Skip to content

Research and Analysis

The GasPot Experiment

An experiment devised to learn the weaknesses of Gas Tank Monitoring Systems, and why threat actors consider them attractive targets.

Read more (PDF) »

< >

Open all

Bad Ads and Zero Days:

Reemerging Threats Challenge Trust in Supply Chains and Best Practices

The biggest security gaps are the ones often overlooked. At the start of the year, users were subjected to malvertisements with zero-day exploits, expanded ransomware targets, and macro malware attacks on MS Office documents. All of these are reemerging threats begging for concrete security actions that leave no room for error. Find out more from the TrendLabs 1Q 2015 Security Roundup.

View the web version of the Security Roundup

Read the report (PDF)

Targeted Attack Trends: 2014 Annual Report

Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.

Read more (PDF)

A year of destructive cyber attacks highlights the need for cyber-preparedness

The year 2014 was rife with mega breaches, hard-to-patch vulnerabilities, thriving cybercriminal underground economies, and a number of large-scale incidents. Faced with these growing threats, organizations need to plan ahead and be ready to take action instantly. Learn more from 2014 TrendLabs annual security roundup.

TrendLabs 3Q 2014 Security Roundup

Vulnerabilities Under Attack

Vulnerabilities in oft-overlooked but widely used software and devices surfaced in the third quarter of 2014, reiterating the importance of having security in mind. Shellshock and a Netis router vulnerability proved that attackers don't discriminate when it comes to targets. These are just two of the biggest threats that hit users in the past three months though. Find out what other threats reared their ugly heads.

››› More threat reports

  1. The invisible becomes visible: Trend Micro Security predictions for 2015 and beyond
  2. TrendLabs 2Q 2014 Security Roundup
  3. TrendLabs 1Q 2014 Security Roundup
  4. TrendLabs 2013 Annual Security Roundup
  5. Trend Micro predictions for 2014 and beyond
  6. TrendLabs 3Q 2013 Security Roundup
  7. TrendLabs 2Q 2013 Security Roundup
  8. TrendLabs 1Q 2013 Security Roundup (PDF)
  9. 2012 Annual Security Roundup (PDF)
  10. 2012 Mobile Threat and Security Roundup: Repeating history (PDF)
  11. 3Q 2012 Security Roundup: Android under seige: Popularity comes at a price (PDF)
  12. 2Q 2012 Security Roundup: It's big business and it's getting personal (PDF)
  13. 1Q 2012 Security Roundup: Security in the Age of Mobility (PDF)
  14. A Look Back at 2011: Information is Currency (PDF)
  15. 3Q 2011 Threat Roundup (PDF)
  16. Virtualization and Cloud computing - A security best practice guide (PDF)
  17. Virtualization and Cloud Security - Security Threats to Evolving Data Centers (PDF)
  18. Security Focus Report – Spam Trends in Today’s Business World (PDF)
  19. 2Q 2011 Crimeware Report (PDF)
  20. 2Q 2011 Threat Roundup (PDF)
  21. 1Q 2011 Crimeware Report (PDF)
  22. TrendLabs Threat Trends 2010: The Year of the Toolkit (PDF)
  23. FAKEAV - The Growing Problem (PDF)
  24. Trend Micro TrendLabs Global Threat Trends 1H 2010 (PDF)
  25. The Business of Cybercrime: A Complex Business Model (PDF)


Open all

The GasPot Experiment: Unexamined Perils in Using Gas-Tank-Monitoring Systems

Trend Micro experts conduct an experiment devised to learn the weaknesses of Gas Tank Monitoring Systems, and why threat actors consider them attractive targets.

Read more (PDF)

The Russian Underground Today: Automized Infrastructure and Services, Sophisticated Tools

This research paper explores how the Russian cybercriminal underground has evolved to include an increasingly professional infrastructure, services, and processes.

Read more (PDF)

Criminal Hideouts for Lease: Bulletproof Hosting Services

This research paper explores bulletproof hosting services' (BPHS) role in perpetrating cybercrime. Often overlooked, this service makes for perfect criminal hideouts - helping cybercriminals evade law enforcement.

Read more (PDF)

Below the Surface: Exploring the Deep Web

There is more to the Deep Web than drug trade. Get a better understanding of the Deep Web and darknets through our latest investigation.

