Cryptocurrency Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine
by Janus Agcaoili and Gilbert Sison The prodigious ascent of cryptocurrency-mining malware was not only brought about by its high profit potential, but also due to its ability to remain undetected within a system, especially when combined with various obfuscation routines. The concept of a stealthy, difficult-to-detect malware operating behind the scenes has proven to […] more…Hackable?, the Original Podcast from McAfee, is Back for Season Three
Here at McAfee, everything we do is driven by our desire to make the digital world more secure. The proliferation of internet-connected technology has made cybercrime the greatest challenge of the digital age. But we can’t fight it alone. That’s why as Chief Consumer Security Evangelist, one of my biggest concerns is raising cybersecurity awareness. […] more…Spam and phishing in Q3 2018
Quarterly highlights Personal data in spam We have often said that personal data is candy on a stick to fraudsters and must be kept safe (that is, not given out on dubious websites). It can be used to gain access to accounts and in targeted attacks and ransomware campaigns. In Q3, we registered a surge […] more…IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to toys, to wearables, to appliances — has wholly transitioned from analog to digital (rotary to wireless). What you may not realize is that with this dramatic transition, comes a fair amount of risk. Privacy for Progress With […] more…What is WPA3? Wi-Fi security protocol strengthens connections
The Wi-Fi Alliance has introduced the first major security improvement to Wi-Fi in about 14 years: WPA3. The most significant additions to the new security protocol are greater protection for simple passwords, individualized encryption for personal and open networks, and even more secure encryption for enterprise networks. The original Wi-Fi Protected Access (WPA) standard was […] more…What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade
The Wi-Fi Alliance has introduced the first major security improvement to Wi-Fi in about 14 years: WPA3. The most significant additions to the new security protocol are greater protection for simple passwords, individualized encryption for personal and open networks, and even more secure encryption for enterprise networks. The original Wi-Fi Protected Access (WPA) standard was […] more…Trickbot Shows Off New Trick: Password Grabber Module
By Noel Anthony Llimos and Carl Maverick Pascual Trickbot, which used to be a simple banking trojan, has come a long way. Over time, we’ve seen how cybercriminals continue to add more features to this malware. Last March, Trickbot added a new module that gave it increased detection evasion and a screen-locking feature. This month, […] more…Gathering Insights on the Reemergence and Evolution of Old Threats Through Managed Detection and Response
by Erika Mendoza, Anjali Patil, Jay Yaneza, and Jessie Prevost Smart Protection Network (SPN) data and observations from Managed Detection and Response (MDR) for the North American region show the persistence of older threats and tactics: delivery methods such as spam emails are still going strong, while ransomware attacks have seen a renewed vigor alongside […] more…DDoS Attacks in Q3 2018
News Overview The third quarter 2018 turned out relatively quiet in terms of DDoS attacks. “Relatively” because there were not very many high-level multi-day DDoS onslaughts on major resources. However, the capacities employed by cybercriminals keep growing year after year, while the total number of attacks shows no signs of decline. The early July attack […] more…Disrupting the Flow: Exposed and Vulnerable Water and Energy Infrastructures
by Stephen Hilt, Numaan Huq, Vladimir Kropotov, Robert McArdle, Cedric Pernet, and Roel Reyes Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected […] more…Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting you of a virus. The scary-looking, flashing warning tells you to download an “anti-virus software” immediately. Impulsively, you do just that and download either the free or the $9.99 to get the critical download. But […] more…Android/TimpDoor Turns Mobile Devices Into Hidden Proxies
The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading and installing a fake voice-message app which allows cybercriminals to use infected devices as network proxies without users’ knowledge. If the fake application is installed, a background service starts a Socks proxy that redirects all […] more…Update: LionPath Class Scheduler is currently unavailable.
UPDATE: LionPath technical staff have contacted the third party vendor responsible for the scheduler. There is still no estimated time to when the issue will be resolved. BODY: PEOPLE AND LOCATIONS IMPACTED: All Students from all Campuses attempting access the LionPath Scheduler. IT SERVICE IMPACTED: LionPath Class Scheduler is currently unavailable. Users may experience an […] more…Have You Talked to Your Kids About a Career in Cybersecurity?
Here’s some cool trivia for you: What profession currently has a zero-percent unemployment rate, pays an average of $116,000 a year, and is among the top in-demand jobs in the world? A lawyer? A pharmacist? A finance manager, perhaps? Nope. The job we’re talking about is a cybersecurity specialist and, because of the increase in cyber […] more…Octopus-infested seas of Central Asia
For the last two years we have been monitoring a Russian-language cyberespionage actor that focuses on Central Asian users and diplomatic entities. We named the actor DustSquad and have provided private intelligence reports to our customers on four of their campaigns involving custom Android and Windows malware. In this blogpost we cover a malicious program […] more…Smarter Clicks: 5 Tips to Help Your Family Avoid Risky Cyber Search Traps
Searching the internet has become as much a part of daily life as pouring that first cup of coffee each morning. We rely on it, we expect it to deliver, and often, we do it without much thought. McAfee’s annual Most Dangerous Celebrity list gives us a chance to hit pause on our habits and […] more…More information
- In Other News: Utilities Targeted by Hackers, Aerospace Attacks, Killnet Leader Unmasked
- Law Officials Plan Global Strike at ‘Dark Markets’: Dutch
- Google Improves Safe Browsing for Network Admins
- Industrial Giant Thyssenkrupp Again Targeted by Cybercriminals
- News in brief: PCs’ PCs still running XP; bug-hunters cashing in; airport security stepped up
- New MacOS Malware Linked to North Korean Hackers
- JD.com expands logistics services to include parcel delivery
- A guide to getting first-party data from your customers
- Facebook Notifies 800,000 Users of Blocking Bug
- How to handle a digital-certificate fraud incident