RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market

Size: px
Start display at page:

Download "RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market"

Transcription

1 RESEARCHBRIEF Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market Lion Gu After taking a grand tour of the Chinese underground market last year, let s revisit it and see what has changed since then.1 In the past, we noted that Chinese cybercriminals adapted well to their environment, trailing their sights on online gamers and mobile users, the majority of the Internet users in the country. They continue to adapt well, as the market has now reached a similar level of maturity as the rest of the global cybercriminal underground. 1 The Chinese underground market is hidden to the public but is not very difficult to find. Cybercriminals frequent forums and QQ chat groups. Though forums remain the most popular cybercrime platform in many countries, China is unique in that QQ chat groups were also frequently used. Each cybercrime group has a unique ID. Would-be customers can simply search for a certain group of interest in QQ to gain access to its service and product offerings.

2 Chinese Underground Offerings: What s in Store for Cybercriminals? Every local underground market is unique. The Chinese underground market is a lot like any Chinese market though. It offers many kinds of goods for which interested buyers can bargain. Sellers normally post ads with pretty pictures and descriptions to entice buyers. Everything you can possibly need is readily available. The Chinese underground market is now rife with a variety of service and product offerings that any threat actor would love to get his hands on. Service Offerings Like underground markets in other countries, notably Russia, offerings like distributed denial-of-service (DDoS), antivirus, phishing, webshell creation, and blackhat search engine optimization (SEO) services abound in the Chinese underground market. 2 The following are just some of the services available to cybercriminals: Figure 1: Gh0st DDoS Kit console DDoS attack: Cybercriminals carry out DDoS attacks by sending too many requests to a target site, causing what s known as a flooding that renders a site inaccessible for a given amount of time. Antivirus/Detection evasion: Since many potential attack targets may employ some kind of antivirus protection, evasion services have become a staple underground offering. These allow cybercriminals to test their malware against known antivirus solutions before actual use, increasing their chances of launching a successful attack. Figure 2: A no-detection demo from an antivirus service provider Because malware sometimes evade antivirus detection with the help of fake certificate signatures, malware-signing services are also offered underground. 2 white-papers/wp-russian-underground-101.pdf 2

3 CHINESE UNDERGROUND SERVICE OFFERINGS SERVICE PRICE DDoS attack SYN packet attack Sell Challenge Collapsar (CC) packet attack Darkshell DDoS Kit rental Dedicated 1Gbps Internet connection, 8G memory, and Xeon E7 CPU server rental Dedicated Atom 330 (1.60GHz)/2G/250G server rental Dedicated E5200 (2.5GHz)/2G/320G server rental Dedicated E5400 (2.7GHz)/2G/320G server RMB 1,000 (US$ or )for 10G/day RMB 450 (US$73.22 or 54.27) for 1G/day RMB 500 (US$81.35 or 60.30)/month RMB 2,100 (US$ or )/month RMB 599 (US$97.46 or 72.24)/month RMB 699 (US$ or 84.30)/month RMB 799 (US$130 or 96.36)/month Antivirus/Detection evasion Undetected by Chinese antivirus solutions Undetected by global, especially South Korean, antivirus solutions (e.g., ALYac, AhnLab, AVG, Kaspersky, Avira, Virus Chaser, Avast, and ESET products) RAT bundle undetected by local antivirus solutions (e.g., Qihu 360, Kingsoft, and Guanjia products) Malware signing RMB 1,500 (US$ or )/month RMB 500 (US$81.35 or 60.30)/month RMB 400 (US$65.08 or 48.24)/month RMB 400 (US$65.08 or 48.24)/week Product Offerings Going it alone is also an option for those who wish to do so. Cybercriminals who wish to launch their own attacks and control every step of the process have the option instead to buy various products from their peers such as: Compromised hosts: Cybercriminals also sell compromised hosts to peers to serve as malware download sites and DDoS attack or computation task executors (i.e., used to mine Bitcoins because the process requires a lot of processing power). Remote access tool (RAT): A RAT allows user to remotely access and control computers. But RATs can be used for malicious purposes, too. We call these malicious counterparts usually sold underground remote access Trojans. Figure 3: A TYT RAT ad Phishing kit: Because a lot of money can be gained by compromising users personal accounts, phishing kits abound in the Chinese underground, too. 3