Read more (PDF)

››› More research papers

  1. A Profile of IRS Scammers: Behind Tax Fraud (PDF)
  2. FighterPOS: The Anatomy and Operation of a New One-Man PoS Malware Campaign (PDF)
  3. Sextortion in the Far East (PDF)
  4. Operation Woolen Goldfish:When Kittens Go Phishing (PDF)
  5. Exploit Kits: Past, present, and future (PDF)
  6. Defending Against PoS RAM Scrapers: Current and Next-Generation Technologies (PDF)
  7. Operation Arid Viper: Bypassing the Iron Dome (PDF)
  8. The South Korean Fake Banking App Scam: The Yanbian Gang Sets Sights on South Koreans
  9. Backdoor use in targeted attacks (PDF)
  10. Finding Holes: Operation Emmental
  11. The Apollo Campaign (PDF)
  12. Suggestions to help companies with the fight against targeted attacks (PDF)
  13. Email correlation and phishing (PDF)
  14. Stealrat: An in-depth look at an emerging spambot (PDF)
  15. Targeted Attacks Detection with SPuNge (PDF)
  16. Windows 8 and Windows RT: New Beginnings (PDF)
  17. Safe: A Targeted Threat (PDF)
  18. Latin American and Caribbean Cybersecurity Trends and Government Responses (PDF)
  19. SCADA in the cloud: A security conundrum? (PDF)
  20. Africa: A new safe harbor for cybercriminals (PDF)
  21. Who's really attacking your ICS equipment (PDF)
  22. Asprox reborn (PDF)
  23. FAKEM RAT: Malware (PDF)
  24. The HeartBeat APT Campaign (PDF)
  25. The Crimeware Evolution (PDF)
  26. Spear-Phishing Email: Most Favored APT Attack Bait (PDF)
  27. Police Ransomware Update (PDF)
  28. Russian Underground 101 (PDF)
  29. Detecting APT Activity with Network Traffic Analysis (PDF)
  30. W32.Tinba (Tinybanker): "The Turkish Incident" (PDF)
  31. The Taidoor Campaign: An In-Depth Analysis (PDF)
  32. Adding Android and Mac OS X Malware to the APT Toolbox (PDF)
  33. Continuous Monitoring in a Virtual Environment (PDF)
  34. Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs—An In-Depth Analysis (PDF)
  35. Automating online banking fraud—automatic transfer system: The latest cybercrime toolkit feature (PDF)
  36. IXESHE: An APT campaign (PDF)
  37. Consumerization of IT - a Trend Micro Technical Brief (PDF)
  38. Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan (PDF)
  39. The "Police Trojan": An In-Depth Analysis (PDF)
  40. The Olympics Change Freeze: Don’t Leave Your Critical Systems Out in the Cold (PDF)
  41. Traffic Direction Systems as Malware Distribution Tools (PDF)
  42. Toward a More Secure Posture for Industrial Control System Networks (PDF)
  43. More traffic, more money: KOOBFACE draws more blood (PDF)
  44. A Look at HTML5 Attack Scenarios (PDF)
  45. Trends in Targeted Attacks (PDF)
  46. Discerning Relationships: The Mexican Botnet Connection (PDF)
  47. Lessons Learned While Sinkholing Botnets - Not as Easy as It Looks! (PDF)
  48. From Russia to Hollywood: Turning the Tables on a SpyEye Cybercrime Ring (PDF)
  49. Dissecting the LURID APT - Campaign, Attacks, Tactics and Victims (PDF)
  50. Targeting the Source: FAKEAV Affiliate Networks (PDF)
  51. Sinkholing Botnets (PDF)
  52. The Dark Side of Trusting Web Searches - From Blackhat SEO to System Infection (PDF)
  53. The Botnet Chronicles – A Journey to Infamy (PDF)
  54. How Blackhat SEO Became Big (PDF)
  55. File-Patching ZBOT Variants - ZeuS 2.0 Levels Up (PDF)
  56. Dissecting the XWM Trojan Kit (PDF)
  57. Understanding WMI Malware (PDF)
  58. Web 2.0 Botnet Evolution - KOOBFACE Revisited (PDF)
  59. ZeuS - A Persistent Criminal Enterprise (PDF)
  60. Unmasking FAKEAV (PDF)
  61. Show Me the Money!: The Monetization of KOOBFACE (PDF)
  62. The Heart of KOOBFACE: C&C and Social Network Propagation (PDF)
  63. The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained (PDF)
  64. A Cybercrime Hub in Estonia (PDF)


Open all

Malicious network communications

What are you overlooking?

