Trend Micro helps Interpol uncover serial cyber criminal
The security firm used its knowledge, resources and strategies to capture the Nigerian national
Trend Micro has helped capture a serial cyber criminal, reportedly responsible for managing an international crime network accused of stealing more than $60 million through business email compromise (BEC) scams and CEO fraud.
The security firm teamed up with Interpol and the Nigerian Economic and Financial Crime Commission, providing research assistance to help the organisations gather the information needed to result in arrest.
Its research, which investigated into the use of Limitless Keylogger and Predator Pain, found the suspect was managing a ring of more than 40 people across Nigeria, Malaysia and South Africa to launch attacks globally. He was also involved in an operation that involved teaming up with money laundered in China, Europe and the US, which used illicit bank accounts to store large amounts of money.
"Arrests like this are made possible by partnerships between members of the security community which come together with the common goal of making the internet a safer place," said Noboru Nakatani, Executive Director of the Interpol Global Complex for Innovation.
"BEC scams are particularly difficult to combat due to their complexity, which is why public-private sector cooperation is essential."
The operation was part of Trend Micro's Global Complex for Innovation in Singapore, which aims to pool together knowledge, resources and strategies to fight global cyber crime.
"Trend Micro is a strong proponent of public-private partnerships in the constant battle against cybercriminals," said Raimund Genes, chief technology officer for Trend Micro.
"We have a collective adversary in those who mean to do harm via technology, and we at Trend Micro do all we can to support law enforcement in apprehending and prosecuting these attackers. This is another a milestone for the cyber security community working together."
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now