
Charles McFarland is a Senior Research Scientist. He has been working in the security industry since 2006, focusing on technical training and specialized in encryption technologies before moving on to threat intelligence research. In past research, he has focused on underground markets, and actor behavior. Currently, he is focused on Ransomware campaigns and the actors behind them.
Twitter: @CGMcFarland
More from Charles McFarland
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may...
Cyber Threat Alliance Releases Analysis of Illicit Cryptocurrency Mining
In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat.
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was...
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
The Ripple Effect of the Hansa Takedown
For nearly a decade we have witnessed the systemic rise and fall “dark net” markets. Each time a site is...
McAfee Researchers Analyze Dark Side of Cryptocurrency Craze
In December 2017 Bitcoin values skyrocketed, peaking at the unprecedented amount of roughly US$19,000 per coin. Unsurprisingly, the market for...
Exploring the Correlation Between Bitcoin’s Boom and Evrial’s Capabilities
Many of the stealthiest cyberthreats out there spawn on underground forums, as malware authors leverage the space to sell unique...
Code Execution Technique Takes Advantage of Dynamic Data Exchange
Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple: Craft an email that looks...
- 1
- 2