Cyber-Espionage Campaign Tentacles Reach into Asia

Jon Clay, Sr. Manager, Core Technology Marketing
The Luckycat threat, first documented in 2012 by our friends at Symantec, had a much more diverse target set than previously thought. Not only did the Luckycat perpetrators target military research in India as reported, they expanded the attacks to hit other sensitive entities in Japan, as well as India, including heavily targeted Tibetan activists.

The Luckycat campaign was a sophisticated cyber-espionage campaign that attacked a diverse set of more than 90 targets. The attackers used a variety of methods, some of which have been linked to other cyber-espionage campaigns and even tagged their attacks with campaign codes to measure success.

The attackers behind this campaign maintain a variety of command-and-control infrastructures and leverage anonymity tools to obfuscate their operations.

Targeted industries and communities include:

- Aerospace
- Energy
- Engineering
- Shipping
- Military research
- Tibetan activists

Careful monitoring allowed us to capitalize on some mistakes made by the attackers, and give us a glimpse of their identities and capabilities. We were able to track elements of this campaign to hackers based in China.

Tune in to our webinar for more insight. You may also see our detailed findings in our white paper Luckycat Redux available at http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf
Apr 11 2012
31 mins
Cyber-Espionage Campaign Tentacles Reach into Asia
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live and recorded (3267)
  • Upcoming (96)
  • Date
  • Rating
  • Views
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.

    The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step.
  • Tras crear un prototipo inicial de su aplicación para una vista previa limitada ya es hora de que el equipo pase a consolidar la arquitectura haciéndola más robusta y tolerante a los fallos antes de lanzarla oficialmente al público final.

    En este capítulo se tratan conceptos de la infraestructura de AWS tales como regiones y zonas de disponibilidad; además, se explica cómo utilizar tales características para incrementar la tolerancia de la aplicación a los fallos.

    Servicios y características tratados
    •Conceptos clave sobre infraestructura (regiones y zonas de disponibilidad)
    •Equilibro de carga elástico (Elastic Load Balancing)
    •Amazon RDS

    Demostración
    •Creación de una AMI basada en una instancia en ejecución
    •Creación y configuración de un equilibrador de carga elástico
    •Zonas de disponibilidad múltiples con Amazon RDS
    •Alarmas con Amazon CloudWatch
  • The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.

    This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
  • Una vez expandida con éxito la capacidad del centro de datos a Amazon Web Services para los entornos de desarrollo y prueba, el equipo de IT se enfrenta a un nuevo reto en cuanto a la capacidad, es decir, cómo almacenar la cada vez mayor cantidad de datos generados por las aplicaciones empresariales y mantener los costes a la baja. Además, también se enfrentan al reto de mantener copias de seguridad de esos datos de manera adecuada.

    Este capítulo aborda ambas cuestiones con servicios como Amazon S3 y Amazon Glacier.

    Demostración:

