Category Archives: Cybercrime and Cyber Attacks

Machine learning and the fight against ransomware

Ransomware is everywhere. The number of emails containing ransomware rose 6,000 percent since 2015. In 2016, 40 percent of all spam emails had one of these malicious programs hidden within, according to IBM. Other reports highlight the sophistication of ransomware nowadays and it’s financial impact on organizations that that become victims. In short, it’s all bad news. Or not?

Continue reading

Don’t think of keeping them out, they’re probably already in

According to American media unidentified hackers recently breached at least one US critical infrastructure. “Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities.” (The New York Times, July 6th)

“Today we see more attacks on ICS, industrial control systems, and scada systems”, says Robert McArdle, EMEA Threat Research Lead at Trend Micro.

Continue reading

Industrial Robots are hackable: how do we fix them?

Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now form a vital cog in the manufacturing process of everything from silicon chips to cars and even glassware.

Continue reading

Banking malware steals money, but ransomware removes your past

For years hackers have been stealing documents from your machines. No matter what… hackers will always find a way to get in. But once they get in, their problems start: how to monetize the hacked device? Of course passwords, credit card and banking details are relatively easy to monetize.

Continue reading

Fake news for sale

A ground-breaking new study from Trend Micro has revealed for the first time the size and maturity of the online fake news business, where a 12-month campaign to influence the result of an election could cost as little as €357.700.

The comprehensive 77-page report breaks down the key steps used to influence public opinion: from reconnaissance of the target audience and weaponisation – preparation of the fake story – to delivery and exploitation via social media, and sustainment with additional propaganda.  Continue reading

Is Wannacry a general rehearsal for a much bigger attack?

The Wannacry ransomware has been keeping us busy for several days now. This software has infected systems worldwide by exploiting an older (already patched) Windows vulnerability. Though many may wonder how a vulnerability that has been patched can still infect so many systems worldwide, it appears that the attack hasn’t brought in much money yet. Considering the attack and the errors made by the criminals, I wonder if this attack hasn’t been a first test or a general rehearsal for a much bigger attack.  Continue reading

The Dark Web: what’s beneath the tip of the iceberg?

Have you ever thought of the internet as an iceberg? There are some good reasons to do so. What we can see is only a minor part of the total internet. Underneath is an invisible part, which forms the majority of the internet sites worldwide. We call this invisible part the ‘deep web’, with part of it being the ’dark web’. Deep and dark, like… the underwater part of an iceberg, indeed. Continue reading

Pawn Storm: Back with a Vengeance to Target French Presidential Hopeful Macron

Blog by Ross Dyer, Technical Director at Trend Micro

Thought you’d seen the last of prolific hacking group Pawn Storm? Think again. Just-published research from Trend Micro reveals fascinating new insights into one of the world’s longest-running cyber espionage groups. As politicians in the US continue to argue over the impact of its audacious campaign against Democratic Party officials last year, Pawn Storm is at it again, attempting to influence public option ahead of major elections in France and Germany. Continue reading

Worry-Free Services, powered by XGen Security

 According to a recent committee hearing by the House Small Business Committee, nearly 60 percent of small companies go out of business within six months following a hack and 71 percent of all cyber assaults occur at businesses with under 100 workers.  Our own data at Trend Micro indicates that small businesses are not immune from cyberattacks. In fact, small businesses are generally regarded as being more susceptible to attacks due to lack of dedicated security personnel and minimal investment in security software and hardware. Continue reading