RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market
|
|
- Ami Foster
- 8 years ago
- Views:
Transcription
1 RESEARCHBRIEF Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market Lion Gu After taking a grand tour of the Chinese underground market last year, let s revisit it and see what has changed since then.1 In the past, we noted that Chinese cybercriminals adapted well to their environment, trailing their sights on online gamers and mobile users, the majority of the Internet users in the country. They continue to adapt well, as the market has now reached a similar level of maturity as the rest of the global cybercriminal underground. 1 The Chinese underground market is hidden to the public but is not very difficult to find. Cybercriminals frequent forums and QQ chat groups. Though forums remain the most popular cybercrime platform in many countries, China is unique in that QQ chat groups were also frequently used. Each cybercrime group has a unique ID. Would-be customers can simply search for a certain group of interest in QQ to gain access to its service and product offerings.
2 Chinese Underground Offerings: What s in Store for Cybercriminals? Every local underground market is unique. The Chinese underground market is a lot like any Chinese market though. It offers many kinds of goods for which interested buyers can bargain. Sellers normally post ads with pretty pictures and descriptions to entice buyers. Everything you can possibly need is readily available. The Chinese underground market is now rife with a variety of service and product offerings that any threat actor would love to get his hands on. Service Offerings Like underground markets in other countries, notably Russia, offerings like distributed denial-of-service (DDoS), antivirus, phishing, webshell creation, and blackhat search engine optimization (SEO) services abound in the Chinese underground market. 2 The following are just some of the services available to cybercriminals: Figure 1: Gh0st DDoS Kit console DDoS attack: Cybercriminals carry out DDoS attacks by sending too many requests to a target site, causing what s known as a flooding that renders a site inaccessible for a given amount of time. Antivirus/Detection evasion: Since many potential attack targets may employ some kind of antivirus protection, evasion services have become a staple underground offering. These allow cybercriminals to test their malware against known antivirus solutions before actual use, increasing their chances of launching a successful attack. Figure 2: A no-detection demo from an antivirus service provider Because malware sometimes evade antivirus detection with the help of fake certificate signatures, malware-signing services are also offered underground. 2 white-papers/wp-russian-underground-101.pdf 2
3 CHINESE UNDERGROUND SERVICE OFFERINGS SERVICE PRICE DDoS attack SYN packet attack Sell Challenge Collapsar (CC) packet attack Darkshell DDoS Kit rental Dedicated 1Gbps Internet connection, 8G memory, and Xeon E7 CPU server rental Dedicated Atom 330 (1.60GHz)/2G/250G server rental Dedicated E5200 (2.5GHz)/2G/320G server rental Dedicated E5400 (2.7GHz)/2G/320G server RMB 1,000 (US$ or )for 10G/day RMB 450 (US$73.22 or 54.27) for 1G/day RMB 500 (US$81.35 or 60.30)/month RMB 2,100 (US$ or )/month RMB 599 (US$97.46 or 72.24)/month RMB 699 (US$ or 84.30)/month RMB 799 (US$130 or 96.36)/month Antivirus/Detection evasion Undetected by Chinese antivirus solutions Undetected by global, especially South Korean, antivirus solutions (e.g., ALYac, AhnLab, AVG, Kaspersky, Avira, Virus Chaser, Avast, and ESET products) RAT bundle undetected by local antivirus solutions (e.g., Qihu 360, Kingsoft, and Guanjia products) Malware signing RMB 1,500 (US$ or )/month RMB 500 (US$81.35 or 60.30)/month RMB 400 (US$65.08 or 48.24)/month RMB 400 (US$65.08 or 48.24)/week Product Offerings Going it alone is also an option for those who wish to do so. Cybercriminals who wish to launch their own attacks and control every step of the process have the option instead to buy various products from their peers such as: Compromised hosts: Cybercriminals also sell compromised hosts to peers to serve as malware download sites and DDoS attack or computation task executors (i.e., used to mine Bitcoins because the process requires a lot of processing power). Remote access tool (RAT): A RAT allows user to remotely access and control computers. But RATs can be used for malicious purposes, too. We call these malicious counterparts usually sold underground remote access Trojans. Figure 3: A TYT RAT ad Phishing kit: Because a lot of money can be gained by compromising users personal accounts, phishing kits abound in the Chinese underground, too. 3
4 Webshell: This refers to a script that is usually left on a compromised site to maintain control of it. It is also used for blackhat SEO attacks since compromised sites are normally used to increase a malicious site s ranking to gain as many visitors as possible. Figure 4: Phishing page demo Those who do not want to go through the trouble of creating phishing pages and/or sites but wish to collect stolen credentials for various purposes can opt to buy these instead. Stolen credentials like addresses or user-name and password combinations are often used to instigate targeted attacks. Bank account credentials, meanwhile, are normally used for identity spoofing and other fraudulent financial activities. Stolen online gaming account credentials are also especially sold in the Chinese underground, most likely due to the country s huge online gaming community. Figure 5: Stolen account checker kit 4