    •AWS Storage Gateway
    •Datos de Amazon S3 a Amazon Glacier

    Servicios y características tratados:
    •Amazon S3
    •Amazon Glacier
    •AWS Storage Gateway
    •AWS Import / Export
  • Channel
  • Channel profile
Up Down
  • Windows XP: Survival & Migration Guide for Mid Enterprise Firms May 20 2014 5:00 pm UTC 60 mins
    After thirteen years, the last Microsoft patch for its popular OS has been distributed. Experts estimate that XP’s installed base is up to 30% of all devices; some organizations seem to have no plans to change. But end-of-support means no security fixes, patches or software updates. XP users are expected to become the target of hackers, according to research firm Gartner. Join Trend Micro’s threat researcher Christopher Budd as he outlines 5 tips to stay protected. Budd will also delve into security implications and recommend migration steps for Mid Enterprise organizations of all industries.
  • Anatomy of the Target Stores Breach: Lessons Learned May 8 2014 5:00 pm UTC 60 mins
    Target Stores has invested millions in "next gen" cyber security and had received PCI certification. And yet hackers compromised its systems and credit card data during the busy retail holiday season. Over 70 million people were impacted. Join Ken Donze/Senior Engineer - Trend Micro as he outlines the breach, how people and processes were impacted, and how warnings and false positives were overlooked. As more and more firms consolidate data centers and invest in new solutions, how can human error and social engineering be mitigated and risks managed? How can organizations balance risk and security investment? What Best Practices and controls are recommended?
  • Cyber Threat Defense Report Apr 22 2014 3:00 pm UTC 60 mins
    Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Optimizing Security for Amazon Web Services Recorded: Apr 2 2014 62 mins
    This webcast focuses on securing AWS deployments. Join Trend Micro's Mark Nunnikhoven, Principal Engineer for Cloud Technolgies, as he recaps the realities of securing today's hybrid cloud environments and approaches for securing critical applications and data.
  • SharePoint Security Risks & Compliance: Best Practices for Governing Recorded: Mar 19 2014 50 mins
    Organizations are generating vast amounts of content and, with mobile access, enterprise social collaboration and cloud solutions, employees are sharing information in new ways, continually expanding how we collaborate. Microsoft SharePoint has become the corporate information hub for most organizations, and SharePoint content is often coming from internal employees as well as external partners and clients. This presents new risks to organizations like the inadvertent exposure to sensitive information, malware entering the enterprise and regulatory compliance issues. It’s important to consider if you are protecting yourself against these types of security risks and compliance issues. Is your corporate SharePoint Strategy using the best practices available for information security and governance? In this live webinar, Antonio Maio, Microsoft SharePoint MVP, and Chris Taylor, Trend Micro Director of Global Product Marketing, will discuss how current shifts in SharePoint utilization can create risks and compliance concerns for even the most veteran users and IT organizations
  • Defend Your Organization from Emerging Cyber Attacks Recorded: Feb 20 2014 62 mins
    Are you confident that your organization is fully protected from the emerging digital crimes occurring today? Join cyber security experts and learn why your data has monetary value in the cyber market.

    This educational webinar will be highly interactive, bringing together industry practitioners from Trend Micro’s Forward-looking Threat Research (FTR) Team and Dell SecureWorks’ Counter Threat Unit (CTU) team to help you combat the cyber underworld. This webinar is free to attend, but space is limited so register today!
  • TARGET-ed Attacks: What Retailers Need to Know about Recent Data Breaches Recorded: Jan 30 2014 47 mins
    The recent high-profile breaches at Target and other retailers—that reportedly lifted personal data from over 100 million customers including one-third of US citizens—has many retailers, including Trend Micro customers, wondering whether they are protected from a similar type of custom attack. During this webinar, security industry expert JD Sherry—a frequent guest on Fox News regarding the recent retail data breaches—will share an initial analysis of publicly available information by Trend Micro’s threat research team. IT security professionals and business leaders in retail and other industries will gain a deeper understanding of the data breach based on Trend Micro’s past experience with similar attacks. You also will learn about proven practices to create a layered defense as an effective strategy to detect and prevent Target-like attacks.
  • Threat Predictions 2014 - Enterprise Edition Recorded: Jan 28 2014 41 mins
    2013 saw enterprise, government and F100 firms all face catastrophic insider threats and data breaches. What does 2014 hold for Enterprise organizations with widely dispersed devices, a shrinking sense of privacy, supply chain risks and ever-increasing compliance requirements? How can larger firms optimize security ROI ?
    Please join Jon Clay, Sr. Manager of Threat Research at Trend Micro, for this LIVE webcast. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines. You will have an opportunity to ask questions of the experts and learn from peers.
    TOPICS INCLUDE: Lessons learned from 2013; threat assessment for 2014; data breach insights; risks of legacy exploits; viewpoint of law enforcement; and staying a step ahead of cyber criminals.
    AUDIENCE: IT decision makers, risk & compliance teams, network engineers, infrastructure professionals, security architects, and frontline managers who want increased visibility into the 2014 security environment.
    PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.
  • Threat Predictions 2014 - SMB Edition Recorded: Jan 28 2014 55 mins
    2013 was a banner year for malware, breaches and insider threats. SMB firms with limited IT staff, expertise and security funding can be challenged to identify and mitigate these never-ending risks. What does 2014 hold for security in the cloud, at the endpoint and the mobile professional? What steps can SMB firms take to protect themselves?
    Please join this LIVE webcast with Jon Clay, Sr. Manager of Threat Research at Trend Micro. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines.

