![](https://documents.trendmicro.com/images/tex/research-reports/wp-sextortion-in-the-far-east_th.jpg)
Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
![](https://documents.trendmicro.com/images/tex/research-reports/wp-the-south-korean-fake-banking-app-scam_th.jpg)
This research paper provides in-depth information on the operation and structure of a cybercriminal group found using fake banking apps to steal mobile banking credentials from South Korean users.
![](https://documents.trendmicro.com/images/tex/research-reports/wp-the-mobile-cybercriminal-underground-market-in-china_th.jpg)
Over several months, our researchers monitored the Chinese mobile cybercriminal underground to see what kind of wares cybercriminals were trading. What they found was a diverse set of offerings created to suit different purposes.