McAfee Labs – McAfee Blogs Securing Tomorrow. Today.
- Fighting new Ransomware Techniques with McAfee’s Latest Innovationsby Nicolas Stricher on July 20, 2021 at 4:01 am
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see that McAfee’s June 2021 Threat report is primarily focused on this topic. This report provides a large range of statistics using the McAfee data lake behind MVISION Insights, including the Top MITRE ATT&CK Techniques. In The post Fighting new Ransomware Techniques with McAfee’s Latest Innovations appeared first on McAfee Blogs.
- An Overall Philosophy on the Use of Critical Threat Intelligenceby Patrick Flynn on July 16, 2021 at 8:15 pm
The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose. You never can exactly tell how they will come at you, but come they will. It’s no different than fighting a kinetic foe in that, before you fight, you must choose your ground and The post An Overall Philosophy on the Use of Critical Threat Intelligence appeared first on McAfee Blogs.
- REvil Ransomware Uses DLL Sideloadingby McAfee Labs on July 16, 2021 at 4:49 pm
This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among organizations; due to an increase in Ransomware-as-a-service (RaaS) on the black market. RaaS provides readily available ransomware to cyber criminals and is an effective way for attackers to deploy a variety of ransomware in a The post REvil Ransomware Uses DLL Sideloading appeared first on McAfee Blogs.
- Zloader With a New Infection Techniqueby McAfee Labs on July 8, 2021 at 9:44 pm
This blog was written by Kiran Raj & Kishan N. Introduction In the last few years, Microsoft Office macro malware using social engineering as a means for malware infection has been a dominant part of the threat landscape. Malware authors continue to evolve their techniques to evade detection. These techniques involve utilizing macro obfuscation, DDE, The post Zloader With a New Infection Technique appeared first on McAfee Blogs.
- New Ryuk Ransomware Sample Targets Webserversby Marc Elias on July 7, 2021 at 4:01 am
Executive Summary Ryuk is a ransomware that encrypts a victim’s files and requests payment in Bitcoin cryptocurrency to release the keys used for encryption. Ryuk is used exclusively in targeted ransomware attacks. Ryuk was first observed in August 2018 during a campaign that targeted several enterprises. Analysis of the initial versions of the ransomware revealed The post New Ryuk Ransomware Sample Targets Webservers appeared first on McAfee Blogs.
- Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829by Hardik Shah on June 30, 2021 at 3:00 pm
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It is available for the Windows, Linux, MacOS platforms as well as Android and iOS. It is used for editing, creating or converting various digital image formats and supports various formats like PNG, JPEG, WEBP, TIFF, The post Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829 appeared first on McAfee Blogs.
- Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+by Hardik Shah on June 28, 2021 at 7:44 pm
Introduction Microsoft Windows Graphics Device Interface+, also known as GDI+, allows various applications to use different graphics functionality on video displays as well as printers. Windows applications don’t directly access graphics hardware such as device drivers, but they interact with GDI, which in turn then interacts with device drivers. In this way, there is an The post Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+ appeared first on McAfee Blogs.
- McAfee Labs Report Highlights Ransomware Threatsby Raj Samani on June 24, 2021 at 4:01 am
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce additional context into the biggest stories dominating the year thus far including recent ransomware attacks. While the topic itself is not new, there is no question that the threat is now truly mainstream. This Threats The post McAfee Labs Report Highlights Ransomware Threats appeared first on McAfee Blogs.
- A New Program for Your Peloton – Whether You Like It or Notby Sam Quinn on June 16, 2021 at 4:01 am
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. As security researchers, something that we always try to establish before looking at a target is what our scope should be. More specifically, we often assume well-vetted technologies like network stacks or the OS layers are The post A New Program for Your Peloton – Whether You Like It or Not appeared first on McAfee Blogs.