    TOPICS INCLUDE: Lessons learned from 2013; looking into the future of security threats; implications for SMB firms on a budget; and highlights on cloud, mobile and endpoint security risks

    AUDIENCE: IT decision makers, business owners and managers, security teams and frontline managers who want increased visibility into the 2014 security environment.

    PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.
  • Addressing Dropbox Security Concerns Recorded: Jan 15 2014 48 mins
    Dropbox and other sync-and-share cloud services are growing rapidly. While there are productivity and convenience benefits, it also creates important security and compliance concerns. Is your confidential data safe in the cloud? Who has access to it? What security controls does Dropbox offer? What options are out there? Join Steve Duncan from Trend Micro who will address these security concerns in a 45-minute webinar. Gain a better understanding of the scope of Dropbox-type use, related security risks, and uncover more robust alternatives that solve these concerns.
  • Realize Higher ROI On Security Spending Recorded: Nov 13 2013 56 mins
    Organizations are seeing large increases in targeted attacks and advanced persistent threats (APTs). Often these advanced attacks involve multiple stages, spanning email, web, traditional endpoints, and corporate servers. Security professionals invest in security controls at each layer of the network stack to protect against these multi-faceted attacks. While multiple security point-products may be used, some prefer to purchase their solutions from a single vendor for better overall management and fewer gaps in security. Forrester, in a recent Total Economic Impact™ Study commissioned by Trend Micro, interviewed current Trend Micro customers, who identified reduced security-related issues and remediation time, faster security reporting tasks, consolidated vendor costs, improved end-user productivity, and overall a positive ROI since investing in and deploying a solution based on Trend Micro enterprise security products.
  • Why Traditional Anti-Virus Protection Is Not Enough Recorded: Nov 12 2013 37 mins
    Learn the factors as to why traditional Anti-Virus is no longer enough to protect your businesses from the risks posed by complex security threats of today. Macky Cruz, Lead Security Engineer for TrendLabs, outlines how the changes in digital trends and technologies introduce stealthier and multi-platform threats.
    • Discover what kinds of security threats plagued SMBs.
    • Understand how malware infection and information theft can impact your businesses
    • Learn how comprehensive security can protect your businesses from security risks.

