{"id":389,"date":"2023-06-19T13:16:13","date_gmt":"2023-06-19T13:16:13","guid":{"rendered":"https:\/\/bl0g.cedricpernet.net\/?page_id=389"},"modified":"2024-09-20T18:24:46","modified_gmt":"2024-09-20T16:24:46","slug":"cybercrime-2","status":"publish","type":"page","link":"https:\/\/bl0g.cedricpernet.net\/?page_id=389","title":{"rendered":"Cybercrime"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"389\" class=\"elementor elementor-389\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34a2aef5 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34a2aef5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21e160eb\" data-id=\"21e160eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73d77e2d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"73d77e2d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dd4bb4f elementor-widget elementor-widget-heading\" data-id=\"7dd4bb4f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cyber\nCrime<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4839b3d6\" data-id=\"4839b3d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4493d1d7 elementor-widget elementor-widget-text-editor\" data-id=\"4493d1d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; text-align: center;\"><b>This page lists all public cybercrime-related publications I\u2019ve worked on through tim<\/b><span style=\"font-weight: 600;\">e.<\/span><\/p>\n<h3 style=\"font-style: normal; text-align: center;\">2024<\/h3>\n<div>ICO Scams Leverage 2024 Olympics to Lure Victims, Use AI for Fake Sites <br>&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_fi\/research\/24\/f\/ico-scams-leverage-2024-olympics-to-lure-victims-use-ai-for-fake.html\">Full research<\/a><br><\/div>\n<p>Journalists about it: <a href=\"https:\/\/thecyberexpress.com\/scammers-promoting-fake-olympics-coin-icos\/\">The Cyber Express<\/a> &#8211; <a href=\"https:\/\/app.daily.dev\/posts\/ico-scams-leverage-2024-olympics-to-lure-victims-use-ai-for-fake-sites-ntowlulb8\">Daily Dev<\/a> &#8211; <a href=\"https:\/\/www.globalsecuritymag.com\/trend-micro-ico-scams-leverage-2024-olympics-to-lure-victims-use-ai-for-fake.html\">Global Security Mag<\/a><br><\/p>\n<p style=\"font-size: 16px; font-style: normal; text-align: center;\">\n<\/p><h3 style=\"font-style: normal; text-align: center;\">2023<\/h3>\n<div>How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime<br>&nbsp;<a href=\"https:\/\/www.trendmicro.com\/fr_fr\/research\/23\/j\/how-kopeechka--an-automated-social-media-accounts-creation-servi.html\">Full research<\/a><br><\/div>\n<p>Journalists about it: <a href=\"https:\/\/therecord.media\/russian-hacking-tool-creates-bots\">TheRecord<\/a> &#8211; <a href=\"https:\/\/fr.news.yahoo.com\/programme-russe-cr%C3%A9e-centaines-faux-162027123.html\">Yahoo! News<\/a> &#8211; <a href=\"https:\/\/www.numerama.com\/cyberguerre\/1548780-ce-programme-russe-cree-des-centaines-de-faux-profils-de-reseaux-sociaux-en-quelques-secondes.html?utm_medium=distibuted&amp;utm_source=YahooNews&amp;utm_content=directlink&amp;utm_campaign=1548780\">Numerama<\/a> &#8211; <a href=\"https:\/\/www.datasecuritybreach.fr\/kopeechka\/\">Data Security Breach<\/a><br><\/p>\n<p><br><\/p>\n<p>&#8212;<br><\/p>\n<div>Cybercriminals Exploit the Moroccan Tragedy in New Scam Campaign<\/div>\n<div>&nbsp;<a href=\"https:\/\/www.trendmicro.com\/fr_fr\/research\/23\/i\/cybercriminals-exploit-the-moroccan-tragedy-in-new-scam-campaign.html\">Full research<\/a><br><\/div>\n<p>Journalists about it: <a href=\"https:\/\/www.numerama.com\/cyberguerre\/1508984-seisme-au-maroc-2-exemples-darnaques-reperees-sur-le-web.html\">Numerama<\/a> &#8211; <a href=\"https:\/\/www.globalsecuritymag.fr\/Les-cybercriminels-exploitent-la-tragedie-marocaine-dans-une-nouvelle-campagne.html\">Global Security Mag<\/a><\/p>\n<p>&#8212;<\/p>\n<div>Impulse Team\u2019s Massive Years-Long Mostly-Undetected Cryptocurrency