4 Webshell: This refers to a script that is usually left on a compromised site to maintain control of it. It is also used for blackhat SEO attacks since compromised sites are normally used to increase a malicious site s ranking to gain as many visitors as possible. Figure 4: Phishing page demo Those who do not want to go through the trouble of creating phishing pages and/or sites but wish to collect stolen credentials for various purposes can opt to buy these instead. Stolen credentials like addresses or user-name and password combinations are often used to instigate targeted attacks. Bank account credentials, meanwhile, are normally used for identity spoofing and other fraudulent financial activities. Stolen online gaming account credentials are also especially sold in the Chinese underground, most likely due to the country s huge online gaming community. Figure 5: Stolen account checker kit 4

5 CHINESE UNDERGROUND PRODUCT OFFERINGS PRODUCT PRICE Compromised hosts Windows 2003 Windows XP Registered in South Korea and Japan Camera connected RMB 3 (US$0.49 or 0.36)/host RMB 0.20 (US$0.03 or 0.02)/host RMB 1 (US$0.16 or 0.12)/host RMB 100 (US$16.27 or 12.06)/500 hosts RAT Gh0st 3.75 with 1 month antivirus service Terminator with 1 month antivirus service Chicken Farm with 1 month antivirus service Average price without antivirus service RMB 400 (US$65.08 or 48.24) RMB 400 (US$65.08 or 48.24) RMB 600 (US$97.62 or 72.36) RMB 30 (US$4.88 or 3.62) Phishing kit RMB 1,000 (US$ or ) Stolen credentials Local accounts for sites like mail.cn.yahoo.com, and 1,300 new U.S. and European accounts for sites like com, and 100,000 38M South Korean and Japanese accounts New DNF, an online game, accounts RMB 1,000 (US$ or ) RMB 2,000 (US$ or ) RMB 1,000 10,000 (US$ ,627 or ,206) RMB 0.30 (US$0.05 or 0.04)/account ID Webshell packages for blackhat SEO purposes 270 Baidu rank 1 3 sites/month 270 Baidu rank 2 4 sites/month 270 Baidu rank 3 5 sites/month 270 Baidu rank 4 6 sites/month 270 Google rank 1 3 sites/month 270 Google rank 2 4 sites/month 270 Google rank 3 5 sites/month 270 Google rank 4 6 sites/month Google rank 1 Japanese sites Google rank 2 Japanese sites Google rank 3 Japanese sites Google rank 4 Japanese sites Google rank 5 Japanese sites Google rank 6 Japanese sites RMB 300 (US$48.81 or 36.18) RMB 580 (US$94.37 or 69.95) RMB 720 (US$ or 86.84) RMB 999 (US$ or ) RMB 220 (US$35.79 or 26.53) RMB 340 (US$55.32 or 41.01) RMB 400 (US$65.08 or 48.24) RMB 520 (US$84.60 or 62.71) RMB 15 (US$2.44 or 1.81)/site RMB 25 (US$4.07 or 3.02)/site RMB 45 (US$7.32 or 5.43)/site RMB 90 (US$14.64 or 10.85)/site RMB 180 (US$29.29 or 21.71)/site RMB 360 (US$58.57 or 43.42)/site 5

6 The Thriving Chinese Underground: What Does It Mean for Users? The Chinese underground market, like others, continues to thrive. It now offers a wider variety of services and products that any cybercriminal would love to get his hands on. The service and product offerings in this report are just some of those available to enterprising cybercriminals. Only the most popular offerings have been included here. Even so, however, it is not difficult to see that user data and popular sites are favorite cybercriminal targets. Because cybercriminals find a great deal of value from stealing and buying stolen personal credentials, users should make sure they practice safe computing habits. Visiting only trusted sites; making sure their computers, devices, software, and apps are always updated with the latest patches; and steering clear of dubious s are strongly advised. Those who have their own sites, users and businesses alike, should also make sure that these are secure and do not reveal sensitive and confidential data. Staying abreast of the latest underground developments and protecting assets in line with improvements in cybercrime and attack tactics and tools is also a must. TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an as is condition. Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For more information, visit by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners N. De Anza Blvd. Cupertino, CA U.S. toll free: Phone: Fax:

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

Learn about each tool in parental controls and find out how you can use them to secure you and your family.

