{"id":57642,"date":"2024-11-11T00:00:00","date_gmt":"2024-11-11T00:00:00","guid":{"rendered":"urn:uuid:884a37d8-b7ca-88ff-6f03-1fb493fd72fc"},"modified":"2024-11-11T00:00:00","modified_gmt":"2024-11-11T00:00:00","slug":"trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/","title":{"rendered":"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/SEOmalware-thumbnail:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/SEOmalware-thumbnail.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<h4>Summary<\/h4>\n<ul>\n<li><span class=\"rte-red-bullet\">Trend Micro, in a joint study with Kagawa University, Kanagawa Prefectural Police Headquarters, Chiba Prefectural Police Headquarters, and Japan Cybercrime Control Center, investigated the relationships among multiple SEO malware families.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Their research identified how threat actors use SEO poisoning tactics to redirect users to fake e-commerce sites.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">They identified three groups of threat actors each using a unique malware family, while one group used multiple malware families.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Further analysis also showed that one malware family&#8217;s C&amp;C servers shared a limited number of large fake e-commerce site sets, unlike other malware families that managed independent lists.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">These findings were presented in depth at the 2024 7<sup>th<\/sup> IEEE Conference on Dependable and Secure Computing, where it received the Best Paper Award.<\/span><\/li>\n<\/ul>\n<p>Trend Micro researchers recently conducted a research project that analyzed the relationship among multiple blackhat search engine optimization (SEO) malware families. By analyzing data from command-and-control (C&amp;C) servers of different types of SEO malware and fake shopping sites, they were able to identify distinct groups of SEO malware families, how these share infrastructure to maximize the effectiveness of SEO poisoning attacks, and their role in orchestrating e-commerce scams.<\/p>\n<p>This project was carried out in partnership with Japanese several organizations, namely Kagawa University, Kanagawa Prefectural Police Headquarters, Chiba Prefectural Police Headquarters, and Japan Cybercrime Control Center (JC3). Their research paper titled, \u201cAn analysis of the relationship between Black-hat SEO malware families leveraging information from redirected fake E-commerce scam sites\u201d, was presented at the <a href=\"https:\/\/attend.ieee.org\/dsc-2024\/\" target=\"_blank\" rel=\"noopener\">7<sup>th<\/sup> IEEE Conference on Dependable and Secure Computing (DSC2024)<\/a><a href=\"https:\/\/attend.ieee.org\/dsc-2024\/\">,<\/a> where the researchers received the Best Paper Award for their contribution.<\/p>\n<p>This article provides an abstract of the paper, the results of the analysis, and key contributions, all of which the paper explains in further detail.<\/p>\n<h4>Fake e-commerce scams in Japan leveraging SEO poisoning<\/h4>\n<p>Recently, the number of fake e-commerce sites that aim to defraud people or steal their personal information has been increasing, resulting in significant financial damage to society. Additionally, in Japan, the number of reported fake e-commerce sites is on the rise: According to <a href=\"https:\/\/www.jc3.or.jp\/threats\/topics\/article-555.html\" target=\"_blank\" rel=\"noopener\">a JC3 report<\/a>, 47,278 fake e-commerce sites were reported to JC3 in 2023, an increase from the 28,818 sites reported the previous year.<\/p>\n<p>Some threat actors behind fake e-commerce sites install malware in compromised websites for blackhat SEO purposes: The malware conducts SEO poisoning, making search engines display the threat actors\u2019 lure pages as if these were placed on the compromised websites. The lure pages then redirect visitors from search engines to fake e-commerce sites to potentially victimize them. In this study, we focus on the threat actors that use this tactic; we refer to the malware running on compromised websites for this purpose as \u201cSEO malware\u201d.<\/p>\n<p>These SEO malware are installed into compromised websites to intercept web server requests and return malicious contents. By doing so, threat actors can send a crafted sitemap to search engines and index generated lure pages. This contaminates the search results, making the URLs of compromised websites appear in searches for product names they do not actually handle. Consequently, search engine users are directed to visit these sites. The SEO malware then intercepts the request handler and redirects the user\u2019s browser to fake e-commerce sites. Specifically, the technique of using Japanese keywords to redirect search results to fake Japanese e-commerce sites is known as the <a href=\"https:\/\/blog.sucuri.net\/2020\/04\/japanese-keyword-hack.html\" target=\"_blank\" rel=\"noopener\">Japanese keyword hack<\/a>.