Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
McAfee Threats Report Q2 2011

McAfee Threats Report Q2 2011

Ratings: (0)|Views: 14,200 |Likes:
Published by Jonathan Fingas

More info:

Published by: Jonathan Fingas on Aug 23, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/10/2013

pdf

text

original

 
McAee Threats Report:Second Quarter 2011
By McAee
®
Labs
Report
 
Report 
McAee Threats Report: Second Quarter 2011
The threat landscape o 2011 is undergoing a year o chaos and change. We see chaos in the majorchallenges that hacktivist groups such as LulzSec and Anonymous pose, and change in the shits in newmalware classes and targeted devices.This quarter McAee Labs saw major hacktivist activity—but in a very dierent way. The group LulzSecurity, LulzSec or short, diers rom other hacktivist groups in that they had no specic goals. Theywere in it, as they claimed, or the “lulz” (LOLs in text messagespeak, or “laugh out loud’s” ) butshowed an agility at compromising networks and servers, and stealing usernames, passwords, and otherdata. LulzSec committed multiple intrusions against a wide variety o companies, as well as attacksagainst police departments and intelligence agencies, and many other compromises. Although manyo the outcomes and uses o these compromises are still in play (and we provide a helpul overview othe quarter’s activity) one thing has become clear: Many companies, both large and small, are morevulnerable than they may have suspected. Further, the security industry may need to reconsider someo its undamental assumptions, including “Are we really protecting users and companies?” AlthoughLulzSec may have ceased its operations during this quarter, the questions they and other hacktivistgroups have raised will be debated or a long time.One signicant change in the rst quarter o 2011 was Android’s becoming the third-most targetedplatorm or mobile malware. This quarter the count o new Android-specic malware moved to numberone, with J2ME (Java Micro Edition), coming in second while suering only a third as many malware.This increase in threats to such a popular platorm should make us evaluate our behavior on mobiledevices and the security industry’s preparedness to combat this growth.We also saw an increase in or-prot mobile malware, including simple SMS-sending Trojans andcomplex Trojans that use exploits to compromise smartphones. We oer an update o cybercrime“pricebooks” as well as some changes to toolkit and service prices. “Crimeware as a service” and theburgeoning “hacktivism as a service” continue to evolve as interests and targets change. On the positiveside, there were some signicant victories against cybercriminals this quarter.Continuing the change theme, we observed a considerable decrease in both AutoRun and Koobacemalware, oset by a strong rise in ake-anti-virus sotware that targets the Mac. Apple’s OS X hasbeen mostly ignored by malware writers or years, so this represents a signicant change o targetor cybercriminals.Malware continued its overall growth during the quarter as did rootkit malware. Rootkits, used primarilyor stealth and resilience, makes malware more eective and persistent; its popularity is rising. Rootkitssuch as Koutodoor and TDSS appear with increasing requency. The amount o malware that attacksvulnerabilities in Adobe products continues to overwhelm those in Microsot products.Botnets and messaging threats, although still at historic lows, have begun to rise again. We expectedthis recovery ater some recent botnet takedowns. Users and enterprises must plan or this growth andprepare their deenses and responses accordingly. We again examine social engineering subjects by bothgeography and subject and botnets by geography and type.We saw several spikes in malicious web activity this quarter as well as some serious growth in blogsand wikis with malicious reputations. Sites that deliver malware, potentially unwanted programs, andphishing sites also increased.The second quarter o the year was clearly a period o chaos, changes, and new challenges.
 
Report 
McAee Threats Report: Second Quarter 2011
Table o Contents
4
5
7
9

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
PacoSepulveda liked this
mfrwritz liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->