McAfee Labs Threats Reports

Insights into malware, ransomware, and other cybersecurity threats from the McAfee threat research team

McAfee Labs Threats Report

McAfee Labs Threats Report: September 2018

It’s no surprise that in Q2 2018, we continue to see bad actors go where the money is—from coin mining to billing fraud campaigns—and evolve and refine their tactics to defraud unsuspecting victims.

Our latest findings include:

  • Coin miner malware continues to outpace ransomware: Total coin miner malware almost doubled (up 86%) in Q2 with more than 2.5 million new samples, compared with 990,000 for ransomware.
  • New billing fraud campaign on Google Play: The McAfee Mobile Research team found 15 new apps—including a ringtone of the hit song “Despacito”—that contained a fake installer app aimed at subscribing users to premium-rate services without their knowledge.
  • JavaScript malware surges in Q2: After decreasing significantly during the last three quarters, JavaScript malware increased by 204% in Q2, with more than 7 million new samples.
Read ReportView Infographic

McAfee Labs Blog

Archived Reports

two-women-talking-ipad-sm

This edition covers news and statistics gathered by McAfee Labs in the first quarter of 2018. Highlights include how attackers are employing new tactics, updates on the latest threat campaigns (Operation GhostSecret and Lazarus), a surge in coin miner malware, and a rise in multisector attacks.

Read Report >
View Infographic >
african-american-collaboration

This quarter we saw cybercriminals pivot toward newer tools and techniques, PowerShell malware grow 267%, and reported incidents in the healthcare sector rise 211%.

Read Report >
View Infographic >
business-caucasian-3males-collaboration-sm

This quarter saw new malware increase 10% to 57.6 million new samples, a 60% increase in new mobile malware due to Android ransomware, and 263 global incidents reported.

Read Report >
View Infographic >
men-looking-monitor-sm

This quarter, we analyze the recent WannaCry and Petya attacks, offer advice for using certain types of indicators of compromise when hunting for threats, and explore script-based malware.

Read Report >
View Infographic >