Featured Blogs
Evasion Techniques: Encoded JavaScript Attacks PDF Files
Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...
Labs Paper Looks ‘Inside the World of the Citadel Trojan’
Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...
Fake Cleaning Apps in Google Play: an AutoRun Attack and More
Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...
Analyzing the First ROP-Only, Sandbox-Escaping PDF Exploit
The winter of 2013 seems to be “zero-day” season. Right after my colleague Haifei Li analyzed the powerful Flash zero...
Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical...
Malware Behaves Oddly in Automated Analysis Environment
While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only...
Android Malware Goes Bollywood
We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that...
An Overview of Messaging Botnets
In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...
Travnet Trojan Could Be Part of APT Campaign
This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
Turkish ‘Delete Virus’ Targets Facebook Users
Facebook continues to be a favorite target for attackers to spread fake wall-post messages or fake scams. Most of the...
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
One-Click Fraud Variant on Google Play in Japan Steals User Data
Last week McAfee Labs reported a series of “one-click fraud” malware on Google Play in Japan. We have been monitoring...
Travnet Botnet Steals Huge Amount of Sensitive Data
In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet....
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
A Dummies Guide to ‘Insider Trading’ via Botnet
This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook. Want to spread...
Bank Account Logins for Sale, Courtesy of Citadel Botnet
Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques...
Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...
A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2
This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook. In our first post,...
Travnet Botnet Controls Victims With Remote Admin Tool
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...
Delving Deeply Into a Bitcoin Botnet
Bitcoin is a virtual decentralized currency that was created in 2009 by developer Satoshi Nakamoto, who described the currency in...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
Syrian Crisis Reminds Us to Beware of ‘Charity’ Scams
The dismal situation in Syria has gained considerable sympathy in the rest of the world. Unfortunately, playing on our emotions...
Mobile Malware Plays Hide and Seek
Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...