First Line of Defense: Japan's Underground Cybercriminals: Anonymous, Illusive, Alive

1 jaar geleden


Text only:

This message contains graphics. If you do not see the graphics, click here to view.
View the Web version.
 
First Line of Defense
 
Your regular source of security updates from TrendLabs
 
October 31, 2015
 
Follow
 

Japan’s Underground Cybercriminals: Anonymous, Illusive, Alive


Forward
Share

Japan remains as one of the top countries in the world in terms of economy and technology. It nurtures growth in its circle where culture and disciplines thrive. However, not even the seemingly Utopian landscape can be rid of darker entities that propagate crime and other malicious activities. Trend Micro tackles the brooding threat of cybercrime in the Japanese forefront.


An observation on the rise of cybercriminal activity gave birth to our report, The Japanese Underground. With the growth of the economy brings to surface criminals of a new breed; younger, bolder, and more importantly, slowly learning the tools of the trade in the cybercrime world.


 
 
"With the growth of the economy brings to surface criminals of a new breed; younger, bolder, and more importantly, slowly learning the tools of the trade in the cybercrime world."
 
One concerning fact that our report reveals is that online crimes in Japan have gone up by nearly 40% in March 2015. The criminal intent is there, as well as the tools and the knowledge in doing so. Data from the Trend Micro™ Smart Protection Network™ also showed that Japan was the 2nd most affected country by online banking malware in 2014, just 2nd to the U.S. This will surely add pressure on law enforcement to setup countermeasures against cybercrime in the country.

The paper describes the growth as “still young” as these hackers rely on purchasing malware and hacking tools instead of creating new ones themselves. There is a fear that this will accelerate given that hacking knowledge is also rampant. We’ve found several examples of sites giving advice on hacking enemies, extorting money through malware, and where to go to find the tools necessary for these attacks.


The report tackles everything we’ve discovered about the Japanese underground – the illusive measures taken to remain anonymous, the language behind the bulletin board systems, lucrative opportunities, and the trajectory of this subculture. Here are some critical points found in our research:


The Onion Channel, or Tor 2 Channel, provides a secure space for cybercriminals as it provides anonymity and exclusivity. A total of 2,224 underground site URLs were found where some of these are used for cybercrime.
SAFe-mail, captcha, and virtual PO boxes are utilized to keep users anonymous. While this works in the interests of general users to make their posts anonymous, this also makes it even harder for authorities to trace cybercriminals.
Cybercriminals in Japan are avoiding traditional currency or online currency such as bitcoin and are using alternatives such as Amazon ™ gift cards and Playstation ® Store codes.
Illegal contraband and paraphernalia exchanged in the cyber-underground include personal information used to create false credit accounts, fake passports, hacking tools, firearms, and child pornography.

The future is still wide open for both cybercriminals and law enforcement. Whoever takes advantage on the infancy stage of the Japanese underground cybercrime world may capitalize on the fact. For more details, read our full report The Japanese Underground.


 
...
 
RELATED NEWS


Security Spotlight
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries

Trend Micro discovered a zero-day exploit in Adobe, which Pawn Storm, a well-known cyber-espionage campaign, used in its recent attack targeting foreign affairs ministries all over the world except Russia. Follow the story here.



Security for Home Users
German Users Hit By Dirty Mobile Banking Malware Posing As PayPal App

A malware posing as a PayPal app and spreading via spam hit German users. Read the full story here.



Security for Business
Understanding the Impact of Targeted Attacks to Enterprises and their Customers

We tackle the implications of targeted attacks to its victim companies and their customers in this article. Learn more about targeted attacks here.


© 2015 Trend Micro Incorporated

Archive


Subscribe


Unsubscribe

Trendmicro.com

Categorieën: Zakelijke goederen Ict Zzp | Zelfstandige zonder personeel Computers | Software
Leeftijd: 14 t/m 18 jaar 19 t/m 30 jaar 31 t/m 64 jaar 65 jaar en ouder

Deel deze nieuwsbrief op

© 2017