Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/4/2012
05:35 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

McAfee: Close To 100K New Malware Samples Per Day In Q2

Biggest bump in four years in number of new malware samples found by security vendor

Malware writers went on a record-breaking tear in the second quarter of this year, pumping out some 100,000 new samples per day, according to a new report from McAfee.

McAfee says there was a 1.5 million increase in malware since the first quarter of 2012, closing in on a rate of nearly 100,000 unique malware samples per day. "Unique malware samples in our 'zoo' collection number 1.5 million more this quarter than last. At this rate we will almost certainly see 100 million samples by next quarter and possibly the first 10-million-sample quarter," McAfee said in its new report.

The hot new threats emerging in Q2 were drive-by mobile downloads, mobile ransomware, and using Twitter to control mobile botnets. "Attacks that we've traditionally seen in PCs are now making their way to other devices. For example, in Q2 we saw Flashback, which targeted Macintosh devices and techniques such as ransomware and drive-by downloads targeting mobile. This report highlights the need for protection on all devices that may be used to access the Internet," said Vincent Weafer, senior vice president of McAfee Labs, in a statement.

Android malware, by far, accounted for most of the new malware McAfee detected, and it was a combination of SMS-borne malware, mobile botnets, spyware, and Trojans. An unnerving trend is an increase in ransomware attacks, where cybercriminals are holding computers and data hostage in exchange for money or some forms of payment.

Twitter is increasingly being used as a command-and-control infrastructure for mobile botnets, using tweets for commands, up from close to 90,000 new variants in the first quarter to more than 120,000 in the second quarter.

Meanwhile, McAfee also found 2.7 million new bad URLs each month in the second quarter, with some 10,000 new malicious domains each day. Of the bad-reputation URLs, nearly 95 percent were housing malware for hijacking victim machines.

McAfee's full report is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12960
PUBLISHED: 2019-06-25
LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in functions.internal.build.inc.php via the parameter p_dt_s_d.
CVE-2019-12961
PUBLISHED: 2019-06-25
LiveZilla Server before 8.0.1.1 is vulnerable to CSV Injection in the Export Function.
CVE-2019-12962
PUBLISHED: 2019-06-25
LiveZilla Server before 8.0.1.1 is vulnerable to XSS in mobile/index.php via the Accept-Language HTTP header.
CVE-2019-12963
PUBLISHED: 2019-06-25
LiveZilla Server before 8.0.1.1 is vulnerable to XSS in the chat.php Create Ticket Action.
CVE-2019-12964
PUBLISHED: 2019-06-25
LiveZilla Server before 8.0.1.1 is vulnerable to XSS in the ticket.php Subject.