Scam<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/f\/impulse-team-massive-cryptocurrency-scam.html\">Full research<\/a><br>(in collaboration with Joseph C. Chen)<\/div>\n<p>Journalists about it:&nbsp;<a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2023\/06\/06\/un-rapport-leve-le-voile-sur-impulse-team-un-service-qui-industrialise-l-arnaque-aux-cryptomonnaies_6176439_4408996.html\">Le Monde<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/sophisticated-crypto-scam-sprawls-1000-affiliate-sites\">DarkReading<\/a>&nbsp;&#8211; <a href=\"https:\/\/krebsonsecurity.com\/2023\/06\/service-rents-email-addresses-for-account-signups\/\">KrebsOnSecurity<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.techradar.com\/news\/thousands-of-fake-cryptocurrency-sites-trap-users-in-fake-reward-schemes\">TechRadar<\/a>&nbsp;&#8211; <a href=\"https:\/\/il.tradingview.com\/news\/u_today:6f3275c6d094b:0-bitcoin-rewards-scam-1-000-fake-websites-involved\/\">TradingView<\/a>&nbsp;&#8211; <a href=\"https:\/\/thehackernews.com\/2023\/06\/beware-1000-fake-cryptocurrency-sites.html\">The Hacker News<\/a><\/p>\n<div><b>&#8212;<\/b><br><b><br><\/b><\/div>\n<div>\n<p><b>IPFS: A New Data Frontier or a New Cybercriminal Hideout?<\/b><br><span style=\"font-weight: 600;\"><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ipfs-a-new-data-frontier-or-a-new-cybercriminal-hideout\">Full research<\/a><br><br><\/span><\/p>\n<\/div>\n<h3 style=\"font-style: normal; text-align: center;\">2022<\/h3>\n<div><span style=\"font-weight: 600;\"><br>New RURansom Wiper Targets Russia<br><\/span><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/c\/new-ruransom-wiper-targets-russia.html\">Full research<\/a><\/div>\n<p>(in collaboration with Jaromir Horejsi)<br>Journalists about it: <a href=\"https:\/\/cybernews.com\/cyber-war\/novel-ruransom-wiper-targets-russia-motives-revealed-in-the-code\/\">Cybernews<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.scmagazine.com\/brief\/ransomware\/russian-organizations-targeted-by-ransomware-gangs\">SCMagazine<\/a><br><br><\/p>\n<h3 style=\"font-style: normal; text-align: center;\">2021<\/h3>\n<div>\n<p>The Risks of Subscription Sharing Platforms<br><a href=\"https:\/\/news.trendmicro.com\/2021\/11\/10\/the-risks-of-subscription-sharing-platforms\/\">Publication<\/a><\/p>\n<\/div>\n<div>&#8212;<\/div>\n<div>&nbsp;<\/div>\n<div><b>Void Balaur and the Rise of the Cybermercenary Industry<\/b><br><span style=\"font-weight: 600;\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/k\/void-balaur-and-the-rise-of-the-cybermercenary-industry.html\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-void-balaur-tracking-a-cybermercenarys-activities.pdf\">Full paper<\/a><\/span><br><span style=\"font-weight: 600;\">(in collaboration with Feike Hacquebord)<br><\/span>Journalists about it: <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/11\/10\/rocket-hack-hacker-for-hire-targets-belrus-opposition-gmail-protonmail-and-telegram\/?sh=639586c640d5\">Forbes<\/a> &#8211; <a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2021\/11\/10\/void-balaur-un-groupe-de-cybermercenaires-entre-criminalite-et-espionnage-d-etat_6101635_4408996.html\">Le Monde<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.lefigaro.fr\/secteur\/high-tech\/un-groupe-de-cybercriminels-russophones-a-cible-plus-de-3500-particuliers-et-entreprises-en-18-mois-20211112\">Le Figaro<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.20minutes.fr\/high-tech\/3179755-20211123-un-groupe-de-cybermercenaires-seme-le-chaos-sur-la-toile\">20 Minutes<\/a>&nbsp;&#8211; <a href=\"https:\/\/thehackernews.com\/2022\/09\/void-balaur-hackers-for-hire-group-now.html\">The Hacker News<\/a>&nbsp;&#8211; <a href=\"https:\/\/threatpost.com\/cyber-mercenary-void-balaur\/176230\/\">Threat