Skip to content

Security Research Papers and Articles

More Options

Grounded in APT Facts

Grounded in APT Facts

How much do you know about targeted attacks? View this infographic.

Targeted Attack Trends: 2H 2013 Report

Targeted Attack Trends: 2H 2013 Report

This biannual report presents the targeted attack campaigns observed and mitigated by Trend Micro based on reported customer cases, as well as our own independently gathered data.

open all


Fake Apps: Feigning Legitimacy

As the number of mobile device users grow, so do the number of apps available to their users. However, because cybercriminals always go where the money goes, attacks targeting mobile devices and their users will continuously grow in number as well. That is why there are more and more mobile threats, including malware and fake apps. It has actually become quite common to see fake apps shortly after legitimate mobile or PC versions come out.

Read "Fake Apps: Feigning Legitimacy"


Network Detection Evasion Methods: Blending with Legitimate Traffic


Suggestions to Help Companies with the Fight Against Targeted Attacks


The SCADA That Didn’t Cry Wolf: Who’s Really Attacking Your ICS Equipment? (Part 2)


Targeted Attacks Detection with SPuNge


Safe: A Targeted Threat


Malicious Network Communications: What Are You Overlooking?


FAKEM RAT: Malware Disguised as Windows Messenger and Yahoo! Messenger


The HeartBeat APT Campaign


Spear-Phishing Email: Most Favored APT Attack Bait


Detecting APT Activity with Network Traffic Analysis


How to Thwart the Digital Insider – An Advanced Persistent Response to Targeted Attacks


How Tough Is It to Deal With APTs?


IXESHE: An APT Campaign


Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan

12 Most Abused Android App Permissions

12 Most Abused Android App Permissions

Cybercriminals can exploit Android app permissions for their personal gain. Find out the most commonly requested permissions and how they’re abused in our latest TrendLabs Security Gallery.

The Reality of Cross-Platform Mobile Threats

The Reality of Cross-Platform Mobile Threats

Cross-platform mobile threats are here to stay, and with their capability to jump from users' mobile devices to PCs (and vice versa), protecting against them is a top priority.

Read the Monthly Mobile Review

open all


Fake Apps, Russia, and the Mobile Web: Making the SMS Fraud Connection

News of an SMS fraud service affecting many countries first broke out in Russia in 2010. It has since put users at risk through popular online activities like social networking and downloading content.

Read Fake Apps, Russia, and the Mobile Web


Adding Android and Mac OS X Malware to the APT Toolbox


Eco and Ego Apps in Japan


Android Malware Acts as an SMS Relay

How Attacks Adapt

How Attacks Adapt

As with technology and popular means of communication, cybercriminal attacks and schemes continue to evolve over the years. Find out more…

Online Security for You and Your Family

Online Security for You and Your Family

Everyone's online, but not everyone's secure. It's up to you to make sure that your family is. Learn about online threats and how you can protect your family from these threats here.

open all


On the Actors Behind MEVADE/SEFNIT

In 2013, an Israeli/Ukrainian adware company pushed additional click-fraud malware known as “MEVADE/SEFNIT” into the vast network of computers in which its adware have been installed. This was not an isolated incident; there is strong evidence showing that since early 2011, this adware company has been directly involved in the development of MEVADE/SEFNIT malware. This illustrates the great risk adware pose to Internet users. Adware are often regarded as low-risk threats, but in reality, adware companies can decide to discreetly load dangerous malware onto the computers on which their adware have been installed anytime.

Read "On the Actors Behind MEVADE/SEFNIT"


Cybercriminals Use What Works: Targeted Attack Methodologies for Cybercrime


Cybercriminal Underground Economy Series

Russian Underground Revisited


Cybercriminal Underground Economy Series

The Mobile Cybercriminal Underground Market in China


Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries


From Russia with Love: Behind the Trend Micro-NBC News Honeypots


CPL Malware: Malicious Control Panel Items


"Ice 419": Cybercriminals from Nigeria Use Ice IX and the 419 Scam


Bitcoin Domains


Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market


The Apollo Campaign: A Gateway to Eastern European Banks


Deepweb and Cybercrime: It’s Not All About TOR


Concerns Regarding Flaws in the New DKIM Standard


Brazil: Cybersecurity Challenges Faced by a Fast-Growing Market Economy

Connect with us on