5 CHINESE UNDERGROUND PRODUCT OFFERINGS PRODUCT PRICE Compromised hosts Windows 2003 Windows XP Registered in South Korea and Japan Camera connected RMB 3 (US$0.49 or 0.36)/host RMB 0.20 (US$0.03 or 0.02)/host RMB 1 (US$0.16 or 0.12)/host RMB 100 (US$16.27 or 12.06)/500 hosts RAT Gh0st 3.75 with 1 month antivirus service Terminator with 1 month antivirus service Chicken Farm with 1 month antivirus service Average price without antivirus service RMB 400 (US$65.08 or 48.24) RMB 400 (US$65.08 or 48.24) RMB 600 (US$97.62 or 72.36) RMB 30 (US$4.88 or 3.62) Phishing kit RMB 1,000 (US$ or ) Stolen credentials Local accounts for sites like mail.cn.yahoo.com, and 1,300 new U.S. and European accounts for sites like com, and 100,000 38M South Korean and Japanese accounts New DNF, an online game, accounts RMB 1,000 (US$ or ) RMB 2,000 (US$ or ) RMB 1,000 10,000 (US$ ,627 or ,206) RMB 0.30 (US$0.05 or 0.04)/account ID Webshell packages for blackhat SEO purposes 270 Baidu rank 1 3 sites/month 270 Baidu rank 2 4 sites/month 270 Baidu rank 3 5 sites/month 270 Baidu rank 4 6 sites/month 270 Google rank 1 3 sites/month 270 Google rank 2 4 sites/month 270 Google rank 3 5 sites/month 270 Google rank 4 6 sites/month Google rank 1 Japanese sites Google rank 2 Japanese sites Google rank 3 Japanese sites Google rank 4 Japanese sites Google rank 5 Japanese sites Google rank 6 Japanese sites RMB 300 (US$48.81 or 36.18) RMB 580 (US$94.37 or 69.95) RMB 720 (US$ or 86.84) RMB 999 (US$ or ) RMB 220 (US$35.79 or 26.53) RMB 340 (US$55.32 or 41.01) RMB 400 (US$65.08 or 48.24) RMB 520 (US$84.60 or 62.71) RMB 15 (US$2.44 or 1.81)/site RMB 25 (US$4.07 or 3.02)/site RMB 45 (US$7.32 or 5.43)/site RMB 90 (US$14.64 or 10.85)/site RMB 180 (US$29.29 or 21.71)/site RMB 360 (US$58.57 or 43.42)/site 5
6 The Thriving Chinese Underground: What Does It Mean for Users? The Chinese underground market, like others, continues to thrive. It now offers a wider variety of services and products that any cybercriminal would love to get his hands on. The service and product offerings in this report are just some of those available to enterprising cybercriminals. Only the most popular offerings have been included here. Even so, however, it is not difficult to see that user data and popular sites are favorite cybercriminal targets. Because cybercriminals find a great deal of value from stealing and buying stolen personal credentials, users should make sure they practice safe computing habits. Visiting only trusted sites; making sure their computers, devices, software, and apps are always updated with the latest patches; and steering clear of dubious s are strongly advised. Those who have their own sites, users and businesses alike, should also make sure that these are secure and do not reveal sensitive and confidential data. Staying abreast of the latest underground developments and protecting assets in line with improvements in cybercrime and attack tactics and tools is also a must. TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an as is condition. Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For more information, visit by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners N. De Anza Blvd. Cupertino, CA U.S. toll free: Phone: Fax:
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
More informationLearn about each tool in parental controls and find out how you can use them to secure you and your family.
TrendLabs Parental controls are not just for your kids. Online threats, after all, affect everyone. Effective use of parental controls, combined with proper know-how on dealing with online threats, can
More informationWeb. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.
RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More information43% Figure 1: Targeted Attack Campaign Diagram
TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company
More informationEmail Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
More informationHave you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising.
TrendLabs When you go shopping or banking online, you probably take great pains to make sure sensitive information (like your credit card details) remain private. But what about other details, like your
More informationAs threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:
TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data
More informationWhen attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationTHE SOUTH KOREAN FAKE BANKING APP SCAM
THE SOUTH KOREAN FAKE BANKING APP SCAM The Yanbian Gang Sets Sights on South Koreans Simon Huang Mobile Threat Research Team CONTENTS Introduction... 1 The Yanbian Gang... 2 Where Did the Gang Get Its
More informationHow Do Threat Actors Move Deeper Into Your Network?
