Research
- This research paper covers the cybercriminal underground market in Brazil, including the unique tools and training services created by Brazilians to attack targets that are based in the country.Trend Micro's first look into the cybercriminal underground covers the different activities and services found in the Russian underground—the pioneer underground scene—in 2012.This Trend Micro research looks into the emergence of the “mobile underground” in China as a result of the market's shift to mobile platforms, including mobile underground products and services.This research paper reviews messages related to activities, along with trends observed and product and service price updates seen in the Chinese underground market throughout 2013.While the Deep Web has often been associated with The Onion Router (TOR), this research paper introduces other networks that guarantee anonymous and untraceable access—the most renowned darknets and alternative top-level domains.A Trend Micro research paper that reveals the operations and cybercriminals behind Predator Pain and Limitless Keylogger, which are malware toolkits that are easily obtained from underground forums.This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.Soundsquatting is a domain-squatting technique that takes advantage of similar-sounding words, or homophones, to lead users to malicious websites. This research paper looks into how misheard (and not just misspelled) domain names can spell trouble for unsuspec