“Trojanization” of Legit Apps on the Rise
McAfee today released its McAfee Labs Threats Report: December 2016. The report’s third key topic illustrates how attackers are creating difficult-to-detect malware by infecting legitimate code with...
View Article‘SSL Death Alert’ (CVE-2016-8610) Can Cause Denial of Service to OpenSSL Servers
Recently we noticed a security patch has been published for the OpenSSL vulnerability called SSL Death Alert. As with other serious security vulnerabilities, this one grabbed our attention because the...
View Article‘Popcorn Time’ Ransomware Sure to Cause Indigestion
In early December the new ransomware “Popcorn Time” was discovered. It gives the victim the option of paying the ransom or infecting two other individuals and getting them to pay. “Popcorn Time” is a...
View ArticleAn Overview of Malware Self-Defense and Protection
Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a threat’s remaining undetected and avoiding sandbox analysis, antivirus efforts, or malware...
View ArticleDid You Forget to Patch Your IP Camera?
IP cameras are usually “purchase, install, and don’t touch” devices. But in the current climate of cyberattacks, they now require regular updates and patches. Otherwise your security tool may be...
View ArticleFloki Bot a Sensation With International Cybercriminals
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is...
View ArticleNext Targets for Cybercriminals: the Short Term (Part 1)
Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a china shop. The tougher challenge is figuring...
View ArticleNext Targets for Cybercriminals: the Long Term (Part 2)
In the previous post in this series, I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging devices...
View ArticleDigging Into a Windows Kernel Privilege Escalation Vulnerability: CVE-2016-7255
This blog was written by Stanley Zhu. The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media attention. On November’s Patch Tuesday, Microsoft released a fix...
View ArticleTop Tips for Securing Home Cameras
Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network security. The goal is to increase your security and peace of mind, while...
View ArticleTurkish Instagram Password Stealers Found on Google Play
McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed the apps.) These malware are distributed as utilities and tools...
View ArticleTrojanized Photo App on Google Play Signs Up Users for Premium Services
Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a misnamed app that turned out to be malicious. Every Android app has an ID value,...
View ArticleStopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to avoid detection and analysis. Some threats can also detect monitoring tools used for...
View ArticleAnalyzing KillDisk Ransomware, Part 1: Whitelisting
At McAfee Labs we recently analyzed the ransomware KillDisk. We will share our analysis in two parts: the first, this article, contains general information about the malware and its whitelisting...
View ArticleWith Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s BitLocker, previously known as Secure Startup, you will remember that it was meant to...
View ArticleSpotlight on Shamoon
Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our earlier blogs (on mcafee.com). The campaign...
View ArticleAnalyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service
The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation of this protocol. In the last couple of months,...
View ArticleMcAfee Launches ‘Threat Landscape Dashboard’
Every week, we read in the news of another breach or targeted campaign, as more patches are released to protect against the next strain of sophisticated malware. For the administrators responsible for...
View ArticleAnalyzing KillDisk Ransomware, Part 2: Variants and Screen Unlocking
At McAfee Labs we recently analyzed the ransomware KillDisk. In part 1 of this analysis, we discussed the basics of the malware and its whitelisting to protect itself. In this part, we will provide...
View ArticleThe Cyber Threat Alliance Steps Up to Boost Protection
This blog post was written by Vincent Weafer. With each new cyber threat report, we learn about the increasing volume of new, complex threats appearing across a myriad of server systems, networking...
View Article