{"id":24052,"date":"2012-09-11T17:33:11","date_gmt":"2012-09-11T07:33:11","guid":{"rendered":"http:\/\/power-up.space\/?p=24052"},"modified":"2012-09-11T17:33:11","modified_gmt":"2012-09-11T07:33:11","slug":"mcafee-threats-report-shows-largest-malware-rise-in-four-years-2","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=24052","title":{"rendered":"MCAFEE THREATS REPORT SHOWS LARGEST MALWARE RISE IN FOUR YEARS"},"content":{"rendered":"<p align=\"center\"><em>Mobile \u201cDrive-by Downloads\u201d, Use of Twitter for Control of Mobile Botnets,<br \/>\nand Mobile \u201cRansomware\u201d Among the Latest Trends<\/em><\/p>\n<p><strong>SANTA CLARA, Calif. \u2013 Sept. 4, 2012<\/strong> \u2013 McAfee today released the <em><a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221145,23197715,316398,1?erl=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Freports%2Frp-quarterly-threat-q2-2012.pdf\">McAfee Threats Report: Second Quarter 2012<\/a><\/em>, which found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5 million increase in malware since Q1 2012 and identified new threats such as mobile \u201cdrive-by downloads\u201d, the use of Twitter for control of mobile botnets, and the appearance of mobile \u201cransomware\u201d.<\/p>\n<p>Through proprietary research and investigation, McAfee Labs has been witness to rapid growth in its database or \u201czoo\u201d of malware samples. With the malware sample discovery rate accelerating to nearly 100,000 per day, McAfee has identified key malware variants affecting a range of users globally.<\/p>\n<p>\u201cOver the last quarter we have seen prime examples of malware that impacted consumers, businesses, and critical infrastructure facilities,\u201d said Vincent Weafer, senior vice president of McAfee Labs. \u201cAttacks that we\u2019ve traditionally seen on PCs are now making their way to other devices.\u00a0 For example, in Q2 we saw <a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221145,23197715,316469,1?erl=http%3A%2F%2Fauc.tractionplatform.com%2Fid%3D4880%2C18221145%2C47983120%2C292144%2C0%3Ferl%3Dhttp%253A%252F%252Fblogs.mcafee.com%252Fmcafee-labs%252Fvariant-of-mac-flashback-malware-making-the-rounds\">Flashback <\/a>, which targeted Macintosh devices and techniques such as ransomware and drive-by downloads targeting mobile.\u00a0 This report highlights the need for protection on all devices that may be used to access the Internet.\u201d<\/p>\n<p><strong>Malware on the rise<\/strong><br \/>\nAs PC malware writers master their craft, they continue to transfer their skills to other popular consumer and business platforms, such as Google\u2019s Android OS.\u00a0 After the mobile malware explosion in <a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221145,23197715,292142,1?erl=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Freports%2Frp-quarterly-threat-q1-2012.pdf\">Q1 2012<\/a>, Android malware shows no signs of slowing down, putting users on high alert. Virtually all new mobile malware detected in Q2 2012 was directed at the Android platform, and was comprised of SMS-sending malware, mobile botnets, spyware and destructive Trojans.<\/p>\n<p><strong>Mobile ransomware and botnets: the latest cybercrime fads<\/strong><br \/>\nRansomware, steadily increasing quarter over quarter, has become a popular avenue for cybercriminals. Damage can range from loss of photos and personal files for home users to data encryption and demands for money for large enterprises. Ransomware is especially problematic as it can hold computers and data hostage, instantly damaging machines.<\/p>\n<p>Botnets, a network of compromised computers infected with malicious software and used to generate spam, send viruses or cause Web servers to fail, have also taken center stage again this quarter with infections reaching a 12-month high. With the U.S. as the global hub of botnet control servers, new methods for control have also been uncovered, including the use of Twitter for mobile botnet command and control. As such, the attacker can tweet commands with relative anonymity and all infected devices will follow them.<\/p>\n<p><strong>Thumb drive corrupters, password stealers and web threats<\/strong><br \/>\nThumb drive and password-stealing malware showed significant growth in Q2. At nearly 1.2 million new samples, the AutoRun worm spreads from thumb drives by executing code embedded in AutoRun files, repeating the process on any and all drives discovered. Password-stealing malware, at nearly 1.6 million new samples, collects account names and passwords, so an attacker can pose as the victim.<\/p>\n<p>Websites with malicious reputations are influenced by the hosting of malware, potentially unwanted programs, or phishing sites. This quarter McAfee Labs recorded an average of 2.7 million new bad URLs per month. In June, these new URLs were related to about 300,000 bad domains, which is equivalent to 10,000 new malicious domains every day.\u00a0 Of the new bad-reputation URLs, 94.2 percent host malware, exploits or code that have been specifically designed to hijack computers.<\/p>\n<p>Each quarter, the McAfee Labs team of 500 multidisciplinary researchers in 30 countries follows the complete range of threats in real time, identifying application vulnerabilities, analysing and correlating risks, and enabling instant remediation to protect enterprises and the public. To learn more about the rise in malware in the full copy of the McAfee Threats Report, Second Quarter 2012, please visit <a href=\"http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q2-2012.pdf\">http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q2-2012.pdf<\/a>.<\/p>\n<p><strong>About McAfee<br \/>\n<\/strong><br \/>\nMcAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world&#8217;s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse and shop the Web more securely. Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. <a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221145,23197715,239993,1?erl=http%3A%2F%2Fwww.mcafee.com\">http:\/\/www.mcafee.com<\/a><\/p>\n<p><em>Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile \u201cDrive-by Downloads\u201d, Use of Twitter for Control of Mobile Botnets, and Mobile \u201cRansomware\u201d Among the Latest Trends SANTA CLARA, Calif. \u2013 Sept. 4, 2012 \u2013 McAfee today released the McAfee Threats Report: Second Quarter 2012, which found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=24052\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28,25],"tags":[],"class_list":["post-24052","post","type-post","status-publish","format-standard","hentry","category-tech-news","category-software-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24052"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24052\/revisions"}],"predecessor-version":[{"id":24057,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24052\/revisions\/24057"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=24052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=24052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}