The Trend Micro Underground Series

Over the years, Trend Micro researchers have published articles and research papers that detail different criminal underground communities around the world. Read about their motives, ecosystems, business models, and techniques to anticipate and proactively counter threats before they strike.

Trend Micro’s Cybercrime Underground series represents an ongoing commitment to shed light into the dark world of cybercrime from as far back as 2011. Over the years we have shared details learned from extensive research on regional corners of the criminal underground, including their infrastructure and changing business models, covering several evolutions of specific regional undergrounds and major updates within those communities. Collectively, these publications represent thousands of pages of insight for those looking to defend themselves and their organizations from cybercrime today and the future. We answer one important question — how do criminals think?

This strategic knowledge of cybercrime motives, ecosystems, business models, and techniques not only helps security teams anticipate and proactively counter threats before they strike; but also empowers business leaders to make informed, strategic decisions about risk, resilience, and investment in cybersecurity.

This page, which coincides with the release of the 50th publication in the series (an in-depth update on the Russian-speaking underground) in April 2024, brings all these publications together in one place. The series contains the unique, collective knowledge of Trend Micro’s top threat researchers, whose experience and expertise provide a useful resource for those studying how to combat cybercrime for years to come. It is through deep understanding of the past, that all our readers can help us move towards Trend’s vision of a world safe for the exchange of digital information.

    1. 2026 Old Vulnerabilities, New AI Era, Amplified Risk: How Outdated Flaws Continue to Fuel the N-Day Exploit Market
    2. 2026 An Update on the State of Criminal AI
    3. 2025 The Next Phase of Cybercrime: Agentic AI and the Shift to Autonomous Criminal Operations
    4. 2025 Unmasking Task Scams to Prevent Financial Fallout From Fraud
    5. 2025 The Russian-Speaking Underground
    6. 2025 Understanding Hacktivists
    7. 2025 The Spanish Cybercriminal Underground
    8. 2025 The English Underground
    9. 2024 An Update on the Rising Abuse of GenAI
    10. 2023 An Update on Cybercriminals and GenAI
    11. 2023 AI in the Cybercriminal Underground
    12. 2023 The Structure of Modern Cybercrime Organizations
    13. 2023 The Gender-Equal Cybercriminal Underground
    14. 2021 Trends and Shifts in the Underground N-Day Market
    15. 2021 Modern Ransomware’s Double Extortion Tactics
    16. 2020 Inside the Bulletproof Hosting Business
    17. 2020 The Underground Services Market for Cybercriminals
    18. 2020 Hacker Infrastructure and Underground Hosting
    19. 2019 Threats to the eSports Industry
    20. 2019 IoT in the Cybercrime Underground
    21. 2019 Shifts in the Cybercrime Underground
    22. 2019 Trust and Ethics in Underground Forums
    23. 2018 Examining the Thriving Underground Software Business
    24. 2018 Ethics Need Not Apply: The Dark Side of Law
    25. 2018 Trends in the Middle East and North Africa Underground
    26. 2018 Evolution of Cybercrime
    27. 2018 The Rise and Fall of {Scan4You}
    28. 2018 How Hackers Abuse Surveillance Cameras
    29. 2017 Cybercriminals Touring the World
    30. 2017 The Middle Eastern and North African Underground
    31. 2017 BPC and Coupon Fraud
    32. 2017 The West African Underground
    33. 2016 Selling Online Gaming Currency
    34. 2016 The French Underground
    35. 2016 Cybercrime and the Deep Web
    36. 2016 The Brazilian Cybercriminal Underground
    37. 2015 The German Cybercriminal Underground
    38. 2015 North American Underground
    39. 2015 The Chinese Cybercriminal Underground in 2015
    40. 2015 Japan's Unique Cybercriminal Economy
    41. 2015 The Russian Underground Today
    42. 2015 Cybercriminal Hideouts for Lease
    43. 2015 Exploring the Deep Web
    44. 2015 Sextortion in the Far East
    45. 2014 The Brazilian Underground Market
    46. 2014 The Chinese Underground in 2013
    47. 2014 The Chinese Mobile Cybercriminal Underground
    48. 2013 The Chinese Underground Market
    49. 2013 Deepweb and Cybercrime
    50. 2013 Cybersecurity in Brazil
    51. 2013 Latin American and Caribbean Trends
    52. 2013 African Underground
    53. 2012 Russian Underground 101
    54. 2011 Malware Distribution
Regional Underground
Deepweb
Mobile
Criminal Infrastructure
Gaming
Criminal Business Models
AI
HIDE

Like it? Add this infographic to your site:
1. Click on the box below.   2. Press Ctrl+A to select all.   3. Press Ctrl+C to copy.   4. Paste the code into your page (Ctrl+V).

Image will appear the same size as you see above.