Learn about each tool in parental controls and find out how you can use them to secure you and your family. TrendLabs Parental controls are not just for your kids. Online threats, after all, affect everyone. Effective use of parental controls, combined with proper know-how on dealing with online threats, can

More information

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social. RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

43% Figure 1: Targeted Attack Campaign Diagram

43% Figure 1: Targeted Attack Campaign Diagram TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company

More information

Email Correlation and Phishing

Email Correlation and Phishing A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...

More information

Have you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising.

Have you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising. TrendLabs When you go shopping or banking online, you probably take great pains to make sure sensitive information (like your credit card details) remain private. But what about other details, like your

More information

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions: TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data

More information

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

THE SOUTH KOREAN FAKE BANKING APP SCAM

THE SOUTH KOREAN FAKE BANKING APP SCAM THE SOUTH KOREAN FAKE BANKING APP SCAM The Yanbian Gang Sets Sights on South Koreans Simon Huang Mobile Threat Research Team CONTENTS Introduction... 1 The Yanbian Gang... 2 Where Did the Gang Get Its

More information

How Do Threat Actors Move Deeper Into Your Network?

How Do Threat Actors Move Deeper Into Your Network? SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is

More information

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

This document has been provided by the International Center for Not-for-Profit Law (ICNL). This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.

More information

The Mobile Cybercriminal Underground Market in China

The Mobile Cybercriminal Underground Market in China A Trend Micro Research Paper Cybercriminal Underground Economy Series The Mobile Cybercriminal Underground Market in China Lion Gu Forward-Looking Threat Research Team Contents Cybercriminal Underground

More information

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING? A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed

More information

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your

More information

This guide aims to get you started on decluttering the most important aspects of your digital life.

This guide aims to get you started on decluttering the most important aspects of your digital life. TrendLabs Harnessing a healthy digital life calls for a lifestyle-check that challenges mobile device users to go beyond simply relying on a security application. Just like cleaning up and reorganizing

More information

From Russia with Love

From Russia with Love A Trend Micro Research Paper From Russia with Love Behind the Trend Micro-NBC News Honeypots Kyle Wilhoit Forward-Looking Threat Research Team Contents Introduction...1 Environment Setup...1 User Activity...2

More information

FastPOS: Quick and Easy Credit Card Theft

FastPOS: Quick and Easy Credit Card Theft A TrendLabs Report FastPOS: Quick and Easy Credit Card Theft TrendLabs Security Intelligence Blog Trend Micro Cyber Safety Solutions Team June 2016 Contents Introduction...1 Installation...1 Information

More information

Getting a new computer or smartphone is always exciting but do you know what to do with your old one?

Getting a new computer or smartphone is always exciting but do you know what to do with your old one? TrendLabs Getting a new computer or smartphone is always exciting but do you know what to do with your old one? The truth is that it s not as simple as just giving them away or selling them. You have to

More information

Latest Business Email Compromise Malware Found: Olympic Vision

Latest Business Email Compromise Malware Found: Olympic Vision A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November

More information

Eco and Ego Apps in Japan

Eco and Ego Apps in Japan Eco and Ego Apps in Japan A special report based on the Trend Micro research paper written by senior threat researcher Noriaki Hayashi 1 Users face various unwanted app routines in the current mobile landscape.

