- A Trend Micro research paper that reveals the operations and cybercriminals behind Predator Pain and Limitless Keylogger, which are malware toolkits that are easily obtained from underground forums.This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.Soundsquatting is a domain-squatting technique that takes advantage of similar-sounding words, or homophones, to lead users to malicious websites. This research paper looks into how misheard (and not just misspelled) domain names can spell trouble for unsuspecThe evolution of PoS RAM Scraper malware, from their humble beginnings to the industrialized threats that they've become.Over several months, our researchers monitored the Chinese mobile cybercriminal underground to see what kind of wares cybercriminals were trading. What they found was a diverse set of offerings created to suit different purposes.Trend Micro researchers looked into the way attackers use backdoors to command and control their target networks. So far, our researchers noted that attackers commonly take advantage of these eight backdoor techniques.Nearly 40 of the top 50 free apps in Google Play now have fake counterparts available for download on both official and third-party app stores. These fake apps should not be taken lightly since cyberciminals are now using them in their schemes.Adware are often regarded as low-risk threats, but adware companies can decide to discreetly load dangerous malware onto the computers on which their adware have been installed anytime. The spike in MEVADE/SEFNIT incidences shows how adware can pose great riskEstablished back in 2004, the Russian underground market was the first to offer crimeware to cybercriminals. Up to this day, it continues to thrive and evolve despite the evident drop in market prices.