A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team)

Size: px
Start display at page:

Download "A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team)"

Transcription

1 A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team)

2 Contents Introduction...3 Ice IX as an Attack Vector...3 C&C Servers...4 Connection to Nigeria...5 Other Forms of Cybercrime...6 Phishing...6 Nigerian Scams...8 Suspects...11 Smith Samson...11 Peter Hollame...12 Peter Nzenwata...14 Organization Map...16 TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an as is condition. 2

3 Domain Ownership...17 Domains Registered with the Address, gmail. com...17 Domains Registered Under the name, Erica Rubalcaba...17 Domains Registered with the Address, hotmail. com...17 Domains Registered with the Address, yahoo. com...18 Domain Registered with the Address, yahoo. com...18 Attribution...19 Conclusion

4 Introduction Consistent with our prediction for Africa in 2013 and our research paper on developments in the continent s Internet infrastructure, this paper addresses cybercrime in the region, specifically a cybercrime gang that utilizes the banking Trojan, Ice IX. 1 We were able to learn how one of these cybercrime operations works. There did not appear to be a specific targeted country but the targets included India, the United States, and Germany, among others. Our research helped us determine that the cybercriminal gang is located in Nigeria, principally in Lagos, its most populous city. We were also able to identify certain key members of the operation. In this research paper, we also describe our findings on the toolkit the group uses, domain ownership, and other related scams. Ice IX as an Attack Vector Ice IX is one of the most notorious and dangerous crimeware today. While known as the first generation of modified ZeuS variants, Ice IX is a reiteration of the banking Trojan after its code was leaked in underground forums. 2 Ice IX is used to steal victims credentials or personally identifiable information (PII). These PII include user names and passwords for , Facebook, and/or online bank accounts. Similar to ZeuS and SpyEye, Ice IX also uses a webinject file. This webinject file contains several lines of JavaScript and HTML code to mimic or create fake pop-up messages that ask for the users credentials while they access the sites of their online banks. The cybercriminals behind this operation used Ice IX to collect the following information for later use: addresses: Cybercriminals use victims addresses to send out legitimatelooking spam and to have more convincing reply-to addresses. Bank account and credit card numbers: Cybercriminals can abuse these to pay off their own bills. They can also be sold underground. Webmail account credentials: Cybercriminals can use victims webmail accounts to send out spam with malicious attachments to further spread Ice IX or ZeuS variants. 1 Trend Micro Incorporated. (2013). Security Threats to Business, the Digital Lifestyle, and the Cloud: Trend Micro Predictions for 2013 and Beyond. Last accessed October 31, 2013, spotlight-articles/sp-trend-micro-predictions-for-2013-and-beyond.pdf; Loucif Kharouni. (2013). Africa: A New Safe Harbor for Cybercriminals? Last accessed October 31, 2013, 2 Jasper Manuel. (September 2, 2011). TrendLabs Security Intelligence Blog. ZeuS Gets Another Update. Last accessed October 31, 2013, 4

5 C&C Servers We located some of the cybercriminals command-and-control (C&C) servers using various techniques. We gathered all domains registered using the same address, which has been known to belong to one of the cybercriminals. Another technique used was to look for more C&C servers after gaining access to the gang s C&C control panel. We were also able to gather data on servers they either hijacked or owned based on the folder pattern, Whois records, and open source research. The following table shows some of the C&C servers we found. C&C Servers Hijacked http :// {BLOCKED}ver. be / web / adm / index. php Owned http :// {BLOCKED}. co. za / web1 / web / adm / index. php http :// {BLOCKED}malo. com / includes / colabo / web / adm / gate. php http :// {BLOCKED}. co. za / web / adm / index. php http :// {BLOCKED}king. com / web / adm / gate. php Here are screenshots of the C&C communications that show the number of infected machines. Note that each C&C server only had a few bots. Figure 1: Infection count per C&C server 5

6 Connection to Nigeria The infected machines in Nigeria were used to connect to Ice IX C&C servers. Based on the data gathered from the C&C logs, we discovered that the cybercriminals used the infected machines as SOCKS proxies to connect to different sites as well as other Ice IX control panels. Figure 2: Evidence that the cybercriminals used an infected machine as proxy to connect to a C&C server Figure 3: More machines in Nigeria used as proxies 6