Post<\/a><br><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252509397\/Trend-Micro-reveals-Void-Balaur-cyber-mercenary-group\">TechTarget<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.csoonline.com\/article\/3641412\/void-balaur-explained-a-stealthy-cyber-mercenary-group-that-spies-on-thousands.html\">CSO Online<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/void-balaur-hackers-for-hire-sell-stolen-mailboxes-and-private-data\/\">BleepingComputer<\/a>&nbsp;&#8211; <a href=\"https:\/\/therecord.media\/cyber-mercenary-group-void-balaur-has-been-hacking-companies-for-years\">The Record<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/hacker-for-hire-group-spied-on-more-than-3500-targets-in-18-months\/d\/d-id\/1341615\">DarkReading<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.indiatimes.com\/technology\/news\/this-hackers-for-hire-group-has-been-stealing-data-in-the-shadows-since-2015-554048.html\">India Times<\/a><br><span style=\"font-weight: 600;\"><br><\/span><\/div>\n<p>&#8212;<\/p>\n<p>Fake DarkSide Campaign Targets Energy and Food Sectors<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/fake-darkside-campaign-targets-energy-and-food-sectors.html\">Full research<\/a><br>Journalists about it : <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-darkside-gang-targets-energy-food-industry-in-extortion-emails\/\">BleepingComputer<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.helpnetsecurity.com\/2021\/06\/21\/impersonating-darkside\/\">HelpNetSecurity<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.hackread.com\/fake-darkside-gang-100-btc-ransom\/\">HackRead<\/a>&nbsp;&#8211; <a href=\"https:\/\/threatpost.com\/darkside-global-energy-food\/167056\/\">Threat Post<\/a><br><a href=\"https:\/\/www.cybersecurity-review.com\/news-june-2021\/fake-darkside-campaign-targets-energy-and-food-sectors\/\">Cyber Security Review<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.bankinfosecurity.com\/fake-darkside-ransomware-gang-targets-energy-food-sectors-a-16911\">BankInfoSecurity<\/a><\/p>\n<p>&#8212;<\/p>\n<p>How Cybercriminals Abuse OpenBullet for Credential Stuffing<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/d\/how-cybercriminals-abuse-openbullet-for-credential-stuffing-.html\">Full research<\/a> &#8211; <a href=\"https:\/\/www.youtube.com\/watch?v=HBwhDbOhcIU\">Video<\/a><br>(in collaboration with Fyodor Yarochkin &amp; Vladimir Kropotov)<br><br><\/p>\n<h3 style=\"font-style: normal;\">2020<\/h3>\n<div>Scammers Use Home Addresses of Targets in France<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/l\/scammers-use-home-addresses-of-targets-in-france.html\">Full research<\/a><br>Journalists about it: <a href=\"https:\/\/www.leparisien.fr\/high-tech\/arnaque-une-campagne-sophistiquee-de-phishing-promet-des-faux-remboursements-par-darty-08-12-2020-8413129.php\">Le Parisien<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.ouest-france.fr\/high-tech\/darty-un-faux-mail-fait-miroiter-un-remboursement-pour-derober-vos-donnees-bancaires-7079126\">Ouest France<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.dna.fr\/science-et-technologie\/2020\/12\/09\/attention-a-ces-faux-mails-de-remboursement-darty-c-est-une-arnaque\">DNA<\/a><\/div>\n<div>&nbsp;<\/div>\n<p>&#8212;<\/p>\n<p>French companies Under Attack from Clever BEC Scam<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/j\/french-companies-under-attack-from-clever-bec-scam.html\">Full research<\/a><br>Journalists about it: <a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2020\/10\/06\/cyberarnaques-des-dizaines-d-entreprises-francaises-visees-par-une-fraude-au-president_6054885_4408996.html\">Le Monde<\/a>&nbsp;&#8211; <a href=\"https:\/\/sunbren.com\/le-grand-retour-de-larnaque-au-president\/\">Sunbren<\/a><br><br><\/p>\n<h3 style=\"font-style: normal;\">2019<\/h3>\n<div>Advanced Targeted Attack Tools Found Being Used to Distribute Cryptocurrency