10.07.2015 Views

wp-the-south-korean-fake-banking-app-scam

wp-the-south-korean-fake-banking-app-scam

wp-the-south-korean-fake-banking-app-scam

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

THE SOUTH KOREANFAKE BANKING APPSCAMThe Yanbian Gang Sets Sights on South KoreansSimon HuangMobile Threat Research Team


CONTENTSIntroduction............................................................................................... 1The Yanbian Gang................................................................................ 2Where Did <strong>the</strong> Gang Get Its Name?................................................. 2Who Are <strong>the</strong> Gang’s Members?....................................................... 2The Organizer............................................................................... 2Translators.................................................................................... 2Cowboys....................................................................................... 3Malware Creators......................................................................... 3How Does <strong>the</strong> Gang Operate?......................................................... 3What Types of Android Malware Did <strong>the</strong> Gang Use?....................... 4Fake Banking Apps....................................................................... 5Apps That Hijack Mobile Banking Sessions................................. 7Fake Versions of Popular Apps.................................................... 8Fake Google Apps.................................................................... 9Fake Porn Apps........................................................................ 9O<strong>the</strong>r Fake Apps....................................................................... 9How Did <strong>the</strong> Gang Infect Victims’ Devices?....................................... 10SMS Phishing................................................................................. 10Via O<strong>the</strong>r Malware.......................................................................... 10Internet Police Scare Tactic........................................................ 10Fake “The Interview” App.............................................................11How Do <strong>the</strong> Gang’s C&C Servers Work?........................................11Mobile Banking Malware Trends........................................................ 12Conclusion.............................................................................................. 14References............................................................................................. 15TREND MICRO LEGAL DISCLAIMERThe information provided herein is for generalinformation and educational purposes only. It is notintended and should not be construed to constitutelegal advice. The information contained herein maynot be <strong>app</strong>licable to all situations and may not reflect<strong>the</strong> most current situation. Nothing contained hereinshould be relied on or acted upon without <strong>the</strong> benefitof legal advice based on <strong>the</strong> particular facts andcircumstances presented and nothing herein shouldbe construed o<strong>the</strong>rwise. Trend Micro reserves <strong>the</strong>right to modify <strong>the</strong> contents of this document at anytime without prior notice.Translations of any material into o<strong>the</strong>r languagesare intended solely as a convenience. Translationaccuracy is not guaranteed nor implied. If anyquestions arise related to <strong>the</strong> accuracy of atranslation, please refer to <strong>the</strong> original languageofficial version of <strong>the</strong> document. Any discrepanciesor differences created in <strong>the</strong> translation are notbinding and have no legal effect for compliance orenforcement purposes.Although Trend Micro uses reasonable efforts toinclude accurate and up-to-date information herein,Trend Micro makes no warranties or representationsof any kind as to its accuracy, currency, orcompleteness. You agree that access to and useof and reliance on this document and <strong>the</strong> content<strong>the</strong>reof is at your own risk. Trend Micro disclaims allwarranties of any kind, express or implied. Nei<strong>the</strong>rTrend Micro nor any party involved in creating,producing, or delivering this document shall be liablefor any consequence, loss, or damage, includingdirect, indirect, special, consequential, loss ofbusiness profits, or special damages, whatsoeverarising out of access to, use of, or inability to use,or in connection with <strong>the</strong> use of this document, orany errors or omissions in <strong>the</strong> content <strong>the</strong>reof. Useof this information constitutes acceptance for use inan “as is” condition.


