Trend Micro helps Interpol uncover serial cyber criminal

The security firm used its knowledge, resources and strategies to capture the Nigerian national

Cyber crime

Trend Micro has helped capture a serial cyber criminal, reportedly responsible for managing an international crime network accused of stealing more than $60 million through business email compromise (BEC) scams and CEO fraud.

The security firm teamed up with Interpol and the Nigerian Economic and Financial Crime Commission, providing research assistance to help the organisations gather the information needed to result in arrest.

Its research, which investigated into the use of Limitless Keylogger and Predator Pain, found the suspect was managing a ring of more than 40 people across Nigeria, Malaysia and South Africa to launch attacks globally. He was also involved in an operation that involved teaming up with money laundered in China, Europe and the US, which used illicit bank accounts to store large amounts of money.

"Arrests like this are made possible by partnerships between members of the security community which come together with the common goal of making the internet a safer place," said Noboru Nakatani, Executive Director of the Interpol Global Complex for Innovation.

Advertisement
Advertisement - Article continues below

"BEC scams are particularly difficult to combat due to their complexity, which is why public-private sector cooperation is essential."

The operation was part of Trend Micro's Global Complex for Innovation in Singapore, which aims to pool together knowledge, resources and strategies to fight global cyber crime.

"Trend Micro is a strong proponent of public-private partnerships in the constant battle against cybercriminals," said Raimund Genes, chief technology officer for Trend Micro.

"We have a collective adversary in those who mean to do harm via technology, and we at Trend Micro do all we can to support law enforcement in apprehending and prosecuting these attackers. This is another a milestone for the cyber security community working together."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019