<\/p>\n<h4>Analysis and results<\/h4>\n<p>In this study, we focus on this blackhat SEO technique and aim to shed light on the characteristics of the threat actors behind it. To do so, we collected data from 227,828 fake e-commerce sites obtained from 1,242 command-and-control (C&amp;C) servers of six SEO malware families (Table 1). Upon collection, we immediately improved our Web Reputation (WRS) technology so that it blocks these sites and prevents users from accessing them.<\/p>\n<p><center><\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"568\">\n<tbody readability=\"10.5\">\n<tr readability=\"2\">\n<td width=\"94\" valign=\"top\"><b>Malware family ID<\/b><\/td>\n<td width=\"473\" valign=\"top\"><b>Identifying characteristics<\/b><\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"94\" valign=\"top\">A<\/td>\n<td width=\"473\" valign=\"top\">C&amp;C host name is formatted as \u201c&lt;four digits&gt;-ch4-v&lt;two or three digits&gt;\u201d. The numbers are increasing over time. Sometimes a specific obfuscation algorithm is applied.<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"94\" valign=\"top\">B<\/td>\n<td width=\"473\" valign=\"top\">Communicate with C&amp;C servers by HTTP POST method. C&amp;C server URL contains a string like \u201cz&lt;five digits&gt; &lt;one or two digits&gt;\u201d.<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"94\" valign=\"top\">C<\/td>\n<td width=\"473\" valign=\"top\">A function named doutdo or smoutdo is used. C&amp;C server URL is hard-coded as a rot13-encoded hex-escaped string.<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"94\" valign=\"top\">D<\/td>\n<td width=\"473\" valign=\"top\">Replies a part of C&amp;C server host name and \u201cok\u201d on request to \/jp2023. C&amp;C host name consists of three to four characters of prefix and subsequent three digits.<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td width=\"94\" valign=\"top\">E<\/td>\n<td width=\"473\" valign=\"top\">Replies a part of C&amp;C server host name and \u201cbeautiful\u201d on request to \/jp2023. Some variants do not have a hard-coded part of handling \/jp2023. C&amp;C host name consists of three or four characters of prefix and subsequent three digits.<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"94\" valign=\"top\">F<\/td>\n<td width=\"473\" valign=\"top\">Replies contents retrieved from its C&amp;C server on request to \/jp2023. C&amp;C host name consists of \u201ccw\u201d and subsequent three digits.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p><span class=\"rte-icon-component-text\">Table 1. SEO malware families found from VirusTotal<\/span><\/p>\n<p>Then, we analyzed the links between them using <a href=\"https:\/\/www.maltego.com\/\" target=\"_blank\" rel=\"noopener\">Maltego<\/a>, a popular link analysis tool. We defined four links to create a Maltego graph, as depicted in Figure 1. The experiment\u2019s results (Figure 2) suggest the possibility that three groups of threat actors use only one malware family that is unique to each group, whereas one group uses multiple malware families.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/seo-malware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro researchers, in collaboration with Japanese authorities, analyzed links between SEO malware families used in SEO poisoning attacks that lead users to fake shopping sites. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57643,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9534,9509],"class_list":["post-57642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-latest-news","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/SEOmalware-thumbnail:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations\",\"datePublished\":\"2024-11-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/\"},\"wordCount\":904,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/\",\"name\":\"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg\",\"datePublished\":\"2024-11-11T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-11-11T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/SEOmalware-thumbnail:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations","datePublished":"2024-11-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/"},"wordCount":904,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Latest News","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/","url":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/","name":"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg","datePublished":"2024-11-11T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations.jpg","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-and-japanese-partners-reveal-hidden-connections-among-seo-malware-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57642"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57643"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}