Friday, April 5, 2013

McAfee: types and amount of cyberthreats at the end of last year

According to the report, the attackers changed the scope and improved types used by the malware.

McAfee has submitted a report on threats "Threats Report: Fourth Quarter 2012", in which the experts noted a change in behavior in the choice of cyber criminals and malware.

According to the report, the attackers stopped to focus their attention on the financial sector, as it was previously. Now, hackers try to penetrate other areas of economic activity of victims, using new techniques and tools bypass security.

In addition, hackers have expanded the scope of their activities, are increasingly attacking the public authorities of different countries.

"We see a shift in focus of attacks - now the sights are a number of new fields. This enterprise, corporations and government agencies, and the infrastructure that connects them - said senior vice president of McAfee Labs Vincent Weafer. - We are witnessing the emergence of a new stage of cyberthreats. Creating malicious tools with the ability to obtain illegal profits from attractive to fraudsters of the financial sector - the factors that shaped the new growing "black market". Now demand is cyber weapons and new creative approaches that can deceive security in various areas of the business. "

According to the researchers, in the 4th quarter of 2012 the number of Trojans has increased by 72%. Moreover, most Trojans aimed at stealing credentials victims to access various resources.

In addition, the researchers note a decline in popularity of botnets and widespread malicious links. Number of links with "suspicious" content in the 4th quarter of last year increased by 70%. In 95% of these links contain malicious code, software or exploits.

By 27% during the period increased the number of viruses aimed at the boot sector of the disk. After that, the software steals information, downloads other malicious programs or uses the infected computer to attack other systems or networks.

To double the number of viruses, signed the certificate, which is one of the best ways to bypass the standard antivirus software.

Learn more about the report here.

No comments:

Post a Comment