Miners<br><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/advanced-targeted-attack-tools-used-to-distribute-cryptocurrency-miners\/\">Full research<\/a><br>(in collaboration with Fyodor Yarochkin &amp; Vladimir Kropotov)<br>Journalists about it : <a href=\"https:\/\/itwire.com\/business-it-news\/security\/nsa-s-eternalblue-exploit-surfaces-in-bog-standard-mining-attack.html\">ITWire<\/a>&nbsp;&#8211; <a href=\"https:\/\/cyberscoop.com\/monero-cryptomining-cybercrime-trend-micro-eternalblue\/\">CyberScoop<\/a><\/div>\n<p><span style=\"font-style: inherit; font-weight: inherit;\"><br>&#8212;<br><\/span><br>A Hacking Group is Stealing Popular Instagram Profiles<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/b\/how-a-hacking-group-is-stealing-popular-instagram-profiles.html\">Full research<\/a><br>(in collaboration with Jindrich Karasek)<br>Journalists about it: <a href=\"https:\/\/www.digitalinformationworld.com\/2019\/03\/verification-badge-scammers-are-hackers-instagram-influencers-accounts.html\">Digital Information World<\/a>&nbsp;&#8211; <a href=\"https:\/\/cyberscoop.com\/instagram-hackers-phishing-trend-micro\/\">CyberScoop<\/a><br><br><\/p>\n<h3 style=\"font-style: normal;\">2018<\/h3>\n<div>InfoSec Guide: Taking Down Fraudulent Domains (Part 2)<br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/infosec-guide-taking-down-fraudulent-domains\">Publication<\/a><\/div>\n<p>InfoSec Guide: Domain Monitoring \u2014 Detecting Phishing Attacks (Part 1)<br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/infosec-guide-domain-monitoring-detecting-phishing-attacks\">Publication<\/a><\/p>\n<p>&#8212;<\/p>\n<p>Critical Infrastructures Exposed and at Risk: Energy and Water Industries<br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/es\/security\/news\/cybercrime-and-digital-threats\/exposed-and-vulnerable-critical-infrastructure-the-water-energy-industries\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-exposed-and-vulnerable-critical-infrastructure-the-water-energy-industries.pdf\">Full paper<\/a><br>(in collab with Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Roel Reyes)<br>Journalists about it: <a href=\"https:\/\/apnews.com\/article\/technology-business-trend-micro-inc-c91c4fbb8e704065b2525cc7c0fab382\">AP News<\/a> &#8211; <a href=\"https:\/\/www.iiot-world.com\/ics-security\/cybersecurity\/a-new-report-exposed-critical-infrastructure-water-and-energy-industries\/\">IIoT World<\/a> &#8211; <a href=\"https:\/\/www.waterisac.org\/portal\/trend-micro-report-%E2%80%93-disrupting-flow-exposed-and-vulnerable-water-and-energy-infrastructure\">WaterISAC<\/a> &#8211; <a href=\"https:\/\/www.monde-economique.ch\/une-etude-trend-micro-met-en-evidence-les-risques-dattaques-informatiques-visant-les-systemes-hydrauliques-et-energetiques\/\">Monde Economique<\/a> &#8211; <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/10\/31\/vulnerable-critical-systems\/\">HelpNetSecurity<\/a>&nbsp;<br><br><\/p>\n<p><\/p>\n<h3 style=\"font-style: normal;\">2017<\/h3>\n<div>New RETADUP Variants Hit South America, Turn To Cryptocurrency Mining<br><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-retadup-variants-hit-south-america-turn-cryptocurrency-mining\/\">Full research<\/a><br>(in collaboration with Kenney Lu &amp; Lenart Bermejo)<\/div>\n<p>+<br><span style=\"font-style: inherit; font-weight: inherit;\">Retadup \/ Information Stealer Found Hitting Israeli Hospitals<br><\/span><a style=\"font-style: inherit; font-weight: inherit;\" href=\"http:\/\/Information Stealer Found Hitting Israeli Hospitalshttps:\/\/www.trendmicro.com\/en_us\/research\/17\/f\/information-stealer-found-hitting-israeli-hospitals.html\">Full research<\/a><br>Journalists about it: <a href=\"https:\/\/www.zdnet.fr\/actualites\/retadup-le-coup-de-main-d-avast-pour-demanteler-le-botnet-39889659.htm\">ZDNet<\/a> &#8211; <a