Sun, Jun 24 2018, 11:01 am

Brand McAfee makes come-back, brings threats report

By Digital Edge Bureau, 12.04.2017, 00:27
 
Mirai_DDoS_1

Mirai botnets are believed to be the staging grounds for launching DDoS attack on Dyn, a major DNS service provider: McAfee Inc

Intel Security, which disowned the brand McAfee sometimes ago, has shown amazing altruism towards it. In a latest development, Intel Security has resurrected the brand McAfee. Now, Intel Security is known as McAfee. This rechristening of the brand is marked by a ‘near simultaneous’ release of the ‘McAfee Labs Threats Report’ for the Q4 2016.
The report enumerates several threats—including malware, ransomware, mobile malware and other threats—and their intensity and severity which struck during this quarter. One of the key elements of this report is the 0perneciosu character of Mirai botnets, which are believed to be the staging grounds for launching DDoS attack on Dyn, a major DNS service provider. Mirai is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets. To the surprise of the cyber world, the Mirai botnet-based DDoS attacks are available as a service in the cybercriminal marketplace for $50 to $7,500 per day. McAfee Labs estimates that 2.5 million Internet of Things (IoT) devices were infected by Mirai by the end of Q4 2016, with about five IoT device IP addresses added to Mirai botnets each minute at that time.
“The security industry faces critical challenges in our efforts to share threat intelligence between entities, among vendor solutions, and even within vendor portfolios,” says Vincent Weafer, Vice President of McAfee Labs. “Working together is power. Addressing these challenges will determine the effectiveness of cybersecurity teams to automate detection and orchestrate responses, and ultimately tip the cybersecurity balance in favor of defenders”, adds Weafer.
The report reviews the background and drivers of threat intelligence sharing; various threat intelligence components, sources, and sharing models; how mature security operations can use shared data; and critical sharing challenges that the industry must overcome. Those challenges include:

  • Volume. A massive signal-to-noise problem continues to plague defenders trying to triage, process, and act on the highest-priority security incidents.
  • Validation. Attackers may file false threat reports to mislead or overwhelm threat intelligence systems, and data from legitimate sources can be tampered with if poorly handled.
  • Quality. If vendors focus just on gathering and sharing more threat data, there is a risk that much of it will be duplicative, wasting valuable time and effort. Sensors must capture richer data to help identify key structural elements of persistent attacks.
  • Speed. Intelligence received too late to prevent an attack is still valuable, but only for the cleanup process. Security sensors and systems must share threat intelligence in near real time to match attack speeds.
  • Correlation. The failure to identify relevant patterns and key data points in threat data makes it impossible to turn data into intelligence and then into knowledge that can inform and direct security operations teams.

To move threat intelligence sharing to the next level of efficiency and effectiveness, McAfee Labs suggests focusing on three areas:

  • Triage and prioritization. Simplify event triage and provide a better environment for security practitioners to investigate high-priority threats.
  • Connecting the dots. Establish relationships between indicators of compromise so that threat hunters can understand their connections to attack campaigns.
  • Better sharing models. Improve ways to share threat intelligence between our own products and with other vendors.

    Threat Activitites:
    In the fourth quarter of 2016, McAfee Labs’ Global Threat Intelligence network registered notable trends in cyber-threat growth and cyber-attack incidents across industries:
  • Malware growth. The number of new malware samples slowed 17% in Q4, while the overall count grew 24% in 2016 to 638 million samples.
  • Mobile malware. The number of new mobile malware samples declined 17% in Q4, while total mobile malware grew 99% in 2016.
  • Ransomware growth. The number of new ransomware samples dropped 71% in Q4, mostly due to a drop in generic ransomware detections, as well as a decrease in the activity of the Locky and CryptoWall strains. The number of total ransomware samples grew 88% in 2016
  • Mac OS malware. Although still small compared to Windows threats, the number of new Mac OS malware samples grew 245% in Q4 due to adware bundling. Total Mac OS malware grew 744% in 2016.
  • Spam botnets. Spam email messages from the top 10 botnets dropped 24% in Q4 to 181 million emails. They generated 934 million spam messages in 2016 overall.
  • Reported security incidents. McAfee counted 197 publicly-disclosed security incidents in Q4 and 974 publicly-disclosed security incidents in 2016. Security incidents are events that compromise the integrity, confidentiality, or availability of information assets. Some, but not all, of these incidents are breaches. Breaches are incidents that result in the confirmed disclosure (not just potential exposure) of data.
  • Public sector cyber-attacks. The public sector experienced the greatest number of incidents by far, but McAfee believes this may be the result of stricter requirements for reporting incidents, as well as an increase in attacks related to the U.S. election process, mostly voter database incidents and defacing of election websites.
  • Banking and gaming attacks. A Q3 jump in incidents in the software development sector was due to the rise in attacks on gaming platforms. In the finance sector, the SWIFT attacks on the banking sector led to aQ2 jump in incidents.

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:


5 × three =

Other articlesgo to homepage

Conforming seamlessly to EU’s GDPR compliance norms

Conforming seamlessly to EU’s GDPR compliance norms(0)

The General Data Protection Regulation (GDPR), adopted in April 2016 after four years of deliberations, is now in force. The regulation made headlines around the globe with its stricter data protection standards, substantial fines, and most of all, extensive reach. The GDPR affects any organization that holds an EU (European Union) citizen’s personal data, no

Sophos makes strong use of AI in combating ransomware

Sophos makes strong use of AI in combating ransomware(0)

In its endpoint security software avatar—away from its quintessential hallmark of being the leading vendor of network security systems—Sophos has come out to the market with specialized product that is believed to be combating scourge of ransomware and other advanced malware attacks quite effectively. At a press conference organized in New Delhi, Sophos has pitched

ComGuard to pitch in GFI’s acquired Kerio Technologies

ComGuard to pitch in GFI’s acquired Kerio Technologies(0)

In 2017, GFI Software acquired two companies Exinda and Kerio Technologies. While, Exinda is a big name in the field of WAN Optimization & Orchestration—competing with likes of Riverbed and Silver Peak—Kerio Technologies has been known for providing network security appliances (UTMs), IP-PBX, as well as unified communication & collaboration (UC&C) systems (including cloud based

eScan intros TSPM technology to combat RDP cyber attacks

eScan intros TSPM technology to combat RDP cyber attacks(0)

With each passing day, the cyber attacks turn complex and enterprises find it challenging to combat against the assaults. Now, a slew of reports suggest that RDP (remote desktop protocol) servers come under ransomware attacks which can jeopardize the very operations of firms and organizations. To facilitate centralized management of computers, organizations implement RDP and

Kaspersky throws competition to hack virtual oil refinery

Kaspersky throws competition to hack virtual oil refinery(0)

As industrial control systems (ICS), which run today’s new-age enterprises and critical infrastructure, come under increasing attacks from cyber criminals and rogue nation states, Russia’s Kaspersky Lab takes proactive measure by engaging ethical hackers and global cyber warriors for defending sensitive installations spread across the globe, including oil refineries, by staging a competition—international industrial CTF

read more
banner

Contacts and information

New Delhi (India)

Social networks

Most popular categories