Threat Center

Отчет McAfee об угрозах

Август 2014


Загрузить отчет

Джекпот! Отмывание денег через веб-сайты для азартных игр


Загрузить информационный документ
Загрузить сокращенный вариант документа

Вести с передового края безопасности


Читайте блог McAfee Labs

Search the Threat Library

Application Name
DNS Server
Intrusion Attack
IP Address
Malware Name
Domain Name
Website URL / Address
Vulnerability Name

(Example: W32/Espace.worm)

McAfee Labs Blog

Join the Conversation Next Page

  • Top 3 Phishing Attacks Use Similar Tricks
    Mohammed Mohsin Dalla - Сентябрь 16, 2014

    Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal your web mail credentials. Web Mail Scam This scam starts with an email that appears to come from Administrator or Helpdesk and requests that you validate or update your account. […]

    The post Top 3 Phishing Attacks Use Similar Tricks appeared first on McAfee.

  • Quarian Targeted-Attack Malware Evades Sandbox Detection
    Saravanan Mohankumar - Сентябрь 9, 2014

    Last year, we blogged about the actor known as Quarian, who is involved in targeted attacks. This individual or group has been active since at least 2011 and has targeted government agencies. The attacks use spear phishing campaigns with crafted .pdf and .doc files as bait for unsuspecting users. Recently, we found a new sample […]

    The post Quarian Targeted-Attack Malware Evades Sandbox Detection appeared first on McAfee.

  • BackOff Malware Uses Encryption to Hide Its Intentions
    Ankit Anubhav - Сентябрь 8, 2014

    Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware. They do this to evade static-based clustering and detection even though the behavior is the same. In many cases obfuscation also helps hide the threat’s malicious intentions from security researchers. BackOff, a point-of-sale malware designed […]

    The post BackOff Malware Uses Encryption to Hide Its Intentions appeared first on McAfee.