The South Korean Fake Banking App ScamResearch PaperINTRODUCTIONIn 2014, we took a close look at <strong>the</strong> Chinese underground market and found that itcontinued to thrive. But what we did not see was that even cybercriminals in remoteparts of <strong>the</strong> country—Yanbian—were successfully profiting from <strong>the</strong> Android mobile<strong>banking</strong> customers in a neighboring country—South Korea.What we have dubbed <strong>the</strong> “Yanbian Gang” has successfully been siphoning millionsfrom <strong>the</strong>ir victims’ accounts since 2013. The hackers used <strong>fake</strong> <strong>banking</strong> and o<strong>the</strong>rpopular <strong>app</strong>s to victimize more than 4,000 South Korean Android mobile <strong>banking</strong>customers throughout 2013 and 2014. They also used effective social engineeringlures like “The Interview” to bait victims into installing <strong>the</strong>ir <strong>fake</strong> <strong>app</strong>s.This research paper provides in-depth information on <strong>the</strong> Yanbian Gang’s structure,operations, and prowess.The Yanbian Gang hasbeen siphoning millionsfrom <strong>the</strong>ir victims’accounts since 2013.1 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperTHE YANBIAN GANGWhere Did <strong>the</strong> Gang Get ItsName?The gang featured in this paper operatefrom <strong>the</strong> Yanbian Prefecture in Jilin, China,located north of <strong>the</strong> North Korean border,hence <strong>the</strong> name “Yanbian Gang.” [1] Although<strong>the</strong> prefecture’s economy primarily relies onagriculture, attacks recently instigated by agang of hackers hailing from it put Yanbian on<strong>the</strong> security industry’s radar. [2] Much like <strong>the</strong>rest of <strong>the</strong> cybercriminals in China, membersof <strong>the</strong> Yanbian Gang may have learned fromso-called masters or baishis who passed on<strong>the</strong>ir blackhat skills and know-how to <strong>the</strong>ir<strong>app</strong>rentices or shoutus. [3]Who Are <strong>the</strong> Gang’s Members?Cybercriminal gangs typically have several members who play certain roles toinstigate impactful attacks. The Yanbian Gang, in particular, comprises four majorplayers or groups—<strong>the</strong> organizer, translators, cowboys, and malware creators.Map of <strong>the</strong> YanbianPrefecture in Jilin, ChinaTHE ORGANIZERThe organizer can be considered <strong>the</strong> foundingfa<strong>the</strong>r of a hacker gang. He scouts for andrecruits its members. Although he is notexpected to be a technical expert, he should bevery familiar with <strong>the</strong> cybercrime business. [4]He should know what kind of people he needsto hire for <strong>the</strong> attacks he has planned.The members of a hacker gang do not necessarily need to know one ano<strong>the</strong>r. Theydo not need to directly communicate with <strong>the</strong>ir peers. But <strong>the</strong>y all communicate with<strong>the</strong> organizer, which makes <strong>the</strong> latter an indispensable gang member.TRANSLATORSThe Yanbian Gangis made up of anorganizer, a translator, acowboy, and a malwarecreator.Translators localize threats, depending on what countries <strong>the</strong>y wish to target. In<strong>the</strong> case of <strong>the</strong> threat featured in this paper, <strong>the</strong> translators used Korean for <strong>the</strong>ir2 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch Paperspecially crafted text messagesand even <strong>the</strong> malicious file’s userinterface (UI). A hacker gang canhave more than one translator,especially if it wishes to targetpotential victims that speak morethan one language.COWBOYSCowboys reside in <strong>the</strong> samecountries as <strong>the</strong>ir attacks’ intendedvictims. They are responsible forcollecting <strong>the</strong> proceeds from successful attacks and giving <strong>the</strong>m to <strong>the</strong> organizer. In<strong>the</strong> featured threat’s case, <strong>the</strong> cowboys were from South Korea.Cowboys use so-called black or fridge cards to evade law enforcement. Black orfridge cards are bank cards that cannot be traced back to <strong>the</strong> cowboys or anyone<strong>the</strong>y know. That way, even if <strong>the</strong> cards were found suspicious, <strong>the</strong>y cannot be used toidentify <strong>the</strong>ir users.Chinese hackers trade black or fridge cards via QQ Chat groups. Interested buyerscan purchase such cards for around US$725 or KRW800,000* each.Sample QQ chat groupsthat illegally trade blackor fridge cardsMALWARE CREATORSMalware creators, <strong>the</strong> malicious <strong>app</strong>developers in this case, are probably <strong>the</strong> mostimportant members of <strong>the</strong> gang, as <strong>the</strong> successof an attack largely depends on how effective<strong>the</strong>ir malicious creations are.Mobile malware should continuously evolve to infect as many user devices aspossible while evading detection by security solutions. It is <strong>the</strong> malware creators’responsibility to stay abreast of security developments in order to create effectivemalware, which determine <strong>the</strong> success of an attack.A hacker gang can have more than one malware creator. Most malware, in fact,were created by several people, each with his own field of expertise. Hackers can beseen publicly recruiting malware cocreators in bulletin board systems (BBSs) or chatgroups.How Does <strong>the</strong> Gang Operate?Black or fridge cardscost around US$725 in<strong>the</strong> black market.The Yanbian Gang’s operator previously worked as an <strong>app</strong>rentice in ano<strong>the</strong>r hackergang where he learned about <strong>the</strong> cybercrime business. He probably met most ofhis new gang’s members through his former master who was most likely his former* Exchange rate used (2 February 2015): US$1 = KRW1,1033 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch Papergang’s organizer. He recruited o<strong>the</strong>rs and communicated with all of <strong>the</strong> gang’smembers via underground QQ Chat groups.As far as research revealed, <strong>the</strong> Yanbian Gang only had one translator. But he couldbe working with several gangs at <strong>the</strong> same time. He does all of his transactions with<strong>the</strong> organizer via QQ Chat as well. Unlike most of <strong>the</strong> o<strong>the</strong>r members of <strong>the</strong> gang,however, he gets a fixed salary instead of a share of <strong>the</strong> profits.The Yanbian Gang also had just one cowboywho lives in South Korea. Like <strong>the</strong> translator,he most likely communicated with <strong>the</strong> organizervia QQ Chat and phone calls. Though it wasnot clear how <strong>the</strong> cowboy sent <strong>the</strong> attackCowboys can get asmuch as 40–95% of agang’s earnings.proceeds to <strong>the</strong> organizer, he most likely bought black or fridge cards from o<strong>the</strong>rhackers. As far as gangs go, cowboys or those who directly handle cash get a prettyhuge share of <strong>the</strong> profit—40‒95%. They are, after all, take <strong>the</strong> greatest amount of riskbecause <strong>the</strong>y could be tracked if law enforcers decide to follow <strong>the</strong> money trail.The gang also had just one malware creator who communicated with and submittedhis creations to <strong>the</strong> organizer also via QQ Chat. Like <strong>the</strong> translator, he did not directlyget a share of <strong>the</strong> profit, instead he gets a monthly salary as agreed upon when hewas hired.Cowboys collect money made from victimizing users via black or fridge cards. They<strong>the</strong>n transfer <strong>the</strong> proceeds to <strong>the</strong> organizer’s bank account. Investigation resultsrevealed that tens of thousands are transferred from <strong>the</strong> cowboys’ to <strong>the</strong> operator’saccounts each day.Sample QQ Chatmessages by hackersrecruiting malwarecocreators (left)*;sample conversationswith cowboys indicatinghow much share of <strong>the</strong>profit <strong>the</strong>y get (right)What Types of Android Malware Did <strong>the</strong> Gang Use?Note that all of <strong>the</strong> Android malware that <strong>the</strong> Yanbian Gang used in <strong>the</strong>ir attacks werenot available for download on Google Play or any third-party <strong>app</strong> site. They wereonly distributed through malicious text messages or downloaded by o<strong>the</strong>r malware.* Exchange rate used (2 February 2015): US$1 = RMB64 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperThe <strong>fake</strong> <strong>app</strong>s exhibited <strong>the</strong> following behaviors:• Designed and implemented a novel software-based AIS transmittercalled “AISTX”• Uploaded stolen user information, including mobile phone numbers;account names and numbers; and login credentials, to designatedcommand-and-control (C&C) servers• Wait for certain text messages that contain hacker commands toexecute• Block incoming text messages with control commands that do notcome from <strong>the</strong> gang or whose content and sender numbers matchcertain rules <strong>the</strong> hackers set on <strong>the</strong>ir C&C serversSender number rules block messages like verification codes sent bytarget banks. This allows <strong>the</strong> hackers to get <strong>the</strong> codes <strong>the</strong>y will need tosteal victims’ money while keeping <strong>the</strong> <strong>the</strong>ft secret from <strong>the</strong> victims.