7 It is still unclear why some cybercriminals used infected machines in Nigeria to carry out malicious activities. But we are absolutely certain that they operated from Nigeria based on various evidence gathered using techniques such as reviewing chat logs containing communications between different parties and tracking 4G connection subscriptions, which gave the IP address of the device they used. A possible explanation for this is that the cybercriminals may think using an infected machine is enough to cover their tracks, even though it is located in the same country. Other Forms of Cybercrime Figure 4: 4G connection session Apart from using the Ice IX banking Trojan, some members of the gang appeared to be involved with various phishing and Nigerian or 419 scams. Phishing pages helped them gather various victims PII. Phishing The cybercriminals appeared to use at least three different phishing page types. One type impersonated Scottrade. com, the site of a privately owned American discount retail brokerage firm that offers both online and branch office services. 7

8 Figure 5: Fake Scottrade site Another phishing sample impersonated the popular Korean search engine site, Daum. net. A famous online dating site, Match. com, was also phished. Figure 6: Fake Daum. net log-in page 8

9 Figure 7: Fake Match. com log-in page Nigerian Scams The cybercriminals also engaged in Nigerian or 419 scams, so named after the 419 Nigerian penal law that outlawed this particular type of fraud. 3 This type of scam requires making an upfront payment in exchange for a reward for helping officials of Nigerian government ministries or the family members of political leaders. Take a look at the following template of the sent to several people, which caused them to reply with personal information such as their bank account details and copies of their IDs. 3 United States Diplomatic Mission to Nigeria. Nigerian Advance Fee Fraud (419) Resources. Last accessed October 31, 2013, 9

10 Sir/Madam, I hope this proposal meets you in a good state of health. I need your help to transfer and invest S$15,000, that accumulated as undeclared profit made by this branch HFC Bank Ghana Limited under my management. All that is required to get the funds transferred out of here is to put your name on the Non-investment account holding the funds. This practically makes you a Non-Resident customer of HFC Bank. I will then guide you on how to apply for Closure of the Account and credit transfer of the funds to your designated bank account. You will get 40% of the funds for your role. If you get back to me with your physical,contact address, your photo id and direct telephone number, we will consummate the funds transter within one week. My Private is ee.empah3@aim.com Sincerely, Ampah Edward This template is sent out using a spamming tool known as a PHP mailer. The cybercriminals hold several lists of addresses for various countries. We have seen at least two of these lists with around 553,000 addresses from Canada and 490,000 from the United States. Figure 8: PHP mailer screenshot 10

11 Some of the addresses used in spamming include but are not limited to: aim. com aol. com live. com live. com The cybercriminals also include an accompanying ID to make the look more legitimate to potential victims. Figure 9: ID of supposed bank manager Once the cybercriminals lure a victim in, they redirect him or her to an agent from the supposed bank to handle the money transfer. The cybercriminals even created a domain (hfconline - gh. com) that closely mimicked that of the Ghana Bank (hfcbank. com. gh). The fake domain is, however, only used for ing purposes or for requesting victims to fill up a form and to send scanned copies of their IDs. We noticed that the cybercriminals have been employing the same scam using different topics. One topic dealt with claiming a cash deposit belonging to a late family member. Another topic used the Gaddafi fortune as hook, specifically the line, I am in control of US$15,000, deposited in my bank by the Libya, Gaddafi Family. The cybercriminals also took advantage of users via a supposed money transfer proposal from the Ghana Bank. 11

12 Suspects What is the connection between using a banking Trojan like Ice IX and 419 scams? The activities described earlier such as operating and spreading Ice IX Trojans and installing PHP mailer are not operated by just one person but by a group of individuals who work together. The attribution section will describe each individual s task and his or her involvement with the cybercriminal gang. The cybercriminals involved comprise a very large group mainly located in Lagos. Based on the information gathered, three key people have been identified. Smith Samson One of the cybercriminals who goes by the name, Smith Samson, possibly really Ofeoritse Abalagbeyi (Ofe), uses the following addresses: yahoo. com yahoo. com (linked to the Facebook account, https :// www. facebook. com / {BLOCKED}se. {BLOCKED}beyi) hotmail. com (linked to the Facebook account, https :// www. facebook. com / {BLOCKED}th. {BLOCKED}. 75) Figure 10: Facebook profile picture of Ofeoritse Abalagbeyi, also known as Smith Samson 12

