Research
- This Trend Micro research looks into the emergence of the “mobile underground” in China as a result of the market's shift to mobile platforms, including mobile underground products and services.This Trend Micro research paper highlights how cybercriminals are able to use unsophisticated software to execute high-impact attacks.This research paper offers a look into "Operation Tropic Trooper", an ongoing targeted attack campaign that uses old infiltration tactics to steal state and industry secrets since 2012.This research paper provides an in-depth look at noteworthy IRS tax scam components, how they work, and how taxpayers can avoid becoming victims of fraud.A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper.This research provides a comprehensive look into the security challenges and attacks on critical infrastructure that member states of the Organization of American States had to face in 2014.Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.This research paper offers a look into the activities and methods used by Rocket Kitten, a group behind cyber attacks on Israeli and European organizations