href=\"https:\/\/www.liberation.fr\/france\/2019\/08\/28\/comment-la-gendarmerie-francaise-a-desinfecte-850-000-machines-infectees-par-un-logiciel-malveillant_1747865\/\">Liberation<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.capital.fr\/entreprises-marches\/les-gendarmes-francais-neutralisent-botnet-de-centaines-de-milliers-dordinateurs-1348476\">Capital<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.leparisien.fr\/high-tech\/les-cybergendarmes-neutralisent-un-reseau-geant-d-ordinateurs-pirates-28-08-2019-8140767.php\">Le Parisien<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.challenges.fr\/france\/comment-la-gendarmerie-francaise-a-neutralise-un-reseau-mondial-de-850-000-ordinateurs-pirates_671396\">Challenges<\/a> &#8211; <a href=\"https:\/\/www.france24.com\/fr\/20190828-les-gendarmes-fran%C3%A7ais-neutralisent-botnet-de-centaines-de-milliers-d-ordinateurs\">France24<\/a> &#8211;&nbsp;<a href=\"https:\/\/decoded.avast.io\/janvojtesek\/putting-an-end-to-retadup-a-malicious-worm-that-infected-hundreds-of-thousands\/\">Avast<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.securityweek.com\/avast-french-police-remove-retadup-malware-850000-pcs\/\">SecurityWeek<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malware-operation-making-millions-defeated-by-design-flaw\/\">BleepingComputer<\/a>&nbsp;&#8211;&nbsp;<a href=\"https:\/\/www.darkreading.com\/risk\/retadup-worm-squashed-after-infecting-850k-machines\">DarkReading<\/a><\/p>\n<p>&#8212;<\/p>\n<p>Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/17\/g\/android-backdoor-ghostctrl-can-silently-record-your-audio-video-and-more.html\">Full research<\/a><br>(in collaboration with Lenart Bermejo &amp; Jordan Pan)<br><span style=\"font-style: inherit; font-weight: inherit;\">Journalists about it: <a href=\"https:\/\/www.phonandroid.com\/ghostctrl-nouveau-malware-android-peut-prendre-controle-total-votre-smartphone.html\">PhonAndroid<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.frandroid.com\/culture-tech\/securite-applications\/449331_ghostctrl-un-tres-dangereux-malware-se-fait-passer-pour-pokemon-go-ou-whatsapp\">FrAndroid<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.zebulon.fr\/actualites\/16712-ghostctrl-un-malware-android-redoutable-qui-prend-le-controle-des-terminaux.html?utm_content=cmp-true\">Zebulon<\/a> &#8211; <a href=\"https:\/\/www.logitheque.com\/articles\/ghostctrl-ce-malware-android-qui-se-deguise-pour-vous-infecter-16434\">Logitheque<\/a> &#8211; <a href=\"https:\/\/securityintelligence.com\/news\/ghostctrl-android-rat-demonstrates-spooky-range-of-capabilities\/\">SecurityIntelligence&nbsp;(IBM)<\/a> &#8211; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ghostctrl-is-an-android-rat-that-also-doubles-as-ransomware\/\">BleepingComputer<\/a> &#8211;&nbsp;<a href=\"https:\/\/gbhackers.com\/record-audio-and-video-silently-with-obfuscated-android-backdoor-ghostctrl\/\">GBHackers<\/a> &#8211;&nbsp; <a href=\"https:\/\/www.hackread.com\/ghostctrl-android-malware-records-audio-video-spies-on-users\/\">HackRead<\/a> &#8211; <a href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article-4710380\/GhostCtrl-disguise-WhatsApp-record-you.html\">DailyMail<\/a> &#8211; <a href=\"https:\/\/www.scmagazine.com\/news\/architecture\/ghostctrl-malware-silently-haunts-android-users-hijacking-functionality\">SCMagazine<\/a> &#8211; <a href=\"https:\/\/fossbytes.com\/ghostctrl-android-malware\/\">FossBytes<\/a> &#8211; <a href=\"https:\/\/www.thesun.co.uk\/tech\/4049687\/ghostctrl-smartphone-virus-thats-disguised-as-whatsapp-secretly-films-you-and-can-hold-recordings-of-your-video-and-voice-calls-to-ransom\/\">The Sun<\/a> &#8211; <a href=\"https:\/\/www.ibtimes.co.uk\/what-ghostctrl-android-malware-possesses-devices-spy-steal-do-its-bidding-1630784\">International Business Times<\/a> &#8211; <a href=\"https:\/\/www.zdnet.com\/article\/this-scary-android-malware-can-record-audio-video-and-steal-your-data\/\">ZDNet<\/a><br><br><\/span><\/p>\n<h3>2016<\/h3>\n<p>The