13 Ofe takes care of hosting, creating domains for, and configuring Ice IX and ZeuS C&C servers for the gang. He sends information to someone called Peter Hollame, one of his Facebook contacts who uses the address, {BLOCKED}2 _ yahoo. com. Peter Hollame Searching for the address, {BLOCKED}2 _ yahoo. com, led to a certain profile on a Nigerian forum called nairaland. com. This gave some information about the user s location and gender. Figure 11: User profile found on nairaland. com Figure 12: Invisible. ir shows that {BLOCKED}2 _ yahoo. com signed in from Lagos, Nigeria 13

14 We also discovered some information on invisible. ir, a site that displays the Yahoo! Messenger status of any Yahoo! account holder. The site also shows where the user signs in from, which confirmed where the cybercriminal identified as Peter Hollame resides. Figure 13: {BLOCKED}2 _ u2 user pictures The user pictures above from invisible. ir show us the avatars Hollame used over time. We found a similar picture to the one on his Facebook profile. 14

15 Figure 14: Peter Hollame from Facebook account, https :// www. facebook. com / peter. hollame Hollame, just like Ofe, also uploads ZeuS and Ice IX malware to the gang s C&C servers (both hijacked and owned) and installs the control panel using the ZeuS toolkit provided by Ofe. In return, Hollame provides Ofe some mailer tools and credit card numbers. Hollame acts as middle man and communicates and works with another individual, Uzochukwu Nzenwata, also known as Peter Nzenwata. Peter Nzenwata Based on our investigation, Hollame appears to also provide mailer tools to a certain Peter Nzenwata so he can send out Nigerian scam s. Hollame also sends credit card information to Nzenwata to pay for the latter s phone and 4G connection bills. We also learned that Nzenwata moved to Ghana in 2008 but is currently back in Nigeria and is using 4G 1Mbps wireless access. It appears that Nzenwata heavily relies on his peers, as he has no control over the C&C servers, the mailer tools, and the list for spamming purposes. Below are the addresses Nzenwata appears to use: yahoo. com yahoo. com (linked to the Facebook account, https :// www. facebook. com / {BLOCKED}kwuInnocent) 15

16 Figure 15: Uzochukwu Nzenwata, also known as Peter Nzenwata Figure 16: Main people involved in the scams 16

17 Organization Map 17

18 Domain Ownership The Ice IX domains are all registered under the top-level domain (TLD), co. za, which is located in South Africa. Note that most of the domains listed below refer to C&C servers. Domains Registered with the Address, {BLOCKED} gmail. com {BLOCKED}dand. co. za {BLOCKED}ntfighting. co. za {BLOCKED}ls. co. za {BLOCKED}k. co. za {BLOCKED}regh. co. za Domains Registered Under the name, Erica Rubalcaba {BLOCKED}dew. net {BLOCKED}odand. co. za {BLOCKED}antfighting. co. za {BLOCKED}antfighting. net {BLOCKED}opls. co. za {BLOCKED}lock. co. za {BLOCKED}regh. co. za Domains Registered with the Address, {BLOCKED} hotmail. com {BLOCKED} - sa. com {BLOCKED}cng. net {BLOCKED}online. org {BLOCKED}w1. co. za 18

19 Domains Registered with the Address, {BLOCKED} yahoo. com {BLOCKED}aycbnk. net {BLOCKED}ghana. biz {BLOCKED}markcop. org {BLOCKED}stenderboard. com {BLOCKED}ample. com {BLOCKED}lsecuritycompany. org {BLOCKED}lx. co {BLOCKED}ls. info {BLOCKED}nesp. net {BLOCKED}inesp12. com {BLOCKED}perweels. com {BLOCKED}qw. com {BLOCKED}d - nation. net {BLOCKED}dnation. me {BLOCKED}ation. mobi Domain Registered with the Address, {BLOCKED} yahoo. com {BLOCKED}liacredithouse. net 19

