Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-24Trend MicroCifer Fang, Vladimir Kropotov, Loseway Lu, Qi Sun, Fyodor Yarochkin
@techreport{fang:20220324:keeping:45451fa, author = {Cifer Fang and Vladimir Kropotov and Loseway Lu and Qi Sun and Fyodor Yarochkin}, title = {{Keeping Assets Safe From Cryptocurrency Scams and Schemes (Technical Brief)}}, date = {2022-03-24}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/c/an-investigation-of-cryptocurrency-scams-and-schemes/technical_brief_keeping_assets_safe_from_cryptocurrency_scams_and_schemes.pdf}, language = {English}, urldate = {2022-03-28} } Keeping Assets Safe From Cryptocurrency Scams and Schemes (Technical Brief)
2022-02-16Trend MicroZhengyu Dong, Ryan Flores, Vladimir Kropotov, Paul Pajares, Fyodor Yarochkin
@online{dong:20220216:sms:96151cc, author = {Zhengyu Dong and Ryan Flores and Vladimir Kropotov and Paul Pajares and Fyodor Yarochkin}, title = {{SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification}}, date = {2022-02-16}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/22/b/sms-pva-services-use-of-infected-android-phones-reveals-flaws-in-sms-verification.html}, language = {English}, urldate = {2022-03-02} } SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2021-11-13Trend MicroIan Kenefick, Vladimir Kropotov
@online{kenefick:20211113:qakbot:3138b93, author = {Ian Kenefick and Vladimir Kropotov}, title = {{QAKBOT Loader Returns With New Techniques and Tools}}, date = {2021-11-13}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/k/qakbot-loader-returns-with-new-techniques-and-tools.html}, language = {English}, urldate = {2021-11-17} } QAKBOT Loader Returns With New Techniques and Tools
QakBot
2021-11-12Trend MicroIan Kenefick, Vladimir Kropotov
@techreport{kenefick:20211112:prelude:781d4d7, author = {Ian Kenefick and Vladimir Kropotov}, title = {{The Prelude to Ransomware: A Look into Current QAKBOT Capabilities and Global Activities}}, date = {2021-11-12}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/pdf/Technical-Brief---The-Prelude-to-Ransomware-A-Look-into-Current-QAKBOT-Capabilities-and-Activity.pdf}, language = {English}, urldate = {2021-11-17} } The Prelude to Ransomware: A Look into Current QAKBOT Capabilities and Global Activities
QakBot
2021-06-08Trend MicroMayra Fuentes, Feike Hacquebord, Stephen Hilt, Ian Kenefick, Vladimir Kropotov, Robert McArdle, Fernando Mercês, David Sancho
@techreport{fuentes:20210608:modern:a5dd52c, author = {Mayra Fuentes and Feike Hacquebord and Stephen Hilt and Ian Kenefick and Vladimir Kropotov and Robert McArdle and Fernando Mercês and David Sancho}, title = {{Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them}}, date = {2021-06-08}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-modern-ransomwares-double-extortion-tactics.pdf}, language = {English}, urldate = {2021-06-16} } Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them
Nefilim
2021-04-30Trend MicroCedric Pernet, Fyodor Yarochkin, Vladimir Kropotov
@online{pernet:20210430:how:2434ac6, author = {Cedric Pernet and Fyodor Yarochkin and Vladimir Kropotov}, title = {{How Cybercriminals Abuse OpenBullet for Credential Stuffing}}, date = {2021-04-30}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/d/how-cybercriminals-abuse-openbullet-for-credential-stuffing-.html}, language = {English}, urldate = {2021-05-03} } How Cybercriminals Abuse OpenBullet for Credential Stuffing
2021-01-25Trend MicroMatsukawa Bakuei, Marshall Chen, Vladimir Kropotov, Loseway Lu, Fyodor Yarochkin
@online{bakuei:20210125:fake:eeac584, author = {Matsukawa Bakuei and Marshall Chen and Vladimir Kropotov and Loseway Lu and Fyodor Yarochkin}, title = {{Fake Office 365 Used for Phishing Attacks on C-Suite Targets}}, date = {2021-01-25}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/a/fake-office-365-used-for-phishing-attacks-on-c-suite-targets.html}, language = {English}, urldate = {2021-01-27} } Fake Office 365 Used for Phishing Attacks on C-Suite Targets
2020-10-06Trend MicroVladimir Kropotov, Robert McArdle, Fyodor Yarochkin
@techreport{kropotov:20201006:hacker:ddb4108, author = {Vladimir Kropotov and Robert McArdle and Fyodor Yarochkin}, title = {{The Hacker Infrastructure and Underground Hosting: Cybercrime Modi Operandi and OpSec}}, date = {2020-10-06}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-the-hacker-infrastructure-and-underground-hosting-cybercrime-modi-operandi-and-opsec.pdf}, language = {English}, urldate = {2021-11-08} } The Hacker Infrastructure and Underground Hosting: Cybercrime Modi Operandi and OpSec
2020Trend MicroVladimir Kropotov, Robert McArdle, Fyodor Yarochkin
@techreport{kropotov:2020:hacker:34fa1c6, author = {Vladimir Kropotov and Robert McArdle and Fyodor Yarochkin}, title = {{The Hacker Infrastructureand Underground Hosting:Services Used by Criminals}}, date = {2020}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-the-hacker-infrastructure-and-underground-hosting-services-used-by-criminals.pdf}, language = {English}, urldate = {2020-11-09} } The Hacker Infrastructureand Underground Hosting:Services Used by Criminals