• Steal and upload stolen text messages to designated C&C serversThe C&C servers <strong>the</strong> Android malware accessed revealed close relationshipsamong <strong>the</strong> malicious files. Our experiment revealed a total of 38 C&C serverslocated in different countries. Among <strong>the</strong>se, 26 were accessed by two or moreCode that tells <strong>the</strong> malwareto upload confidential userinformation to a C&C server (firstrow-left), wait for text messagesthat contain commands toexecute (first row-right), blocktext messages that containcontrol commands (second rowleft),and block text messagesthat contain words or sendernumbers that match certain rulesmade by <strong>the</strong> hackers (secondrow-right); body rules usuallyblock text messages containingcertain keywords used by controlcommands like cmd_send_sms(third row-left); code that tells<strong>the</strong> malware to steal and uploadstolen text messages to C&Cservers (third row-right)6 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch Papermalware. Clearly, <strong>the</strong> members of <strong>the</strong> Yanbian Gang are exerting a lot of effort totarget certain South Korean banks’ customers. Evidence shows that <strong>the</strong>y are wellorganized,constantly improve <strong>the</strong>ir malware, and ensure that <strong>the</strong>ir C&C servers arealways active.APPS THAT HIJACK MOBILE BANKING SESSIONSMap showingrelationships among <strong>the</strong>Android malware basedon <strong>the</strong> C&C servers <strong>the</strong>yaccessedAndroid <strong>app</strong>s that hijack mobile <strong>banking</strong> sessions are designed to target severalbanks at once. They mimic <strong>the</strong>ir targets’ icons to dupe bank customers into thinking<strong>the</strong>y are <strong>the</strong> real thing. Faking Android <strong>app</strong>s almost guarantees downloads and7 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch Paperinstallations due to <strong>the</strong> vast majority of <strong>the</strong> platform’s users. [5]Android malware have BroadcastReceiver that could trigger various actions. [6] Thisclass starts several background services, one of which monitors all currently running<strong>app</strong>s. It triggers certain malicious actions in <strong>the</strong> <strong>fake</strong> <strong>app</strong>s’ case every time an <strong>app</strong>of one of <strong>the</strong> banks it monitors is used. It allows a <strong>fake</strong> <strong>app</strong> to replace a legitimateone. The <strong>fake</strong> <strong>app</strong>’s UI <strong>the</strong>n logs all of <strong>the</strong> affected user’s inputs—account number,user name, password, and o<strong>the</strong>r personallyidentifiable information (PII)—and uploads <strong>the</strong>stolen data to a C&C server.One sample targeted 17South Korean banks.One of <strong>the</strong> samples we analyzed for this papertargeted 17 South Korean banks based onits code. They also had all of <strong>the</strong> target banks’ UIs to add to <strong>the</strong>ir credibility. Theyintercepted text messages coming from and sent to <strong>the</strong> target banks, which were<strong>the</strong>n uploaded to <strong>the</strong> hackers’ C&C servers.Sample actions thatBroadcastReceivertriggers (left); code thatallows <strong>the</strong> <strong>fake</strong> <strong>banking</strong><strong>app</strong> to take <strong>the</strong> legitimate<strong>app</strong>’s place (top-right);code that shows whatbanks <strong>the</strong> <strong>fake</strong> <strong>app</strong>starget (bottom-right)FAKE VERSIONS OF POPULAR APPSApart from directly spoofing <strong>banking</strong> <strong>app</strong>s, cybercriminals also <strong>fake</strong> o<strong>the</strong>r <strong>app</strong>s thatare downloaded by many Android users. Examples of <strong>the</strong>se are <strong>the</strong> Google Playand Search and <strong>the</strong> Adobe® Flash® Player as well as porn <strong>app</strong>s. To better evadedetection, some of <strong>the</strong>m delete <strong>the</strong>ir icons but make sure that when <strong>the</strong> icons of <strong>the</strong>irlegitimate counterparts are clicked, <strong>the</strong> <strong>fake</strong> UIs are opened. Like <strong>the</strong> <strong>fake</strong> <strong>banking</strong><strong>app</strong>s, <strong>the</strong>se also silently run malicious behaviors in <strong>the</strong> background. Some downloadand install o<strong>the</strong>r malicious <strong>app</strong>s, delete files and folders, record text messages, takephotos, steal files, and o<strong>the</strong>rs, depending on what <strong>the</strong>ir creators want <strong>the</strong>m to do.8 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperFake Google AppsGoogle <strong>app</strong>s were most