Attacks/Breaches
9/4/2012
05:35 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

McAfee: Close To 100K New Malware Samples Per Day In Q2

Biggest bump in four years in number of new malware samples found by security vendor

Malware writers went on a record-breaking tear in the second quarter of this year, pumping out some 100,000 new samples per day, according to a new report from McAfee.

McAfee says there was a 1.5 million increase in malware since the first quarter of 2012, closing in on a rate of nearly 100,000 unique malware samples per day. "Unique malware samples in our 'zoo' collection number 1.5 million more this quarter than last. At this rate we will almost certainly see 100 million samples by next quarter and possibly the first 10-million-sample quarter," McAfee said in its new report.

The hot new threats emerging in Q2 were drive-by mobile downloads, mobile ransomware, and using Twitter to control mobile botnets. "Attacks that we've traditionally seen in PCs are now making their way to other devices. For example, in Q2 we saw Flashback, which targeted Macintosh devices and techniques such as ransomware and drive-by downloads targeting mobile. This report highlights the need for protection on all devices that may be used to access the Internet," said Vincent Weafer, senior vice president of McAfee Labs, in a statement.

Android malware, by far, accounted for most of the new malware McAfee detected, and it was a combination of SMS-borne malware, mobile botnets, spyware, and Trojans. An unnerving trend is an increase in ransomware attacks, where cybercriminals are holding computers and data hostage in exchange for money or some forms of payment.

Twitter is increasingly being used as a command-and-control infrastructure for mobile botnets, using tweets for commands, up from close to 90,000 new variants in the first quarter to more than 120,000 in the second quarter.

Meanwhile, McAfee also found 2.7 million new bad URLs each month in the second quarter, with some 10,000 new malicious domains each day. Of the bad-reputation URLs, nearly 95 percent were housing malware for hijacking victim machines.

McAfee's full report is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web