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
More informationThis document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
More informationThe Mobile Cybercriminal Underground Market in China
A Trend Micro Research Paper Cybercriminal Underground Economy Series The Mobile Cybercriminal Underground Market in China Lion Gu Forward-Looking Threat Research Team Contents Cybercriminal Underground
More informationCloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
More informationDIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check
A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your
More informationThis guide aims to get you started on decluttering the most important aspects of your digital life.
TrendLabs Harnessing a healthy digital life calls for a lifestyle-check that challenges mobile device users to go beyond simply relying on a security application. Just like cleaning up and reorganizing
More informationFrom Russia with Love
A Trend Micro Research Paper From Russia with Love Behind the Trend Micro-NBC News Honeypots Kyle Wilhoit Forward-Looking Threat Research Team Contents Introduction...1 Environment Setup...1 User Activity...2
More informationFastPOS: Quick and Easy Credit Card Theft
A TrendLabs Report FastPOS: Quick and Easy Credit Card Theft TrendLabs Security Intelligence Blog Trend Micro Cyber Safety Solutions Team June 2016 Contents Introduction...1 Installation...1 Information
More informationGetting a new computer or smartphone is always exciting but do you know what to do with your old one?
TrendLabs Getting a new computer or smartphone is always exciting but do you know what to do with your old one? The truth is that it s not as simple as just giving them away or selling them. You have to
More informationLatest Business Email Compromise Malware Found: Olympic Vision
A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic
More informationCan Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
More informationThe Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
More informationEco and Ego Apps in Japan
Eco and Ego Apps in Japan A special report based on the Trend Micro research paper written by senior threat researcher Noriaki Hayashi 1 Users face various unwanted app routines in the current mobile landscape.
More informationTrend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
More informationSecurity Industry Market Share Analysis
Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide
More informationDID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled
DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled smartphones use these to help them shop (e.g., check prices, read
More informationNetwork Detection Evasion Methods
A Trend Micro Research Paper Network Detection Evasion Methods Blending with Legitimate Traffic Jessa Dela Torre and Sabrina Sioting Contents Introduction...3 Known Threats That Use Advanced Evasion Techniques...3
More informationMicrosoft Windows XP Vulnerabilities and Prevention
Managing Your Legacy Systems: What Will Life Be Like After Windows Server 2003? After Microsoft ended support for Windows XP last April 8, 2014, users and organizations alike that continued to use the
More informationPrototype Nation. Lion Gu. The Chinese Cybercriminal Underground in 2015. Forward-Looking Threat Research (FTR) Team. A TrendLabs SM Research Paper
Prototype Nation The Chinese Cybercriminal Underground in 2015 Lion Gu Forward-Looking Threat Research (FTR) Team A TrendLabs SM Research Paper TREND MICRO LEGAL DISCLAIMER The information provided herein
More informationSTOP Cybercriminals and. security attacks ControlNow TM Whitepaper
STOP Cybercriminals and security attacks ControlNow TM Whitepaper Table of Contents Introduction 3 What the headlines don t tell you 4 The malware (r)evolution 5 Spear phishing scams 5 Poisoned searches
More informationSecurity Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond
Security Threats to Business, the Digital Lifestyle, and the Cloud Trend Micro Predictions for 2013 and Beyond In 2013, managing the security of devices, small business systems, and large enterprise networks
More information2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
More informationTypes of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
More informationFollow the Data: Analyzing Breaches by Industry
Follow the Data: Analyzing Breaches by Industry Trend Micro Analysis of Privacy Rights Clearinghouse 25 215 Data Breach Records Numaan Huq Forward-Looking Threat Research (FTR) Team A TrendLabs SM Research
More informationProtect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
More informationA Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team)
A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team) Contents Introduction...3 Ice IX as an Attack Vector...3
More informationINFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
More informationThis document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationInternet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
More informationThe Underground Hacker Markets are Booming with Counterfeit Documents, Premiere Credit Cards, Hacker Tutorials and 100% Satisfaction Guarantees
The Underground Hacker Markets are Booming with Counterfeit Documents, Premiere Credit Cards, Hacker Tutorials and 100% Satisfaction Guarantees Contents 2 Summary of Findings 3 Counterfeit Credentials
More informationMalware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
More informationSecurity Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
More informationDIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy
A DIGITAL LIFE E-GUIDE How to Claim Your Online Privacy As more and more people go online for personal transactions like shopping and banking, you re bound to wonder how much information about you can
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationAndroid Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试. 2015 Dec. Celebrating Technology Innovation
Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试 2015 Dec Celebrating Technology Innovation 报 告 目 录 Table of Contents P1 P2 P2 测 试 背 景 测 试 流 程 待 测 软 件 Background Test Process Tested Software P3
More informationINDUSTRY OVERVIEW: HEALTHCARE
ii IBM MSS INDUSTRY OVERVIEW: HEALTHCARE RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: OCTOBER 7, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW/KEY FINDINGS...