French Underground: Under a Shroud of Extreme Caution<br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-french-underground-under-a-shroud-of-extreme-caution\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-the-french-underground.pdf\">Full paper<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.globalsecuritymag.fr\/IMG\/pdf\/The_French_Underground-13092016.pdf\">French version<\/a><br>Journalists about it : <a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2016\/09\/14\/paranoia-et-organisation-mafieuse-plongee-dans-le-dark-web-francais_4997513_4408996.html\">Le Monde<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.bfmtv.com\/tech\/cybersecurite\/le-darkweb-francais-est-un-microcosme-impitoyable-et-paranoiaque_AN-201609150063.html\">BFMTV<\/a> &#8211; <a href=\"https:\/\/www.latribune.fr\/technos-medias\/cybercriminalite-qui-sont-les-escrocs-du-darknet-francais-599111.html\">La Tribune<\/a> &#8211; <a href=\"https:\/\/www.ladepeche.fr\/article\/2016\/09\/18\/2421131-cybercrimes-la-cote-d-alerte-en-france.html\">La Depeche<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.silicon.fr\/trend-micro-ausculte-la-cybercriminalite-underground-en-france-157471.html\">Silicon<\/a> &#8211; <a href=\"https:\/\/www.globalsecuritymag.fr\/Trend-Micro-Voyage-au-coeur-de-l,20160913,65168.html\">GlobalSecurityMag<\/a> &#8211; <a href=\"https:\/\/www.theregister.com\/2016\/09\/15\/trend_micro_french_underground\/\">TheRegister<\/a> &#8211; <a href=\"https:\/\/www.zdnet.fr\/actualites\/les-cybercriminels-francais-n-ont-pas-la-phobie-administrative-39841988.htm\">ZDNet<\/a> &#8211; <a href=\"https:\/\/www.bfmtv.com\/tech\/cybersecurite\/le-darkweb-francais-est-un-microcosme-impitoyable-et-paranoiaque_AN-201609150063.html\">BFMTV<\/a> &#8211;<br><\/p>\n<p>&#8212;<\/p>\n<p>The French Dark Net is Looking for Grammar Police<br><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-french-dark-net-is-looking-for-grammar-police\/\">Full research<\/a><br>Journalists about it: <a href=\"https:\/\/www.tripwire.com\/state-of-security\/french-dark-web-posts-job-ad-for-content-cleaner-to-be-paid-in-stolen-goods\">Tripwire<\/a><\/p>\n<p>&#8212;<\/p>\n<p>When Hackers Hack Each Other\u2014A Staged Affair in the French Underground?<br><a href=\"ttps:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/when-hackers-hack-each-other-a-staged-affair-in-the-french-underground\">Full research<\/a><\/p>\n<p>&#8212;<\/p>\n<p>French Dark Bets: Betting On Euro 2016<br><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/french-dark-bets-betting-euro-2016\/\">Full research<\/a><br><br><\/p>\n<h3>2015<\/h3>\n<p>Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority<br><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/fake-judicial-spam-leads-to-backdoor-with-fake-certificate-authority\/\">Full research<\/a><br>(in collaboration with Kenney Lu &amp; Dark Luo)<br>Journalists about it: <a href=\"https:\/\/www.helpnetsecurity.com\/2015\/04\/01\/french-italian-users-targeted-with-judicial-themed-spam-leading-to-malware\/\">HelpNetSecurity<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/gootkit-banking-trojan-jumps-channel\">ProofPoint<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Crime This page lists all public cybercrime-related publications I\u2019ve worked on through time. 2024 ICO Scams Leverage 2024 Olympics to Lure Victims, Use AI for Fake Sites &nbsp;Full research Journalists about it: The Cyber Express &#8211; Daily Dev &#8211; Global Security Mag 2023 How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-389","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=389"}],"version-history":[{"count":0,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/389\/revisions"}],"wp:attachment":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}