APT campaigns aggressively pursue and compromise specific targets to gain control of a company’s computer system for a prolonged period of time. To make a targeted attack successful, the communication channel between a threat actor and the malware inside a network must always remain open and unknown. Know how leveraging threat intelligence can help detect this malicious network traffic by reading this primer.

Read Malicious Network Communications: What Are You Overlooking (PDF)

5 predictions for 2013 and beyond

What should SMBs look out for?

As 2012 drew to a close, SMBs, along with most organizations, should have taken a step back and learned from the past year. With mobile devices fast becoming part of workplaces and the increased availability of cloud services, SMBs should adopt security practices to fully protect their assets. This year, the Android malware volume is expected to hit the 1 million mark. The continuous use of cloud services will also play a key part in the SMB threat environment. This primer runs through five predictions SMBs should take note of.

Read our 5 predictions for SMBs (PDF)

Security threats to business, the digital lifestyle, and the cloud

Trend Micro predictions for 2013 and beyond

In 2013, managing the security of devices, small business systems, and large enterprise networks will be more complex than ever before. Users are breaking down the PC monoculture by embracing a wider variety of platforms, each with its own user interface, OS, and security model. Businesses, meanwhile, are grappling with protecting intellectual property and business information as they tackle consumerization, virtualization, and cloud platforms head-on. This divergence in computing experience will further expand opportunities for cybercriminals and other threat actors to gain profit, steal information, and sabotage their targets’ operations.

Read our 2013 predictions (PDF)

Eco and ego apps in Japan

Users face various unwanted app routines in the current mobile landscape. Given this situation, market owners have taken certain measures like providing safety guidelines, conducting prerelease quality assurance checks, and introducing access permission layers at the OS level. Unfortunately, these are still far from being fool-proof solutions. The reality is: Users are responsible for checking if the apps they download are legitimate or not.

Read Eco and Ego Apps in Japan (PDF)

››› More spotlight articles

  1. The knight fork: defining defense in 2013 (PDF)
  2. Peter the Great vs Sun Tzu (PDF)
  3. How to Thwart the Digital Insider – An Advanced Persistent Response to Targeted Attacks (PDF)
  4. How tough is it to deal with APTs? (PDF)
  5. 12 Security Predictions for 2012 (PDF)
  6. Malicious Redirection: A Look at DNS Changers (PDF)
  7. The Perils that Malvertisements Pose (PDF)
  8. Cashing in on Cybercrime: New Malware Target Bitcoin (PDF)
  9. Online Surveys and Their Irresistible Lures: Why Social Media Users Fall for Scams (PDF)
  10. Android Malware Acts as an SMS Relay: Just the Tip of the Iceberg for AnAndroid Malware Acts as an SMS Relay: Just the Tip of the Iceberg for Android Malwaredroid Malware (PDF)
  11. From Application Guises to FAKEAV: The Evolution of Mac Malware (PDF)
  12. Mobile Landscape: Security Risks and Opportunities (PDF)
  13. Threats to Watch out for During the Tax Season (PDF)
  14. Celebrity News - Roll out the Red Carpet for Cybercrime (PDF)
  15. Cybercriminals Spread Love via Online Threats (PDF)
  16. Top Tips for Safer and More Secure Online Experiences in 2011 (PDF)
  17. 2010 Threats: The Good, the Bad, and the Ugly (PDF)
  18. Trend Micro 2011 Threat Predictions (PDF)
  19. Tis the Season to be Wary (PDF)
  20. Security Dangers of Using Open Wi-Fi Networks (PDF)
  21. From the Virtual Works to Real-World Threats (PDF)
  22. Slipping through the Cracks of Web Services to Serve Malware (PDF)
  23. Mobile Phones Emerge as Security Threat Targets (PDF)
  24. Why FAKEAV Persist (PDF)
  25. XSS Attack Hits Youtube (PDF)
  26. Avoiding the Whack-a-Mole Anti-Phishing Strategy (PDF)
  27. Security Threats Loom over Online Banking (PDF)
  28. Emerging Malware Business Platforms (PDF)
  29. Popularity Ushers in New Security Threats (PDF)
  30. Issues and Threats that Facebook Users Face (PDF)
  31. The Evolution of Botnets (PDF)
  32. Building Businesses and Potential Threats with Online Social Networks (PDF)
  33. DOWNAD/Conficker: The Case of the Missing Malware (PDF)

Social Media

Connect with us on