20 Attribution We discovered the following list of URLs related to how the cybercriminals operate and manage their C&C servers. http :// {BLOCKED}er. be / web / adm / index. php http :// {BLOCKED}lo. com / includes / colabo / web / adm / gate. php http :// www. {BLOCKED}peruanskef. se / images / adm / index. php http :// {BLOCKED}ra. com / adm / gate. php http :// {BLOCKED}b. com / img / adm / gate. php http :// {BLOCKED}lo. com / includes / colabo / web / adm / gate. php http :// {BLOCKED} entialsservices. com / forms / adm / gate. php http :// {BLOCKED}under. biz / html / adm / gate. php http :// {BLOCKED}012mne. com / plugins / adm / gate. php http :// www. {BLOCKED}free. info / jss / adm / gate. php http :// {BLOCKED}essionalsolutions. com / contactus / adm / gate. php http :// www. {BLOCKED}seoul. tk / java / adm / gate. php http :// {BLOCKED}wi. it / language / adm / gate. php http :// {BLOCKED}ofttraining. tk / olive / adm / gate. php http :// {BLOCKED}. {BLOCKED} / ~inshowro / web / adm / gate. php http :// {BLOCKED}ls. co. za / 1 / gate. php http :// {BLOCKED}regh. co. za / web / config / index. php http :// {BLOCKED}odand. co. za / web / adm / index. php http :// {BLOCKED}ntfighting. co. za / web / adm / index. php http :// {BLOCKED}tfighting. net / web / adm / gate. php http :// {BLOCKED}ok. co. za / web1 / adm / index. php 20

21 http ://{BLOCKED}ok. co. za / web2 / adm / index. php http ://{BLOCKED}1. co. za / web1 / web / adm / index. php http ://{BLOCKED}1. co. za / web / adm / index. php http ://{BLOCKED}ing. com / web / adm / gate. php http :// tk / forum / adm / index. php http ://{BLOCKED}agu. tk / web / adm / index. php http ://{BLOCKED}1ok. co. za / serv / cp. php {BLOCKED}dand. co. za {BLOCKED}tfighting. co. za {BLOCKED}pls. co. za {BLOCKED}ck. co. za {BLOCKED}regh. co. za {BLOCKED}sdew. net {BLOCKED}dand. co. za {BLOCKED}antfighting. co. za {BLOCKED}ntfighting. net {BLOCKED}pls. co. za {BLOCKED}ck. co. za {BLOCKED}egh. co. za {BLOCKED}sa. com {BLOCKED}ng. net {BLOCKED}line. org {BLOCKED}1. co. za {BLOCKED}ycbnk. net 21

22 {BLOCKED}hana. biz {BLOCKED}arkcop. org {BLOCKED}tenderboard. com {BLOCKED}le. com {BLOCKED}alsecuritycompany. org {BLOCKED}lx. co {BLOCKED}ls. info {BLOCKED}sp. net {BLOCKED}sp12. com {BLOCKED}rweels. com {BLOCKED}w. com {BLOCKED}- nation. net {BLOCKED}nation. me {BLOCKED}nation. mobi {BLOCKED}liacredithouse. net Below is a list of the malware samples that appear to connect to the related C&C infrastructure. Malware Samples That Access the C&C Infrastructure Detection Name MD5 Hash TSPY_ZBOT.NEK d144c261790a8b2bb10f465deb97d7a c550ebc3977fc816f417d9d8eed 318f ec5a34a TSPY_ZBOT.UZS 78e07300b8355f5b046c5159fbce4d88 TSPY_ZBOT.SML9 8957b362028d8ddc378aecaaa97a0475 0ab85fa27224a9be29d3ab4b3f14797a 22

23 Conclusion Dealing with Africa as a new cybercrime harbor is a struggle that threat researchers now face. The three main members mentioned in this research paper are still at large and are continuing their operations. They are part of a larger group as shown by the organization map, which only represents a small portion of the whole underground community in Africa involved in this type of business. Several smaller 419 groups also engaged in this lucrative business. These individuals appear to be unconcerned with regard to covering their tracks because they think it would be hard for authorities to arrest them. It is interesting to see that these cybercriminals share tasks and specialize in specific areas such as hosting and creating domains and running the botnet. The other tasks concentrated on looking for addresses, working on the PHP mailers, and launching spam campaigns. Infiltrating different C&C servers and being able to search through their logs helped us identify some of the cybercriminals. We were also able to find other C&C servers that the bad guys used. These perpetrators appear to act swiftly as soon as their C&C servers get shut down they are always looking for vulnerable servers to install Ice IX Trojans on while creating new domains for the same reasons. They are well-organized and know their respective tasks. We noted that the perpetrators looked for the following: Vulnerable domains/servers to hijack and install banking Trojans on Vulnerable domains/servers to hijack and install PHP mailers on Fresh lists of addresses to spam There is no limit on how cybercriminals work with their peers. They appear to willingly share what they have and, in return, receive the information they need such as a list of addresses they call leads and an available and working PHP mailer. The number of cybercriminal activities targeting or originating from Africa will continue to rise. For instance, the Nigerian scam is still an attractive business, especially for jobless youth. In addition, Ice IX has been a welcome addition to cybercriminal operations for its reliability and stability. 23

24 Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For more information, visit by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners N. De Anza Blvd. Cupertino, CA U.S. toll free: Phone: Fax:

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

Email Correlation and Phishing

Email Correlation and Phishing A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...

