McAfee report about threats for of the second quarter 2012

Posted: September 6, 2012 in Vulnerability News
Tags: , , ,

McAfee: report about threats

McAfee logoYesterday, McAfee released report about threats for of the second quarter 2012. According to the report, this increase in the number of detected malicious program has not been seen for four years. McAfee Labs found 1.5 million more malware than in the first quarter of 2012, and faced with new kinds of security threats, “drive-by downloads” and programs-extortionists for mobile devices, and the use of Twitter to manage mobile botnets.

Using their own methods of analysis and study of threats, McAfee Labs stated rapid replenishment of its “zoo” threats of malware of various kinds. The number of malicious programs has grown at a rate of approximately 100,000 samples each day. In the report, McAfee identified the main types of malware, pose a threat to a large number of users across the world.

“Over the last quarter we have often found good examples of malware threatening ordinary consumers, businesses and critical infrastructure,” – said Vincent Weafer, senior vice president of McAfee Labs. – Some of the biggest attacks using malware in the second quarter of 2012 include Flashback, aimed at device Macintosh, and Flame, the object of which was the energy sector. This is a good illustration of the growing number of threats.

  • Growth in the number of malware

With the improvement of the skills of malware authors for PCs are beginning to transfer the knowledge and skills to other popular consumer and enterprise platforms, such as Google’s Android OS and iOS from Apple. After a sharp increase in the number of malicious programs for mobile devices, which occurred in the first quarter of 2012, the pace of malware for Android do not show signs of slowing down, forcing the user to be in high alert. Almost all new malicious programs for mobile devices detected in the second quarter of 2012 (the program to send SMS, mobile botnets, spyware, destructive “Trojan horses”), focused on the platform Android.

Despite the fact that malware often infect PCs with software Windows, malicious software can be written for any operating system and platform. The report McAfee warns of threats to all lovers of Macintosh devices that they, too, should be wary of malicious software, and there is a steady increase in the spread of malicious programs for Macintosh: In the first quarter of 2012, it was discovered more than 100 new models.

  • Mobile programs-extortionists and botnets: new cybercrime world

Programs-extortionists, rates of which are growing quarter after quarter, have become a popular tool of cybercriminals. Their damage range is wide – from the loss of photos and personal files private users to encrypt data and to extort money from large companies. Special hazard programs for extortion is that they are taken hostage computers and data, causing enormous damage to health systems.
In the reporting quarter, again made themselves felt botnet (a network of compromised computers infected with malicious software and used to generate spam, spread viruses or disable web servers), demonstrating the highest in the past 12 months, the rate of infection. The world’s largest home to a server to control botnets is the USA. Began to appear, and new ways to manage botnets. So, for example, to control botnets, consisting of mobile devices, has been used Twitter. That is, the attacker, with relative anonymity, publishing team on Twitter and all the infected device to perform.

  • Damage to flash drives, stealing passwords, web-based threats

In the second quarter of malware to damage the flash drive and steal passwords demonstrated significant growth. Worm with a startup, the number of new models which was almost 1.2 million, is spread through flash drives by performing a code embedded in the startup files for all detected flash drives. The number of new samples of malware to steal passwords was about 1.6 million These programs collect user data and passwords, allowing an attacker to impersonate someone who was a victim of his attack.

Web site can get the reputation of malware, if it contains malware or potentially unwanted software, or if it is created for phishing. In the reporting quarter, McAfee Labs experts were recorded monthly average of 2.7 million new URL-addresses with a bad reputation, which makes about 10,000 new malicious domains daily. 94.2 percent of new URL-addresses with a bad reputation are used to host malware, exploits, or code that is specifically designed for computer hacking.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s