Relatórios do McAfee Labs sobre ameaças

Insights sobre malware, ransomware e outras ameaças de segurança cibernética da equipe de pesquisa de ameaças da McAfee

McAfee Labs Threats Report: September 2018

It’s no surprise that in Q2 2018, we continue to see bad actors go where the money is—from coin mining to billing fraud campaigns—and evolve and refine their tactics to defraud unsuspecting victims.

Our latest findings include:

  • Coin miner malware continues to outpace ransomware: Total coin miner malware almost doubled (up 86%) in Q2 with more than 2.5 million new samples, compared with 990,000 for ransomware.
  • New billing fraud campaign on Google Play: The McAfee Mobile Research team found 15 new apps—including a ringtone of the hit song “Despacito”—that contained a fake installer app aimed at subscribing users to premium-rate services without their knowledge.
  • JavaScript malware surges in Q2: After decreasing significantly during the last three quarters, JavaScript malware increased by 204% in Q2, with more than 7 million new samples.
Read ReportView Infographic

Blog do McAfee Labs

Relatórios arquivados

This edition covers news and statistics gathered by McAfee Labs in the first quarter of 2018. Highlights include how attackers are employing new tactics, updates on the latest threat campaigns (Operation GhostSecret and Lazarus), a surge in coin miner malware, and a rise in multisector attacks.

Read Report >
View Infographic >

Neste trimestre, os criminosos cibernéticos empregaram novas ferramentas e técnicas, o malware PowerShell cresceu 267% e os incidentes relatados no setor de assistência médica cresceram 211%.

Leia o relatório >
Veja o infográfico >

Neste trimestre, o malware novo subiu 10%, chegando a 57,6 milhões de novas amostras. Trata-se de um aumento de 60% em malware novo para dispositivos móveis, devido ao ransomware para Android, com 263 incidentes globais relatados.

Leia o relatório >
Veja o infográfico >

Neste trimestre, analisamos os ataques recentes do WannaCry e do Petya, recomendamos o uso de certos tipos de indicadores de comprometimento na caça por ameaças e exploramos o malware baseado em scripts.

Leia o relatório >
Veja o infográfico >