Tag: advanced persistent threats

If you’ve been watching or reading the news in the past few weeks, you’re probably wondering why it seems like the bad guys are out in full force – hacking into business databases and stealing credit card and personal data.  The latest Target attack brought these growing nefarious activities to light when over 40 million ...
Read Blog
January 21, 2014:  As more information comes to light, surrounding these events, we continue to identify and analyze additional components and behaviors.   To shed more detailed light on the malware specific to these events, our team in McAfee Labs has released an updated Threat Advisory entitled "McAfee Labs Threat Advisory: EPOS Data Theft".  The ...
Read Blog
The advertising slogan “crunchy on the outside and chewy on the inside” has been used by companies to market candy, cookies, and even tacos. The slogan is particularly relevant given some of the predictions in the McAfee Labs 2014 Predictions Report. Specifically, the crunchy/chewy model illuminates the prediction that deals with the expectations of McAfee ...
Read Blog
Last Thursday morning (October 31), our Advanced Exploit Detection System (AEDS), which we discussed in an earlier post, detected a suspicious sample targeting Microsoft Office. After some investigation, we confirmed this is a zero-day attack. Considering the importance of this incident, we shared our findings immediately with the Microsoft Security Response Center and worked closely ...
Read Blog
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee Labs research during the last couple of years reveals that more than 60 percent of the top botnet families depend on HTTP. These numbers have increased significantly over the last few quarters. The following pie ...
Read Blog
I hope you enjoyed a great summer vacation with your families and loved ones. Personally I had a wonderful and sunny holiday with my family in the south of Spain. Do you remember those days when the summers were quiet and peaceful?  Where almost nothing notable was happening? I am afraid that those days are ...
Read Blog
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14.   Looking back this year's RSA Conference, you might have the feeling that the current threat landscape is primarily a series of advanced attacks. This concept includes well-known advanced persistent threats (APTs) and zero-day vulnerability exploits. To ...
Read Blog
This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is ...
Read Blog
In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated with them. Malware are constantly evolving to become more complex and sophisticated. For example, Unique malware samples broke the 75 million mark in 2011 - Network World 500 malware networks available to launch attacks - ...
Read Blog