commonly spoofed totarget South Korean bank customers. We took alook at a total of 1,007 <strong>fake</strong> Google <strong>app</strong> versions,994 of which were <strong>fake</strong> versions of <strong>the</strong> GooglePlay <strong>app</strong> while <strong>the</strong> remaining 13 were <strong>fake</strong>versions of o<strong>the</strong>r Google <strong>app</strong>s. Cybercriminalsmost likely spoofed Google <strong>app</strong>s because <strong>the</strong>ynormally came preinstalled in every Androidmobile device. The <strong>fake</strong> <strong>app</strong>s sported <strong>the</strong> Google<strong>app</strong>s’ icons, which were deleted after installation.Fake Porn AppsFake <strong>banking</strong> <strong>app</strong>s also came in <strong>the</strong> guise ofpopular porn <strong>app</strong>s with lewd icons and namesand eye-catching descriptions like “sexy womenphotos” and “porn movies.” They hardly everdeliver on <strong>the</strong>ir promise though when run. All <strong>the</strong>ydo, in fact, is steal and upload victims’ mobile<strong>banking</strong> credentials to C&C servers.O<strong>the</strong>r Fake AppsCybercriminals also use <strong>fake</strong> versions of o<strong>the</strong>rpopular <strong>app</strong>s, including utilities, chat, portal,and security <strong>app</strong>s to infect South Koreanvictims’ devices and steal <strong>the</strong>ir mobile <strong>banking</strong>credentials.Images a singlemalicious <strong>app</strong> thathijacks banks’ UIs used(right); sample iconsof <strong>fake</strong> porn and o<strong>the</strong>r<strong>app</strong>s that steal SouthKorean’s mobile <strong>banking</strong>credentials (lef)9 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperFAKE “THE INTERVIEW” APPCybercriminals are also known for using hot Hollywood topics or much-talked-aboutmovies as lure to trick potential victims into downloading malware. One of <strong>the</strong> 2014movies <strong>the</strong>y spoofed to distribute malware that stole South Korean victims’ mobile<strong>banking</strong> credentials was “The Interview.” This particular <strong>app</strong> had a very simple UIwith two buttons that, when clicked, downloaded malware onto <strong>the</strong> users’ devices.Sample malicious <strong>app</strong>control panels <strong>the</strong>Yanbian Gang usedHow Do <strong>the</strong> Gang’s C&C Servers Work?The malware featured in this paper were primarily remote access tools (RATs). Eachhad a control panel that allowed <strong>the</strong> gang members to remotely go through and takecontrol of victims’ devices.11 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperMOBILE BANKING MALWARE TRENDSWe observed an exponential increase starting January 2014 in <strong>the</strong> number ofAndroid <strong>banking</strong> malware detected from May 2013 to December 2014. This could bedue to <strong>the</strong> <strong>app</strong>arent malware source code sharing among cybercriminals particularlyin Yanbian. In response, Trend Micro created heuristic detection patterns, whichresulted in a decrease in <strong>the</strong> number of mobile <strong>banking</strong> malware after April 2014.Only <strong>the</strong> more highly skilled cybercriminals were able to push through with <strong>the</strong>irattacks.Relationships between Android malware and C&C servers were <strong>the</strong>n determined.Each point in <strong>the</strong> following figure refers to a malware variant that accesses specificC&C servers marked by IP addresses. Seven significant C&C servers that hostedhuge numbers of Android malware were found. These pointed to two different activehacker gangs.A total of 174 mobile malware variantsaccessed 1.234.38.88. These also accessed74 o<strong>the</strong>r servers. An additional 583 variantsaccessed 75 C&C servers, 11 of which hostedmore than 10 variants each.174 Android malwareaccessed a particularserver, apart from 74o<strong>the</strong>r servers.The C&C servers <strong>the</strong> mobile malware accessed at certain times were <strong>the</strong>n plottedout. As shown, cybercriminals used several C&C servers to host and distributemalware. Before December 2013, several Android malware simultaneously accesseddifferent C&C servers to receive updates, store stolen user information, and remotelycontrol infected devices. After that, however, <strong>the</strong>y only accessed a single server.Finally, <strong>the</strong> cybercriminals have been keeping all of <strong>the</strong> servers active since August2013.The C&C servers <strong>the</strong> Android malware accessed were widely distributed worldwide,so were <strong>the</strong>ir Internet service providers (ISPs). This showed just how much effort<strong>the</strong>ir operators exerted to evade detection by both security solutions and lawenforcement.Mobile <strong>banking</strong> malwaredetections per month(left); map showingrelationships amongAndroid <strong>banking</strong>malware and seven C&Cservers (right)12 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperC&C Server ISP and Country InformationIP Address ISP Country1.234.38.88 SK Broadband South Korea192.151.226.138 Radium Hosting China110.34.233.250 VPLS Thailand192.151.226.133 Radium Hosting China118.10.42.251 Open Computer Network JapanNumber of Androidmalware accessinga C&C server at acertain date and time(top-left); a particularAndroid malware sampleaccessing severalservers on certain dates(top-right); comparisonof Android <strong>banking</strong>malware samples fromOctober 2013 andFebruary 2014 (top)103.228.66.249 Undisclosed Hong KongTwo Android malware variants targeting <strong>the</strong>customers of South Korean banks from onefamily were chosen for a comparison. The firstwas detected in October 2013 while <strong>the</strong> o<strong>the</strong>rwas seen in February 2014. The second samplehad six more classes than <strong>the</strong> first, clearlyindicating improvements. The newly added class,BankScardActivity, allowed <strong>the</strong> Android malware tocompress and upload mobile <strong>banking</strong> information to<strong>the</strong> hackers’ C&C servers.13 © 2015 Trend Micro Incorporated


The South Korean Fake Banking App ScamResearch PaperREFERENCES[1] Wikimedia Foundation, Inc. (11 December 2014). Wikipedia. “Yanbian KoreanAutonomous Prefecture.” Last accessed 29 January 2015, http://en.wikipedia.org/wiki/Yanbian_Korean_Autonomous_Prefecture.[2] China Knowledge Online. (2014). China Knowledge. “Yanbian (Jilin) CityInformation.” Last accessed 29 January 2015, http://www.chinaknowledge.com/CityInfo/City.aspx?Region=NorthEast&City=Yanbian.[3] Trend Micro Incorporated. (4 September 2012). TrendLabs Security IntelligenceBlog. “The Chinese Underground , Part 5: Blackhat Techniques, Tools, andTraining.” Last accessed 29 January 2015, http://blog.trendmicro.com/trendlabssecurity-intelligence/<strong>the</strong>-chinese-underground-part-5-blackhat-techniques-tools-andtraining/.[4] Trend Micro Incorporated. (2014). Trend Micro Security News. “CybercriminalUnderground Economy Series.” Last accessed 29 January 2015, http://www.trendmicro.com/vinfo/us/security/special-report/cybercriminal-undergroundeconomy-series/index.html.[5] IDC. (2015). IDC. “Smartphone OS Market Share, Q3 2014.” Last accessed on 4February 2015, http://www.idc.com/prodserv/smartphone-os-market-share.jsp.[6] Google. (2015). Android Developers. “BroadcastReceiver.” Last accessedon 4 February 2015, http://developer.android.com/reference/android/content/BroadcastReceiver.html.[7] Lion Gu. (2014). Trend Micro Security Intelligence. “The Mobile CybercriminalUnderground Market in China.” Last accessed on 5 February 2015, http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/<strong>the</strong>-mobilecybercriminal-underground-market-in-china.[8] Max Goncharov. (2014). Trend Micro Security Intelligence. “Russian UndergroundRevisited.” Last accessed on 6 February 2015, http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/russian-underground-prices-drop-butproducts-get-specialized.[9] Lion Gu. (2014). Trend Micro Security Intelligence. “The Chinese Underground in2013.” Last accessed on 6 February 2015, http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/<strong>the</strong>-chinese-underground-in-2013.[10] Fernando Mercês. (2014). Trend Micro Security Intelligence. “The BrazilianUnderground Market: The Market for Cybercriminal Wannabes?” Last accessed on6 February 2015, http://www.trendmicro.com/vinfo/us/security/news/cybercrime-anddigital-threats/brazilian-underground-market-for-cybercriminal-wannabes.15 © 2015 Trend Micro Incorporated


Trend Micro Incorporated, a global leader in security software, strives to make <strong>the</strong>world safe for exchanging digital information. Our innovative solutions for consumers,businesses and governments provide layered content security to protect informationon mobile devices, endpoints, gateways, servers and <strong>the</strong> cloud. All of our solutionsare powered by cloud-based global threat intelligence, <strong>the</strong> Trend Micro SmartProtection Network, and are supported by over 1,200 threat experts around <strong>the</strong>globe. For more information, visit www.trendmicro.com.©2015 by Trend Micro, Incorporated. All rights reserved. Trend Micro and <strong>the</strong>Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro,Incorporated. All o<strong>the</strong>r product or company names may be trademarks or registeredtrademarks of <strong>the</strong>ir owners.225 E. John Carpenter FreewaySuite 1500Irving, Texas75062 U.S.A.Phone: +1.817.569,8900

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!