View All Publications

Filter Content:

Advanced Threat Research Report, October 2021

We’ve shifted new focus to prevalence. In other words, the team is now paying attention to how often do we see the threat in the globe, and more importantly who does it target?

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

Ryuk Ransomware Now Targeting Webservers

Ryuk is a ransomware that encrypts a victim’s files and requests payment in Bitcoin cryptocurrency to release the keys used for encryption. Ryuk is used exclusively in targeted ransomware attacks. The main goal of this blog is to deeply analyze the Ryuk binary itself.

Topics: Advanced Threat Research,McAfee Labs,Ransomware,Threat Research
advanced-threat-research,mcafee-labs,ransomware,threat-research,report

McAfee Labs Threats Report, June 2021

In this report we introduce additional context into the biggest stories dominating the year thus far and we can look no further than recent ransomware attacks.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

McAfee Labs Threats Report, April 2021

This latest report incorporates not only the malware zoo, but new analysis for what is being detected in the wild. We’ve also added statistics detailing the top MITRE ATT&CK techniques observed in Q4 2020 from Criminal/APT groups.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

Technical Analysis of Cuba Ransomware

The following report provides an overview analysis of the capabilities of Cuba ransomware and an explanation of how it works. The data included in this report is related to Cuba ransomware samples from late 2020.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

Technical Analysis of Operation Diànxùn

In this report the McAfee® Advanced Threat Research (ATR) Strategic Intelligence team details an espionage campaign, targeting telecommunication companies, dubbed Operation Diànxùn.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

Technical Analysis of Babuk Ransomware

Babuk ransomware is a new ransomware threat discovered in 2021 that attacked at least five big enterprises, with one already paying the criminals $85,000 after negotiations. In this report, McAfee Advanced Threat Research (ATR) provides a deep insight of this new ransomware variant called Babuk.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

McAfee Labs Threats Report, November 2020

In this report, McAfee Labs takes a closer look into the threats that surfaced in the second quarter of 2020. Our Advanced Threat Research team has been vigilant and aggressive in tracking, identifying and researching the cause and effects of the latest campaigns.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

McAfee Labs COVID-19 Threats Report, July 2020

McAfee Labs COVID-19 Threats Report, July 2020 is a special edition threat report where we take a deeper dive into COVID-19 related attacks, gathered by the McAfee Advanced Threat Research and McAfee Labs teams in 2020.

Topics: McAfee Labs,Threat Research,Advanced Threat Research
mcafee-labs,threat-research,advanced-threat-research,report

McAfee Mobile Threat Report

The mobile platform is an increasing target for nation states to observe key individuals.Threat actors against mobile platforms are broader groups than those simply looking toboost ad revenues.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Infographic: McAfee Labs Threats Report December 2018

This infographic highlights key trends and statistics from the McAfee Labs Threats Report, December 2018, including underground hacker forums, banking Trojans, and multisector attacks.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

McAfee Labs Threats Report December 2018

The McAfee Labs Threats Report, December 2018 introduces several new threats statistics, such as IoT malware, that represent some of the growing trends in attacks. We also look at how the takedowns of key dark web markets continue to impact cybercriminals and their businesses, and at the hot topics in several underground hacker forums.

Topics: Threat Research,McAfee Labs
threat-research,mcafee-labs,report

Operation Sharpshooter

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group, employing McAfee Global Threat Intelligence, have discovered a new global campaign targeting nuclear, defense, energy, and financial companies. This campaign, Operation Sharpshooter, leverages an in-memory implant to download and retrieve a second-stage implant—which we call Rising Sun—for further exploitation.

Topics: McAfee Labs,Advanced Threat Research
mcafee-labs,advanced-threat-research,report

Infographic: McAfee Labs 2019 Threats Predictions

This infographic highlights likely upcoming trends from the McAfee Labs 2019 Predictions Report. We anticipate stronger partnerships in the cybercriminal underground will propel the volume of threats.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

Pay-Per-Install Company Deceptively Floods Market with Unwanted Programs

McAfee Labs has investigated a developer of pay-per-install software that has stayed active for a significant period without much negative press from the media or the computer security industry.

Topics: Advanced Threat Research,McAfee Labs,Threat Research
advanced-threat-research,mcafee-labs,threat-research,report

‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group

This in-depth report analyzes a new data reconnaissance implant targeting Korean-speaking users. The malware reuses a portion of code from the Seasalt implant (circa 2010) that is linked to the Chinese hacking group Comment Crew.

Topics: McAfee Labs,Threat Research,Advanced Threat Research
mcafee-labs,threat-research,advanced-threat-research,report

Infographic: McAfee Labs Threats Report September 2018

This infographic highlights key trends and statistics from the McAfee Labs Threats Report, September 2018, including cryptocurrency mining, billing fraud campaigns and the latest threats.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

McAfee Labs Threats Report September 2018

The McAfee Labs Threats Report, September 2018 shows that cybercriminals continue to go where the money is — from coin mining to billing fraud campaigns — refining their tactics to defraud unsuspecting victims.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Blockchain Threat Report

This in-depth report covers current security problems and specific incidents within blockchain implementations, including bad actor’s techniques, targets, and malware used for attacks.

