February 21, 2024 at 04:18AM
Trend Micro and other private entities worked with INTERPOL on Operation Synergia, successfully taking down over 1,000 C&C servers and identifying suspects related to phishing, banking malware, and ransomware. Trend provided threat intelligence, aiding in the identification of malicious activities and culprits, ultimately contributing to the apprehension of 70 suspects.
Based on the meeting notes provided, the following key takeaways can be generated:
1. Trend Micro and other private entities played a crucial role in contributing to INTERPOL’s Operation Synergia, resulting in the takedown of over 1,000 command-and-control (C&C) servers and the identification of suspects involved in phishing, banking malware, and ransomware activity.
2. Trend Micro provided threat intelligence and shared malicious IP addresses related to ransomware, banking trojans, and phishing, resulting in the creation of 63 INTERPOL Cyber Activity Reports and the identification of 70 suspects.
3. Various malware types, including stealers, trojan stealers, remote access trojans (RATs), downloaders, and botnets, were identified as being used to connect to the C&C servers.
4. Notable malware instances observed in the operation included Cobalt Strike, AsyncRAT, and RedLine, which were identified as being utilized for malicious activities such as data theft, surveillance, and the execution of additional malware.
5. Trend Micro consistently supported INTERPOL’s Cyber Fusion Centre (CFC) by identifying additional C&C servers across multiple country locations, contributing to a more comprehensive understanding of threat information.
6. The partnership between Trend Micro and INTERPOL has consistently led to successful takedowns and arrests, demonstrating a history of cooperation in combating cybercrime.
These takeaways provide a clear summary of the significant contributions made by Trend Micro and the private sector in collaboration with INTERPOL to combat cybercrime through Operation Synergia.