    Who should attend this webinar: This webinar has been designed to cater to both technical and non-technical viewers. It is especially useful for IT personnel and SMB owners and/or decision makers.
  • Grading 2013 Security Threat Predictions from Trend Micro Recorded: Sep 24 2013 33 mins
    Each year Trend Micro predicts what the threat landscape will be in the next year. In this presentation we will review and grade how most of these predictions have rated. From APTs to Zbot, you will receive information on a variety of security topics discussed in our 2013 predictions developed by Trend Micro CTO, Raimund Genes, and our threat researchers from across the globe. Watch and listen as Jon Clay, Security Technology Expert with Trend Micro, shares the results.
  • Using "Big Data" to Identify and Protect Against Global Computing Threats Recorded: Sep 24 2013 22 mins
    Every computing system is globally linked; desktops, servers, laptops, tablets and handheld devices. They all access information through networks corporates don’t control, thus increasing these devices and their organizations to greater risk of contamination. This webinar discusses how Trend has utilized global “Big Data” gathering to enhance our risk identification and analysis, deliver better intelligence thus protection through a global cloud infrastructure we call Smart Protection Network. This SPN extends Trends risk identification and protection reach exponentially over conventional technology in its ability to find global threats, identify trends and dynamically deliver this intelligence and protection to local customers on a global basis.
  • Stay Protected - Think Like a Hacker Recorded: Sep 16 2013 28 mins
    The greatest operational and reputational risk a corporation faces is cyber. Today's hackers have evolved their capabilities and organization. The FBI 's number one criminal priority is cybercrime. This webinar will spin the chess board on hackers. Tom Kellermann/VP of Cyber Security at Trend Micro will outline how understanding offensive tactics can improve your defensive cyber posture.
  • Next Gen Incident Response: 3 Key Challenges Recorded: Aug 20 2013 45 mins
    In today’s global economy, IT professionals and security decision makers must combat the ever-changing threat landscape and actors that are keen on disrupting their organization. Securing virtualized and cloud ecosystems has become a top priority for both security-centric and C-level executives. JD Sherry, VP of Technology and Solutions for Trend Micro, will explore the top 3 challenges that organizations of all sizes are taking to manage Incident Response in an always-under-attack environment. He will outline the evolution facing Incident Response and how it fundamentally changes in this new paradigm of cloud computing and third-party hosting infrastructures.
  • Protect your IT Infrastructure to Prevent Targeted Attacks Recorded: Jul 23 2013 38 mins
    For most organizations, the network perimeter has expanded and blurred with the proliferation of social networking, remote access, and cloud computing. In addition, with the evident constant stream of new viruses, worms, rootkits, denial of service (DDoS) attacks and other security threats achieve substantial publicity; such threats don’t usually receive notice until significant damage has already occurred. And operations like yours are frequently required to provide a degree of network access to vendor partners and customers so that they can access pertinent information. With all of these potential entry points, it has never been more imperative for IT stakeholders to proactively support a comprehensive risk management strategy.

    Join Trend Micro and CDW to learn how to protect your organization from the various forms of sophisticated attacks aimed specifically at your users, your gas control systems, your customers’ information, or all of the above. CDW has the expertise, product and the services to help control and mitigate your risk exposure before damage has already occurred with Trend Micro Deep Discovery as a customizable solution specific to your environment as a part of your Defense in Depth strategy. Reduce your exposure.
  • Exposing Risks and Opportunities of Mobility & Consumerization in Education Recorded: May 21 2013 40 mins
    The explosion of consumer technologies are changing the Information Technology landscape as we know it. While mobility and consumerization can introduce many risks, it also opens up an enormous productivity opportunity that needs to be exploited! Dive into the latest threat landscape as it relates to mobile as well as how security is actually enabling education!
  • The Cybercriminal Underground Recorded: May 10 2013 28 mins
    This presentation will discuss the most recent information on advances within the cybercriminal underground. Discussion will revolve around the different cybercriminal business models used within the underground and how this affects you. From Organized crime to the Mentor/Apprentice models we’ll give you information you need to better understand how the underground economy works.
  • Advanced Security Options for Mid Market Business Recorded: Mar 13 2013 45 mins
    Mid Market organizations face even greater security threats than before. Their organizational growth and assets – be it intellectual property, PII or credit card data – increases the risk of a breach or targeted attack. Limited IT staff wearing many hats may find it challenging to keep up with the ever-changing threat landscape.

    Join us for this webinar and gain a deeper understanding of the:

    · Threats that Mid Market firms face across physical, virtual and cloud environments

    · Three security steps that SMB firms can implement to enhance their security posture today

    · Advanced Persistent Threats aimed at higher-risk Mid Market firms and how to overcome

    · Resources and expertise available to augment organizational security

    Comware CEO Charles Carlson in this webinar invites guest JD Sherry to share his security expertise with Mid Market businesses as well as protecting state and local governments. JD Sherry, Director of Product and Technology at Trend Micro, has significant mobile and cloud experience in developing secure, scalable IT solutions designed to meet strict compliance and payment card regulations.
Securing Your Journey to the Cloud
Thought leadership webinar series
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber-Espionage Campaign Tentacles Reach into Asia
  • Live at: Apr 11 2012 4:00 pm
  • Presented by: Jon Clay, Sr. Manager, Core Technology Marketing
  • From:
Your email has been sent.
or close
You must be logged in to email this