Topics: Advanced Threat Research,McAfee Labs
advanced-threat-research,mcafee-labs,report

Infographic: McAfee Labs Threat Report June 2018

This infographic highlights key trends and statistics from the McAfee Labs Threats Report, June 2018, including evolving attack techniques, cryptocurrency mining, and multisector attacks.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

McAfee Labs Threats Report June 2018

The McAfee Labs Threats Report, June 2018 examines the growth and trends of new malware, ransomware, and other threats in Q1 2018. The report spotlights evolving attack techniques, cryptocurrency mining, and multisector attacks.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (BTC)

Download the BTCWare threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Cerber)

Download the Cerber threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Cryptomix)

Download the CryptoMix threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Fakeglobe)

Download the Fake Globe threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Gradcrab)

Download the GradCrab threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Killdisk)

Download the KillDisk-Dimens threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Locky)

Download the Locky threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Magniber)

Download the Magniber threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Samsa)

Download the SamSa threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

Threat Analysis Report (Spora)

Download the Spora threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,report

McAfee Labs Threats Report March 2018

The McAfee Labs Threat Report: March 2018 highlights news and statistics gathered by the McAfee® Advanced Threat Research and McAfee Labs teams in Q4 of 2017. This quarter focuses on PowerShell malware, cryptocurrency mining, and increasing attacks targeting the health care sector.

Topics: McAfee Labs
mcafee-labs,report

McAfee Labs Threat Report December 2017

McAfee Labs reports increases in Q3 vs. Q2 in malware (57.5 million new samples), mobile malware (up 60%), ransomware (up 36%), PowerShell-aided attacks (up 119%), and other threats.

Topics: McAfee Labs
mcafee-labs,report

Infographic: McAfee Labs 2018 Threats Predictions

McAfee Labs and the Office of the CTO offer their views on a wide range of future threats, including ransomware, cryptocurrencies, and the imminent loss of privacy in your own home.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

Topics: McAfee Labs
mcafee-labs,report

Threat Report September 2017 Key Findings

See a visual representation of our researchers’ key findings from the September 2017 report.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.

Topics: Advanced Threat Research
advanced-threat-research,solution-brief

McAfee Labs Quarterly Threat Report June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Topics: McAfee Labs
mcafee-labs,report

McAfee Labs Quarterly Threat Report June 2017 - Infographic

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

Infographic: McAfee Labs Threats Report June 2016

This infographic highlights some of the trends in the June 2016 McAfee Labs Threats Report.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

Infographic: Threat Report April 2017 Key Findings

See a visual representation of our researchers’ key findings from the April 2017 report.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

McAfee Labs Threats Report: April 2017

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.

Topics: McAfee Labs
mcafee-labs,report

Targeted Ransomware: No Longer a Future Threat

In a new campaign of targeted ransomware attacks, hackers gained persistent access to the victims' networks through vulnerability exploitation and spread their access to any connected systems that they could.

Topics: Advanced Threat Research
advanced-threat-research,report

Infographic: McAfee Labs Quarterly Threat Report December 2016

McAfee commissioned a primary research study to gain a deeper understanding of the ways in which enterprises are using security operations centers, how they have changed over time, and what they will look like in the future. The second Key Topic summarizes the year in ransomware. Not only was there a huge jump in the number of ransomware attacks in 2016 but we saw significant technical advancements, too. We detail some of those advancements in this story. Finally, the third Key Topic digs into Trojans that infect legitimate code and hide out, hoping to go unnoticed as long as possible to maximize payouts. We show how attackers are creating long-lasting, fully undetectable malware.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

Building and Maintaining a Business Continuity Program White Paper

Is your organization prepared for a crisis? This white paper from McAfee® Foundstone® experts offers an overview of how financial organizations can build and maintain an effective business continuity and disaster recovery program.

Topics: Foundstone Services
foundstone-services,white-paper

Health Warning Report

McAfee researchers investigate the theft of and marketplace for stolen personal health information and biopharmaceutical intellectual property.

Topics: McAfee Labs
mcafee-labs,report

Infographic: Threat Report Key Findings

See a visual representation of our researchers’ key findings from the September 2016 report.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

McAfee Labs Threats Report: March 2016

This infographic highlights some of the trends in the March 2016 McAfee Labs Threats Report.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

The Hidden Data Economy

The marketplace for stolen digital information

Topics: McAfee Labs
mcafee-labs,report

Secure Coding for Android Applications White Paper

This white paper focuses on secure coding practices for Android applications.

Topics: Foundstone Services
foundstone-services,white-paper

Foundstone Services Targeted Malware Threat Assessment 360

Foundstone Services — part of McAfee Professional Services — offers Targeted Malware Threat Assessment 360, so your security organization can discover and respond to advanced threats that go beyond your current security monitoring tools.

Topics: Foundstone Services
foundstone-services,data-sheet

Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked White Paper

Foundstone research reveals the easiest and most prevalent network-based techniques an attacker can use to gain access to systems and data.

Topics: Foundstone Services
foundstone-services,white-paper

A Pentester's Guide to Hacking ActiveMQ-Based JMS Applications

Enterprise messaging systems (EMS) are highly reliable, flexible, and scalable systems that allow asynchronous message processing between two or more applications. This paper provides guidance on penetration testing techniques to assess the security of ActiveMQ-based EMS written using the Java Message Service API.

Topics: Foundstone Services
foundstone-services,white-paper

Infographic: McAfee Labs Threat Report March 2018

The McAfee Labs Threat Report: March 2018 highlights news and statistics gathered by the McAfee® Advanced Threat Research and McAfee Labs teams in Q4 of 2017. This quarter focuses on PowerShell malware, cryptocurrency mining, and increasing attacks targeting the health care sector.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic

Babuk: Moving to VM and *nix Systems Before Stepping Away

A technical analysis of the Babuk ransomware employed by the threat actor will show that there are many flaws found within the code that result in the destruction of victim’s data.

Topics: Threat Research,Advanced Threat Research,McAfee Labs
threat-research,advanced-threat-research,mcafee-labs,report

Infographic: McAfee Labs Threat Report: December 2017

See a visual representation of our key findings from the December 2017 report.

Topics: McAfee Labs,Threat Research
mcafee-labs,threat-research,infographic