More information

Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox

Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled

DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled smartphones use these to help them shop (e.g., check prices, read

More information

Network Detection Evasion Methods

Network Detection Evasion Methods A Trend Micro Research Paper Network Detection Evasion Methods Blending with Legitimate Traffic Jessa Dela Torre and Sabrina Sioting Contents Introduction...3 Known Threats That Use Advanced Evasion Techniques...3

More information

Microsoft Windows XP Vulnerabilities and Prevention

Microsoft Windows XP Vulnerabilities and Prevention Managing Your Legacy Systems: What Will Life Be Like After Windows Server 2003? After Microsoft ended support for Windows XP last April 8, 2014, users and organizations alike that continued to use the

More information

Prototype Nation. Lion Gu. The Chinese Cybercriminal Underground in 2015. Forward-Looking Threat Research (FTR) Team. A TrendLabs SM Research Paper

Prototype Nation. Lion Gu. The Chinese Cybercriminal Underground in 2015. Forward-Looking Threat Research (FTR) Team. A TrendLabs SM Research Paper Prototype Nation The Chinese Cybercriminal Underground in 2015 Lion Gu Forward-Looking Threat Research (FTR) Team A TrendLabs SM Research Paper TREND MICRO LEGAL DISCLAIMER The information provided herein

More information

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper STOP Cybercriminals and security attacks ControlNow TM Whitepaper Table of Contents Introduction 3 What the headlines don t tell you 4 The malware (r)evolution 5 Spear phishing scams 5 Poisoned searches

More information

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond Security Threats to Business, the Digital Lifestyle, and the Cloud Trend Micro Predictions for 2013 and Beyond In 2013, managing the security of devices, small business systems, and large enterprise networks

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

Follow the Data: Analyzing Breaches by Industry

Follow the Data: Analyzing Breaches by Industry Follow the Data: Analyzing Breaches by Industry Trend Micro Analysis of Privacy Rights Clearinghouse 25 215 Data Breach Records Numaan Huq Forward-Looking Threat Research (FTR) Team A TrendLabs SM Research

More information

Protect Your Business and Customers from Online Fraud

Protect Your Business and Customers from Online Fraud DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently

More information

A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team)

A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team) A Trend Micro Research Paper Ice 419 Cybercriminals from Nigeria Use Ice IX and the 419 Scam Loucif Kharouni (Forward-Looking Threat Research Team) Contents Introduction...3 Ice IX as an Attack Vector...3

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

This document has been provided by the International Center for Not-for-Profit Law (ICNL). This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

The Underground Hacker Markets are Booming with Counterfeit Documents, Premiere Credit Cards, Hacker Tutorials and 100% Satisfaction Guarantees

The Underground Hacker Markets are Booming with Counterfeit Documents, Premiere Credit Cards, Hacker Tutorials and 100% Satisfaction Guarantees The Underground Hacker Markets are Booming with Counterfeit Documents, Premiere Credit Cards, Hacker Tutorials and 100% Satisfaction Guarantees Contents 2 Summary of Findings 3 Counterfeit Credentials

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy

DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy A DIGITAL LIFE E-GUIDE How to Claim Your Online Privacy As more and more people go online for personal transactions like shopping and banking, you re bound to wonder how much information about you can

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试. 2015 Dec. Celebrating Technology Innovation

Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试. 2015 Dec. Celebrating Technology Innovation Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试 2015 Dec Celebrating Technology Innovation 报 告 目 录 Table of Contents P1 P2 P2 测 试 背 景 测 试 流 程 待 测 软 件 Background Test Process Tested Software P3

More information

INDUSTRY OVERVIEW: HEALTHCARE

INDUSTRY OVERVIEW: HEALTHCARE ii IBM MSS INDUSTRY OVERVIEW: HEALTHCARE RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: OCTOBER 7, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW/KEY FINDINGS...

More information

Mobility Security Product Test and Certificate. http://www.pcsecuritylabs.net

Mobility Security Product Test and Certificate. http://www.pcsecuritylabs.net Mobility Security Product Test and Certificate For Android December,2011 Introduction For many people around the world, a smartphone is their primary -- and sometimes only -- means of accessing the Web.

