Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Rp Quarterly Threat q1 2013

Rp Quarterly Threat q1 2013

Ratings: (0)|Views: 111|Likes:
Published by NextSmartphone
McAfee Labs Rp Quarterly Threat Q1 2013
McAfee Labs Rp Quarterly Threat Q1 2013

More info:

Published by: NextSmartphone on Jun 06, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





By McAfee
McAee Threats Report: First Quarter 2013
McAfee Threats Report: First Quarter 2013
McAee Labs researchers have analyzed the threats o the rst quarter o 2013 and recognized several amiliar trends:steady growth in mobile malware and a rapid increase in general malware, including Facebook threat Koobace, AutoRunmalware, and stealth malware that attacks the master boot record (MBR). Worldwide spam doubled during the quarter—as it makes a comeback ater more than a year o decline.Narrowly targeted attacks ocused on the nancial sector, but one came with a twist. Our analysis o the Citadel Trojanshows that cybercriminals have ound a way to turn this traditional bank-account threat into the broader thet o personalinormation rom narrowly targeted victims in certain countries. Will the attackers use this data in the uture?Our count o mobile malware samples, just about exclusively or the Android OS, continues to skyrocket. Almost30 percent o all mobile malware appeared this quarter. Malicious spyware and targeted attacks highlighted the latestassaults on mobile phones.All malware that we track—aecting clients, servers, networks, mobiles—now stands at more than 128 million samples.That gure has climbed steadily or ages and quite rapidly during the last two quarters. Koobace, along with AutoRun,ransomware, and MBR threats, were the leaders this period. With ransomware, cybercriminals hold a system hostage andinsist on payment to unlock a computer. But will they ree the machine ater the victim pays? There are no guarantees, andanonymous payment systems make it basically impossible to track their movements. MBR threats can remain on a systemor a long time without the victim’s knowledge and download other orms o malware.The McAee Global Threat Intelligence
network tells us that IP addresses in the United States are again both the sourceand the target o most malicious network activity. Browser-based attacks, such as hidden irames and malicious Java code,are the most common type.Our analysis o web threats ound that the number o new suspicious URLs, mostly in the United States, increased by12 percent this quarter. New phishing attacks aimed primarily at online auctions and nancial targets. One o the biggeststories this quarter is the increase in spam ater more than a year o decline. We counted 1.9 trillion messages in March.That’s lower than record levels but about twice the volume o December 2012.Cybercriminals continue to develop and market crimeware tools, which make it easy or inexperienced scammers to jointhe ranks and exploit victims. The European Union’s new European Cybercrime Centre was instrumental in aiding lawenorcement to arrest and prosecute online criminals. Hacktivists raised the possibility o using denial-o-service attacks aslawul means to support their ends. We also examine the eorts o cyberarmies during the quarter. These groups usuallyarise in countries that limit personal liberties and claim to act on behal o their governments.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->