More informationMobility Security Product Test and Certificate. http://www.pcsecuritylabs.net
Mobility Security Product Test and Certificate For Android December,2011 Introduction For many people around the world, a smartphone is their primary -- and sometimes only -- means of accessing the Web.
More informationThe Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationWEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
More informationAV-Comparatives. Mobile Security Test. Language: English. February 2015 Last revision: 30 th March 2015. www.av-comparatives.org
AV-Comparatives Mobile Security Test Language: English February 2015 Last revision: 30 th March 2015-1- Introduction This test covers security products for smartphones and tablets running Google's Android
More information10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
More informationPrimer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS
A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most
More informationA Cybercrime Hub. Trend Micro Threat Research. Trend Micro, Incorporated. A Trend Micro White Paper I August 2009
Trend Micro, Incorporated Trend Micro Threat Research A Trend Micro White Paper I August 2009 TABLE OF CONTENTS INTRODUCTION...3 THE CYBERCRIME COMPANY...4 ROGUE DNS SERVERS...5 INTRANET OF CYBERCRIME...6
More informationHome Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
More informationCloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost
y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection
More informationUnder the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1 You are an... IT Security Manager at a retailer
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationDIGITAL LIFE E-GUIDE How to Protect your Smartphone
A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationInnovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationManaging Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationAddressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
More informationTRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS
TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS g Maxim Goncharov A 2011 Trend Micro Research Paper Abstract Directing traffic to cash in on referrals is a common and legitimate method of making
More informationMobility Security Product Test and Certificate http://www.pcsecuritylabs.net
Mobility Security Product Test and Certificate For Android April, 2012,2011 Introduction For many people around the world, a smartphone is their primary -- and sometimes only -- means of accessing the
More informationSymantec Endpoint Protection Integration Component 7.5 Release Notes
Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.
More informationAnti-Virus Comparative
Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English March 2014 Last Revision: 22 nd April 2014 Table of Contents Tested Products 3 Introduction
More informationDON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
More informationWhat Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
More informationDETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
More informationYour Customers Want Secure Access
FIVE REASONS WHY Cybersecurity IS VITAL to Your retail Businesses Your Customers Want Secure Access Customer loyalty is paramount to the success of your retail business. How loyal will those customers
More informationSociety Protection Best Practices from Industry
Society Best Practices from Industry The Nuts and Bolts of the Dynamic Attack Chain 1 October 2015 1 2015 IBM Corporation You are an... IT Security Manager (and a father of three teenagers his wife is
More informationTrend Micro Endpoint Comparative Report Performed by AV Test.org
Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market
More informationThe HeartBeat APT Campaign
Trend Micro Incorporated Research Paper 2012 The HeartBeat APT Campaign Roland Dela Paz Contents About This Paper... 1 Introduction... 1 Campaign Targets... 2 Context... 2 Attack Vector... 3 Infection
More informationAdvanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
More informationThreat Management. Virtual Worlds. Web Threats. A Trend Micro White Paper I October 2008
Threat Management Web Threats Virtual Worlds A Trend Micro White Paper I October 2008 TABLE OF CONTENTS Executive Summary.......................................................................3 Sidebar:
More informationSentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions
SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationSPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
More informationCYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
More informationWEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
More informationWHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY
WHITE PAPER N Increased Security and Lower Costs for SMBs An Osterman Research White Paper Published August 2012 sponsored by SPONSORED BY! SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black
More informationProtect your personal data while engaging in IT related activities
Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection
More informationCORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
More information10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
More informationTerms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).
Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationRecognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
More informationENTERPRISE EPP COMPARATIVE ANALYSIS
ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan
More informationApp Terms and Conditions!
1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationBeyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More information26.6% 20.2% 28% 70% 67% Market Share Analysis of Antivirus & Operating Systems. Contents. Report Highlights. Introduction.
Market Share Analysis of Antivirus & Operating Systems Contents Antivirus Vendor Market Share Antivirus Product Market Share Antivirus Product Market Share by Operating System Operating System Updates
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More information