More information

RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market

RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market RESEARCHBRIEF Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market Lion Gu After taking a grand tour of the Chinese underground market last year, let s revisit it and see what has

More information

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social. RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.

More information

43% Figure 1: Targeted Attack Campaign Diagram

43% Figure 1: Targeted Attack Campaign Diagram TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company

More information

Learn about each tool in parental controls and find out how you can use them to secure you and your family.

Learn about each tool in parental controls and find out how you can use them to secure you and your family. TrendLabs Parental controls are not just for your kids. Online threats, after all, affect everyone. Effective use of parental controls, combined with proper know-how on dealing with online threats, can

More information

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category

More information

This guide aims to get you started on decluttering the most important aspects of your digital life.

This guide aims to get you started on decluttering the most important aspects of your digital life. TrendLabs Harnessing a healthy digital life calls for a lifestyle-check that challenges mobile device users to go beyond simply relying on a security application. Just like cleaning up and reorganizing

More information

Latest Business Email Compromise Malware Found: Olympic Vision

Latest Business Email Compromise Malware Found: Olympic Vision A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic

More information

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions: TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data

More information

Have you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising.

Have you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising. TrendLabs When you go shopping or banking online, you probably take great pains to make sure sensitive information (like your credit card details) remain private. But what about other details, like your

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

From Russia with Love

From Russia with Love A Trend Micro Research Paper From Russia with Love Behind the Trend Micro-NBC News Honeypots Kyle Wilhoit Forward-Looking Threat Research Team Contents Introduction...1 Environment Setup...1 User Activity...2

More information

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING? A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed

More information

How Do Threat Actors Move Deeper Into Your Network?

How Do Threat Actors Move Deeper Into Your Network? SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is

More information

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

This document has been provided by the International Center for Not-for-Profit Law (ICNL). This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.

More information

Network Detection Evasion Methods

Network Detection Evasion Methods A Trend Micro Research Paper Network Detection Evasion Methods Blending with Legitimate Traffic Jessa Dela Torre and Sabrina Sioting Contents Introduction...3 Known Threats That Use Advanced Evasion Techniques...3

More information

FastPOS: Quick and Easy Credit Card Theft

FastPOS: Quick and Easy Credit Card Theft A TrendLabs Report FastPOS: Quick and Easy Credit Card Theft TrendLabs Security Intelligence Blog Trend Micro Cyber Safety Solutions Team June 2016 Contents Introduction...1 Installation...1 Information

More information

THE SOUTH KOREAN FAKE BANKING APP SCAM

THE SOUTH KOREAN FAKE BANKING APP SCAM THE SOUTH KOREAN FAKE BANKING APP SCAM The Yanbian Gang Sets Sights on South Koreans Simon Huang Mobile Threat Research Team CONTENTS Introduction... 1 The Yanbian Gang... 2 Where Did the Gang Get Its

More information

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains TECHNICAL REPORT An Analysis of Domain Silver, Inc..pl Domains July 31, 2013 CONTENTS Contents 1 Introduction 2 2 Registry, registrar and registrant 3 2.1 Rogue registrar..................................

More information

Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox

Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...

More information

Getting a new computer or smartphone is always exciting but do you know what to do with your old one?

Getting a new computer or smartphone is always exciting but do you know what to do with your old one? TrendLabs Getting a new computer or smartphone is always exciting but do you know what to do with your old one? The truth is that it s not as simple as just giving them away or selling them. You have to

More information

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November

More information

The Mobile Cybercriminal Underground Market in China

The Mobile Cybercriminal Underground Market in China A Trend Micro Research Paper Cybercriminal Underground Economy Series The Mobile Cybercriminal Underground Market in China Lion Gu Forward-Looking Threat Research Team Contents Cybercriminal Underground

More information

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug

More information

MALWARE TOOLS FOR SALE ON THE OPEN WEB

MALWARE TOOLS FOR SALE ON THE OPEN WEB MALWARE TOOLS FOR SALE ON THE OPEN WEB May 2014 RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop server used by a fraudster who is offering a set of spyware tools for

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Innovations in Network Security

Innovations in Network Security Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.

