Trend Micro insider sells customer data to scammers
Scammers used stolen data to make fraudulent phishing calls


A rogue agent within Trend Micro has been selling its customers' data to unknown criminal third parties, the cyber security company has announced.
A blog post on the company's website revealed that a Trend Micro employee was discovered to have harvested the personal details of around 70,000 customers, which they then sold to an "unknown third-party malicious actor".
The insider infiltrated a Trend Micro customer support database containing names, email addresses, support ticket numbers and some customers' telephone numbers. The company stated that it has found "no indication" that the culprit accessed any financial or payment information, and stressed that the attack exclusively affected its consumer customers, as opposed to enterprise or government clients.
Trend Micro was first alerted to the issue in August this year, after customers using its consumer security product started to complain about fraudulent calls from scammers claiming to represent Trend Micro support agents. The subsequent investigation, which concluded at the end of October, identified a specific employee who was immediately locked out of the system and summarily terminated.
"Our open investigation has confirmed that this was not an external hack, but rather the work of a malicious internal source that engaged in a premeditated infiltration scheme to bypass our sophisticated controls," the blog post stated.
"That said, we hold ourselves to a higher level of accountability and sincerely apologise to all impacted customers for this situation. Based on the current status of our investigation, we believe that all of the consumers who were potentially affected have already received individual notices from Trend Micro, but we will continue to investigate and provide further notices in the event that any further affected customers are identified."
The company has warned customers it will never call them unexpectedly and that any supposed support calls which have not been pre-arranged are the work of scammers. Trend Micro has also reminded customers that any further assistance or technical issues related to the incident should be referred to its technical support team and will be covered by their existing license.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
For Paul Watts, Domino's UK & Ireland CISO and IT Pro Panellist, this case underlines the risk that insider threats can pose.
"This is a perfect example of what happens when you focus all your energy on protecting the perimeter of your fortress without considering the potential enemy from within," he said. "It is never an easy conversation to have but when it comes to insider threats in your business, trust isn't enough to manage the risk to any level of adequacy."
Trend Micro could also find itself in hot legal water over the breach. Supermarket chain Morrisons is currently embroiled in a Supreme Court battle over whether or not it is liable for the actions of an employee who stole and leaked the data of tens of thousands of staff members; if the case does not go in its favour, companies like Trend Micro who get hit by insider data breaches could find themselves sued by victims.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Asus ZenScreen Fold OLED MQ17QH review
Reviews A stunning foldable 17.3in OLED display – but it's too expensive to be anything more than a thrilling tech demo
By Sasha Muller
-
How the UK MoJ achieved secure networks for prisons and offices with Palo Alto Networks
Case study Adopting zero trust is a necessity when your own users are trying to launch cyber attacks
By Rory Bathgate
-
Exploitation of Docker remote API servers has reached a “critical level”
News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
By Solomon Klappholz
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024
Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
By Solomon Klappholz
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to know
News Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
By Solomon Klappholz
-
SOC modernization and the role of XDR
Whitepaper Automate security processes to deliver efficiencies across IT
By ITPro
-
Uncovering the ransomware threat from global supply chains
Whitepaper Effectively mitigate ransomware risk
By ITPro
-
The near and far future of ransomware business models
Whitepaper Discover how criminals use ransomware as a cyberweapon
By ITPro
-
C-suites consider quantum a serious threat and "amazing" deepfake attacks are just 'months away'
News Deepfake technology has matured at a rapid rate, and video scams are likely to be a on par with the more convincing voice-only campaigns very soon, one expert says
By Rory Bathgate
-
PyPI attack: Targeting of repository 'shows no sign of stopping'
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
By Ross Kelly