More information

The Advanced Cyber Attack Landscape

The Advanced Cyber Attack Landscape The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

AV-Comparatives. Mobile Security Test. Language: English. February 2015 Last revision: 30 th March 2015. www.av-comparatives.org

AV-Comparatives. Mobile Security Test. Language: English. February 2015 Last revision: 30 th March 2015. www.av-comparatives.org AV-Comparatives Mobile Security Test Language: English February 2015 Last revision: 30 th March 2015-1- Introduction This test covers security products for smartphones and tablets running Google's Android

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most

More information

A Cybercrime Hub. Trend Micro Threat Research. Trend Micro, Incorporated. A Trend Micro White Paper I August 2009

A Cybercrime Hub. Trend Micro Threat Research. Trend Micro, Incorporated. A Trend Micro White Paper I August 2009 Trend Micro, Incorporated Trend Micro Threat Research A Trend Micro White Paper I August 2009 TABLE OF CONTENTS INTRODUCTION...3 THE CYBERCRIME COMPANY...4 ROGUE DNS SERVERS...5 INTRANET OF CYBERCRIME...6

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection

More information

Under the Hood of the IBM Threat Protection System

Under the Hood of the IBM Threat Protection System Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1 You are an... IT Security Manager at a retailer

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

DIGITAL LIFE E-GUIDE How to Protect your Smartphone A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Innovations in Network Security

Innovations in Network Security Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Addressing Big Data Security Challenges: The Right Tools for Smart Protection Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today

More information

TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS

TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS g Maxim Goncharov A 2011 Trend Micro Research Paper Abstract Directing traffic to cash in on referrals is a common and legitimate method of making

More information

Mobility Security Product Test and Certificate http://www.pcsecuritylabs.net

Mobility Security Product Test and Certificate http://www.pcsecuritylabs.net Mobility Security Product Test and Certificate For Android April, 2012,2011 Introduction For many people around the world, a smartphone is their primary -- and sometimes only -- means of accessing the

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative File Detection Test of Malicious Software including false alarm test Language: English March 2014 Last Revision: 22 nd April 2014 Table of Contents Tested Products 3 Introduction

More information

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs? A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social

More information

Your Customers Want Secure Access

Your Customers Want Secure Access FIVE REASONS WHY Cybersecurity IS VITAL to Your retail Businesses Your Customers Want Secure Access Customer loyalty is paramount to the success of your retail business. How loyal will those customers

More information

Society Protection Best Practices from Industry

Society Protection Best Practices from Industry Society Best Practices from Industry The Nuts and Bolts of the Dynamic Attack Chain 1 October 2015 1 2015 IBM Corporation You are an... IT Security Manager (and a father of three teenagers his wife is

More information

Trend Micro Endpoint Comparative Report Performed by AV Test.org

Trend Micro Endpoint Comparative Report Performed by AV Test.org Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market

More information

The HeartBeat APT Campaign

The HeartBeat APT Campaign Trend Micro Incorporated Research Paper 2012 The HeartBeat APT Campaign Roland Dela Paz Contents About This Paper... 1 Introduction... 1 Campaign Targets... 2 Context... 2 Attack Vector... 3 Infection

More information

Advanced Persistent Threats

Advanced Persistent Threats White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which

More information

Threat Management. Virtual Worlds. Web Threats. A Trend Micro White Paper I October 2008

Threat Management. Virtual Worlds. Web Threats. A Trend Micro White Paper I October 2008 Threat Management Web Threats Virtual Worlds A Trend Micro White Paper I October 2008 TABLE OF CONTENTS Executive Summary.......................................................................3 Sidebar:

More information

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

SPEAR PHISHING AN ENTRY POINT FOR APTS

SPEAR PHISHING AN ENTRY POINT FOR APTS SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing

More information

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

WHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY

WHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY WHITE PAPER N Increased Security and Lower Costs for SMBs An Osterman Research White Paper Published August 2012 sponsored by SPONSORED BY! SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CORPORATE AV / EPP COMPARATIVE ANALYSIS CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

ENTERPRISE EPP COMPARATIVE ANALYSIS

ENTERPRISE EPP COMPARATIVE ANALYSIS ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan

More information

App Terms and Conditions!

App Terms and Conditions! 1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

26.6% 20.2% 28% 70% 67% Market Share Analysis of Antivirus & Operating Systems. Contents. Report Highlights. Introduction.

26.6% 20.2% 28% 70% 67% Market Share Analysis of Antivirus & Operating Systems. Contents. Report Highlights. Introduction. Market Share Analysis of Antivirus & Operating Systems Contents Antivirus Vendor Market Share Antivirus Product Market Share Antivirus Product Market Share by Operating System Operating System Updates

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information