More information

Follow the Data: Analyzing Breaches by Industry

Follow the Data: Analyzing Breaches by Industry Follow the Data: Analyzing Breaches by Industry Trend Micro Analysis of Privacy Rights Clearinghouse 25 215 Data Breach Records Numaan Huq Forward-Looking Threat Research (FTR) Team A TrendLabs SM Research

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond Security Threats to Business, the Digital Lifestyle, and the Cloud Trend Micro Predictions for 2013 and Beyond In 2013, managing the security of devices, small business systems, and large enterprise networks

More information

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most

More information

Phishing Activity Trends Report June, 2006

Phishing Activity Trends Report June, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

BEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION

BEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION BEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION December 2013 In the last few years, we have seen the mobile space explode with malware. According to a recent report by Trend Micro, the number of

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received by the (APWG) came to 23,61 in, a drop of over 6, from January s previous record

More information

The Police Trojan AN IN-DEPTH ANALYSIS

The Police Trojan AN IN-DEPTH ANALYSIS Trend Micro Research Paper 2012 The Police Trojan AN IN-DEPTH ANALYSIS By: David Sancho and Feike Hacquebord CONTENTS Introduction... 1 Technical Analysis... 1 Technical Findings... 4 Network Analysis...

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

The HeartBeat APT Campaign

The HeartBeat APT Campaign Trend Micro Incorporated Research Paper 2012 The HeartBeat APT Campaign Roland Dela Paz Contents About This Paper... 1 Introduction... 1 Campaign Targets... 2 Context... 2 Attack Vector... 3 Infection

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

Figure 1: A screenshot of a known Zeus variant called Citadel

Figure 1: A screenshot of a known Zeus variant called Citadel Title: Online Data Theft and ZeuS Dropzones (WORKING PAPER) By: Steve Chon, Roderic Broadhurst Organisation: ANU Cybercrime Observatory, Australian National University Website: http://cybercrime.anu.edu.au

More information

Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS

Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS Trend Micro Incorporated Research Paper 2012 Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS By: Jon Oliver, Sandra Cheng, Lala Manly, Joey Zhu, Roland

More information

A PROFILE OF IRS SCAMMERS

A PROFILE OF IRS SCAMMERS A PROFILE OF IRS SCAMMERS Behind Tax Fraud Loucif Kharouni Forward-Looking Threat Research Team CONTENTS Introduction...ii How IRS Tax Scams Work... 1 Technical Analysis: Noteworthy IRS Tax Scam Components...

More information

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS December 2011 November saw DNS Poisoning, aka Pharming, making the headlines on more than one occasion: To name a few, the online threat

More information

The anatomy of an online banking fraud

The anatomy of an online banking fraud The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an

More information

ZeuS: A Persistent Criminal Enterprise

ZeuS: A Persistent Criminal Enterprise ZeuS: A Persistent Criminal Enterprise Trend Micro, Incorporated Threat Research Team A Trend Micro Research Paper I March 2010 CONTENTS INTRODUCTION...3 WHAT IS ZEUS?...4 SOME TECHNICAL FACTS...5 ZeuS

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information

More information

Course Content: Session 1. Ethics & Hacking

Course Content: Session 1. Ethics & Hacking Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for

More information

Operation Liberpy : Keyloggers and information theft in Latin America

Operation Liberpy : Keyloggers and information theft in Latin America Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation

More information

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology

More information

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper STOP Cybercriminals and security attacks ControlNow TM Whitepaper Table of Contents Introduction 3 What the headlines don t tell you 4 The malware (r)evolution 5 Spear phishing scams 5 Poisoned searches

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Phishing Activity Trends Report for the Month of December, 2007

Phishing Activity Trends Report for the Month of December, 2007 Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease

More information

FROM THE ARCHIVES: AUTOMATION OF FRAUD THE VOXIS PLATFORM

FROM THE ARCHIVES: AUTOMATION OF FRAUD THE VOXIS PLATFORM FROM THE ARCHIVES: AUTOMATION OF FRAUD THE VOXIS PLATFORM August 2015 RSA FirstWatch TABLE OF CONTENTS Executive Summary... 3 A Multi Gateway Fake Merchant Store... 3 The Voxis Platform Is Leaked... 3