- Are Virtual Machines the New Gold for Cyber Criminals?by ATR Operational Intelligence Team on June 10, 2021 at 3:21 pm
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale up IT systems in a heartbeat, allowing then to be more agile as opposed to investing into dedicated “bare-metal” hardware. To the outside untrained eye, it might seem that there are different machines on the The post Are Virtual Machines the New Gold for Cyber Criminals? appeared first on McAfee Blogs.
- Scammers Impersonating Windows Defender to Push Malicious Windows Appsby Craig Schmugar on May 17, 2021 at 9:25 pm
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender Update Victims end up allowing the installation of a malicious Windows Application that targets user and system information Browser push notifications can highly resemble Windows system notifications. As recently discussed, scammers are abusing push notifications The post Scammers Impersonating Windows Defender to Push Malicious Windows Apps appeared first on McAfee Blogs.
- DarkSide Ransomware Victims Sold Shortby Raj Samani on May 14, 2021 at 10:32 am
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the recent gas pipeline shutdown. Many of the excellent technical write-ups will detail how it operates an affiliate model that supports others to be involved within the ransomware business model (in addition to the developers). While The post DarkSide Ransomware Victims Sold Short appeared first on McAfee Blogs.
- Major HTTP Vulnerability in Windows Could Lead to Wormable Exploitby Steve Povolny on May 12, 2021 at 3:48 pm
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server which can be run standalone or in conjunction with IIS (Internet Information Services) and is used to broker internet traffic via HTTP network requests. The vulnerability is very similar to CVE-2015-1635, another Microsoft vulnerability in The post Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit appeared first on McAfee Blogs.
- “Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cardsby Anne An on May 11, 2021 at 4:01 am
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From the initial lockdown to the cancellation of events and the prohibition of business travel, to the reopening of restaurants, and relaxation of COVID restrictions on outdoor gatherings, the vaccine rollout has played a critical role The post “Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards appeared first on McAfee Blogs.
- Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malwareby ZePeng Chen on May 5, 2021 at 6:17 pm
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian Android users since 2018. In the second half of 2020, the campaign improved its effectiveness by adopting dynamic DNS services and spreading messages with phishing URLs that infected victims with the fake Chrome application MoqHao. The post Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware appeared first on McAfee Blogs.
- How to Stop the Popupsby Craig Schmugar on May 5, 2021 at 6:06 pm
McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying many others. A significant portion is attributed to browser-based push notifications, and while there are a couple of simple steps users can take to prevent and remediate the situation, there is also some confusion about The post How to Stop the Popups appeared first on McAfee Blogs.
- Steps to Discover Hidden Threat from Phishing Emailby Debojyoti Chakraborty on May 5, 2021 at 6:04 pm
Introduction Email is one of the primary ways of communication in the modern world. We use email to receive notifications about our online shopping, financial transaction, credit card e-statements, one-time passwords to authenticate registration processes, application for jobs, auditions, school admissions and many other purposes. Since many people around the globe depend on electronic mail The post Steps to Discover Hidden Threat from Phishing Email appeared first on McAfee Blogs.
- Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalationby Chintan Shah on April 20, 2021 at 3:27 pm
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial infection, such malware would usually need to perform a higher privileged task or execute a privileged command on the compromised system to be able to further enumerate the infection targets and compromise more systems on The post Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation appeared first on McAfee Blogs.
- Clever Billing Fraud Applications on Google Play: Etinuby Sang Ryol Ryu on April 19, 2021 at 9:42 pm
A new wave of fraudulent apps has made its way to the Google Play store, targeting Android users in Southwest Asia and the Arabian Peninsula as well—to the tune of more than 700,000 downloads before detection by McAfee Mobile Research and co-operation with Google to remove the apps. Figure 1. Infected Apps on Google Play The post Clever Billing Fraud Applications on Google Play: Etinu appeared first on McAfee Blogs.
- McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surgesby Raj Samani on April 13, 2021 at 4:01 am
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: April 2021. In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted. Historically, our reports The post McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges appeared first on McAfee Blogs.
- BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spainby Fernando Ruiz on April 12, 2021 at 4:13 pm
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google Play, ironically posing as app security scanners. These malicious apps urge users to update Chrome, WhatsApp, or a PDF reader, yet instead of updating the app in question, they take full control of the device The post BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain appeared first on McAfee Blogs.
- McAfee ATR Threat Report: A Quick Primer on Cuba Ransomwareby Thomas Roccia on April 6, 2021 at 5:00 pm
Executive Summary Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact and revenue, much like we have seen recently with other major ransomware campaigns. In our analysis, we observed that the attackers had access to the network before the infection and were able to collect specific information The post McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware appeared first on McAfee Blogs.
- McAfee Defender’s Blog: Cuba Ransomware Campaignby Colby Burkett on April 6, 2021 at 5:00 pm
Cuba Ransomware Overview Over the past year, we have seen ransomware attackers change the way they have responded to organizations that have either chosen to not pay the ransom or have recovered their data via some other means. At the end of the day, fighting ransomware has resulted in the bad actors’ loss of revenue. The post McAfee Defender’s Blog: Cuba Ransomware Campaign appeared first on McAfee Blogs.
- McAfee Defenders Blog: Reality Check for your Defensesby Chris Trynoga on March 31, 2021 at 4:22 pm
Welcome to reality Ever since I started working in IT Security more than 10 years ago, I wondered, what helps defend against malware the best? This simple question does not stand on its own, as there are several follow-up questions to that: How is malware defined? Are we focusing solely on Viruses and Trojans, or The post McAfee Defenders Blog: Reality Check for your Defenses appeared first on McAfee Blogs.
- Netop Vision Pro – Distance Learning Software is 20/20 in Hindsightby Sam Quinn on March 22, 2021 at 4:01 am
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. We recently investigated software installed on computers used in K-12 school districts. The focus of this blog is on Netop Vision Pro produced by Netop. Our research The post Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight appeared first on McAfee Blogs.
- McAfee Defender’s Blog: Operation Dianxunby Andrea Rossini on March 16, 2021 at 1:00 pm
Operation Dianxun Overview In a recent report the McAfee Advanced Threat Research (ATR) Strategic Intelligence team disclosed an espionage campaign, targeting telecommunication companies, named Operation Diànxùn. The tactics, techniques and procedures (TTPs) used in the attack are like those observed in earlier campaigns publicly attributed to the threat actors RedDelta and Mustang Panda. Most probably The post McAfee Defender’s Blog: Operation Dianxun appeared first on McAfee Blogs.
- Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companiesby Thomas Roccia on March 16, 2021 at 1:00 pm
In this report the McAfee Advanced Threat Research (ATR) Strategic Intelligence team details an espionage campaign, targeting telecommunication companies, dubbed Operation Diànxùn. In this attack, we discovered malware using similar tactics, techniques and procedures (TTPs) to those observed in earlier campaigns publicly attributed to the threat actors RedDelta and Mustang Panda. While the initial vector The post Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companies appeared first on McAfee Blogs.
- Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updatesby Eoin Carroll on March 9, 2021 at 6:13 pm
Overview For the March 2021 Patch Tuesday, Microsoft released a set of seven DNS vulnerabilities. Five of the vulnerabilities are remote code execution (RCE) with critical CVSS (Common Vulnerability Scoring Standard) scores of 9.8, while the remaining two are denial of service (DoS). Microsoft shared detection guidance and proofs of concept with MAPP members for The post Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates appeared first on McAfee Blogs.
- McAfee ATR Thinks in Graphsby Valentine Mairet on March 8, 2021 at 11:00 am
0. Introduction John Lambert, a distinguished researcher specializing in threat intelligence at Microsoft, once said these words that changed perspectives: “Defenders think in lists. Attackers think in graphs.” This is true and, while it remains that way, attackers will win most of the time. However, the true power of graphs does not only reside in The post McAfee ATR Thinks in Graphs appeared first on McAfee Blogs.