Featured Blogs
GameOver Zeus/Cryptolocker: Am I Still Infected?
It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...
GandCrab Ransomware Puts the Pinch on Victims
Update: On August 9 we added our analysis of Versions 4.2.1 and 4.3. The GandCrab ransomware first appeared in January...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
McAfee Advanced Threat Research (ATR) recently released a report describing a fileless attack targeting organizations involved with the Pyeongchang Olympics. The attack used a PowerShell implant that established a channel to the attacker’s server to gather basic system-level data. What was not determined at that time was what occurred after ...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
Google Code Projects Host Android Malware
[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working...
Google Play Users Risk a Yellow Card With Android/FoulGoal.A
This blog post was co-written by Irfan Asrar. English soccer fans have enthusiastically enjoyed the team’s current run in the...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...
Hacker Leaves Online Trail, Loses Anonymity
Since March 20, the @Anonw0rmer Twitter account has been silent. Its owner, w0rmer, is known as a member of the...
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Hacktivists Turn to Phishing to Fund Their Causes
At McAfee we recently observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress...
HANCITOR DOC drops via CLIPBOARD
By Sriram P & Lakshya Mathur Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as...
Hancitor Making Use of Cookies to Prevent URL Scraping
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats...
Happy New Year 2019! Anatova is here!
During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name...
Hardware Hack Bypasses iPhone PIN Security Counter
A security researcher from the University of Cambridge has found a way to hack the iPhone NAND memory hardware to...
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant
This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales. On February 28, the McAfee Advanced...
Hidden Data Economy Report Exposes Price Points for Stolen Data
McAfee today released The Hidden Data Economy report, which provides examples of how different types of stolen data is being...
HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
Honoring Our Brave Military Veterans from the McAfee Community
Paying Tribute November 11 marks Veterans Day and Remembrance Day. It is a time for us to come together and...
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...