More information

Security Guide to Social Networks

Security Guide to Social Networks Security Guide to Social Networks Trend Micro, Incorporated By: David Sancho Senior Threat Researcher A Trend Micro White Paper I August 2009 TABLE OF CONTENTS INTRODUCTION...3 PRIVACY IN A CONNECTED WORLD:

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Malicious Websites uncover vulnerabilities (browser, plugins, webapp, server), initiate attack steal sensitive information, install malware, compromise victim s machine Malicious Websites uncover vulnerabilities

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Resilient Botnet Command and Control with Tor

Resilient Botnet Command and Control with Tor Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode

More information

The thriving malware industry: Cybercrime made easy

The thriving malware industry: Cybercrime made easy IBM Software Thought Leadership White Paper The thriving malware industry: Cybercrime made easy Technology and processes from IBM Security help your organization combat malware- driven fraud and achieve

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering

More information

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security location of optional horizontal pic Corporate and Investment Banking Business Online Information Security Business Online Information Security Risk reduction: Ensuring your sensitive information is secure

More information

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs? A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today

More information

Symantec Intelligence Report: February 2013

Symantec Intelligence Report: February 2013 Symantec Intelligence Symantec Intelligence Report: February 2013 Welcome to the February edition of the Symantec Intelligence report, which provides the latest analysis of cyber security threats, trends,

More information

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

DIGITAL LIFE E-GUIDE How to Protect your Smartphone A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money

More information

WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper. WHITE PAPER Using DNS RPZ to Protect An Osterman Research White Paper Published June 2015 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Netsweeper Whitepaper

Netsweeper Whitepaper Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Exploring the Black Hole Exploit Kit

Exploring the Black Hole Exploit Kit Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary

More information

INDUSTRY OVERVIEW: FINANCIAL

INDUSTRY OVERVIEW: FINANCIAL ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL

More information

Fraud Threat Intelligence

Fraud Threat Intelligence About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle

More information

Closing the Biggest Security Hole in Web Application Delivery

Closing the Biggest Security Hole in Web Application Delivery WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security

More information

MRG Effitas Online Banking / Browser Security Certification Project Q3 2014

MRG Effitas Online Banking / Browser Security Certification Project Q3 2014 MRG Effitas Online Banking / Browser Security Certification Project Q3 2014 1 Contents Introduction... 3 Executive summary... 3 Certification... 4 The purpose of this report... 4 Tests employed... 6 Security

More information

Security Evaluation CLX.Sentinel

Security Evaluation CLX.Sentinel Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger walter.sprenger@csnc.ch Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.

More information

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes) A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365

More information

HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success

HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success HACKER INTELLIGENCE INITIATIVE The Secret Behind 1 1. Introduction The Imperva Application Defense Center (ADC) is a premier research organization for security analysis, vulnerability discovery, and compliance

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

A Cybercrime Hub. Trend Micro Threat Research. Trend Micro, Incorporated. A Trend Micro White Paper I August 2009

A Cybercrime Hub. Trend Micro Threat Research. Trend Micro, Incorporated. A Trend Micro White Paper I August 2009 Trend Micro, Incorporated Trend Micro Threat Research A Trend Micro White Paper I August 2009 TABLE OF CONTENTS INTRODUCTION...3 THE CYBERCRIME COMPANY...4 ROGUE DNS SERVERS...5 INTRANET OF CYBERCRIME...6

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled

DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled smartphones use these to help them shop (e.g., check prices, read

More information

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Botnets: The Advanced Malware Threat in Kenya's Cyberspace Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)

More information

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection

More information

Malicious Yahooligans

Malicious Yahooligans WHITE PAPER: SYMANTEC SECURITY RESPONSE Malicious Yahooligans Eric Chien Symantec Security Response, Ireland Originally published by Virus Bulletin, August 2006. Copyright held by Virus Bulletin, Ltd.,

More information

Targeted Phishing SECURITY TRENDS

Targeted Phishing SECURITY TRENDS Security Trends Overview Targeted Phishing SECURITY TRENDS Overview Email is the communication medium most organizations have come to rely on. Unfortunately, most incoming email is unwanted or even malicious.

More information

Security A to Z the most important terms

Security A to Z the most important terms Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from

More information

Current Threat Scenario and Recent Attack Trends

Current Threat Scenario and Recent Attack Trends Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information