Ransomware Sold in the Middle Eastern and North African Underground

  • Posted on:October 10, 2017 at 5:01 am
  • Posted in:Deep Web, Malware, Ransomware
  • Author:
    Mayra Rosario Fuentes (Senior Threat Researcher)
0

For $50, one could purportedly get a lifetime license to upgradeable variants of WannaCry. We saw this advertisement in an Arabic-speaking underground forum on May 14, two days after WannaCry’s outbreak. Indeed, a threat that left a trail of significant damage in its wake was objectified into a commodity, and even a starting point for others to launch their own cybercriminal businesses.

WannaCry’s relatively low price also reflects another unique aspect of the Middle Eastern and North African underground: a sense of brotherhood. Unlike marketplaces in Russia and North America, for instance, where its players aim to make a profit, the Middle East and North Africa’s underground scene is an ironic juncture where culture, ideology, and cybercrime meet.

Read More
Tags: cybercrimeMiddle EastNorth Africaunderground

Business Process Compromise and the Underground’s Economy of Coupon Fraud

  • Posted on:September 28, 2017 at 5:03 am
  • Posted in:Bad Sites, Deep Web, Social
  • Author:
    Trend Micro Forward-Looking Threat Research Team
0

The fraudulent redemption of freebies, discounts, and rebates in the form of coupons is reportedly costing U.S. businesses $300–600 million every year. And where there’s money to be made, there are cybercriminals rustling up schemes to take advantage of it. Unsurprisingly, that was the case when it comes to coupon fraud, which we found to be rife and thriving in the underground.

What does coupon fraud mean for businesses? In 2012, major manufacturers were victimized by counterfeit coupons, with one consumer goods corporation pegging its losses to around $1.28 million. Another coupon fraud scheme almost a decade in the making stole at least $250 million from companies.

Read More
Tags: Business Process CompromiseCoupon Fraudunderground

Is West Africa Poised for an Underground Market?

  • Posted on:March 9, 2017 at 3:38 am
  • Posted in:Deep Web
  • Author:
    Trend Micro
0

Based on an INTERPOL survey, West African cybercriminals stole an average of US$2.7 million from businesses and an average of US$422,000 from individuals from 2013 to 2015. Scams, whether simple (like 419 or Nigerian prince scams) or complex (like business email compromise [BEC] scams), run rampant in the West African threat landscape. In fact, most of the online scams we see now may have to do with the increase in the region’s cybercriminal activity volume.

Read More
Tags: undergroundWest Africa

Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations

  • Posted on:May 3, 2016 at 5:00 am
  • Posted in:Deep Web
  • Author:
    Trend Micro
0

To answer the question we posed before: Yes, cybercriminals and terrorists are more similar than we think – they use similar platforms and services online, but also with some key differences.

Read More
Tags: cybercriminalsDeep Webencryptionterrorismterrorist organizationsterrorist technologiesunderground
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.