Featured Blogs
Attacks on SWIFT Banking System Benefit From Insider Knowledge
In recent months, we’ve seen headlines about the compromise of a bank in Bangladesh from which cybercriminals attempted to steal...
AutoIt and Malware: What’s the Connection?
During the last couple of weeks I’ve come across three malware samples packed using compiled AutoIt scripts, so I decided...
Automatic App Installation from Google Play Poses Big Risk
Android users usually download and install applications from the Google Play store through several interactions with the service–including viewing the...
Automotive Security Moves Into Cyber Realm
The focus on the security of automobiles and the transportation sector as a whole (planes, trains, etc.) is steadily increasing....
Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware
Avaya is the second largest VOIP solution provider (source) with an install base covering 90% of the Fortune 100 companies...
Babuk Ransomware
Executive Summary Babuk ransomware is a new ransomware threat discovered in 2021 that has impacted at least five big enterprises,...
Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?
Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating...
BackOff Malware Uses Encryption to Hide Its Intentions
Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware....
Bank Account Logins for Sale, Courtesy of Citadel Botnet
Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques...
Banload Trojan Targets Brazilians With Malware Downloads
McAfee Labs has recently encountered new variants of the Banload Trojan. Banload has been around since the last decade. This...
Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...
Behind the CAPTCHA: A Clever Gateway of Malware
Authored by Yashvi Shah and Aayush Tyagi Executive summary McAfee Labs recently observed an infection chain where fake CAPTCHA pages...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...
Best Practices for Adapting to a Remote Work Lifestyle
As our world continues to evolve, we have been forced to adapt accordingly. Navigating change can be difficult for many, so...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
Beware the Rapid Proliferation of Cyber-warfare Capabilities
Governments across the globe continue to invest in cyber warfare operations. Over 60 countries, a number that is rising, currently...
Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use
On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora,...
Big, Hard-to-Solve Problems
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Blockchain Transactions Create Risks for Financial Services
This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is...
Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...