Trend Micro helps Interpol uncover serial cyber criminal

The security firm used its knowledge, resources and strategies to capture the Nigerian national

Cyber crime

Trend Micro has helped capture a serial cyber criminal, reportedly responsible for managing an international crime network accused of stealing more than $60 million through business email compromise (BEC) scams and CEO fraud.

The security firm teamed up with Interpol and the Nigerian Economic and Financial Crime Commission, providing research assistance to help the organisations gather the information needed to result in arrest.

Its research, which investigated into the use of Limitless Keylogger and Predator Pain, found the suspect was managing a ring of more than 40 people across Nigeria, Malaysia and South Africa to launch attacks globally. He was also involved in an operation that involved teaming up with money laundered in China, Europe and the US, which used illicit bank accounts to store large amounts of money.

"Arrests like this are made possible by partnerships between members of the security community which come together with the common goal of making the internet a safer place," said Noboru Nakatani, Executive Director of the Interpol Global Complex for Innovation.

Advertisement - Article continues below
Advertisement - Article continues below

"BEC scams are particularly difficult to combat due to their complexity, which is why public-private sector cooperation is essential."

The operation was part of Trend Micro's Global Complex for Innovation in Singapore, which aims to pool together knowledge, resources and strategies to fight global cyber crime.

"Trend Micro is a strong proponent of public-private partnerships in the constant battle against cybercriminals," said Raimund Genes, chief technology officer for Trend Micro.

"We have a collective adversary in those who mean to do harm via technology, and we at Trend Micro do all we can to support law enforcement in apprehending and prosecuting these attackers. This is another a milestone for the cyber security community working together."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020

Windows 10 and the tools for agile working

20 Jan 2020
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020