McAfee

Rise of LNK (Shortcut files) Malware

Threat actors are using email spam and malicious URLs to deliver LNK files to victims. These files instruct legitimate applications like PowerShell, CMD, and MSHTA to download malicious files.

Phishing Campaigns featuring Ursnif Trojan on the Rise | McAfee Blog

The initial attack vector is a phishing email with a Microsoft Word document attachment. Upon opening the document, VBA executes a malicious shellcode. Shellcode downloads the remote payload, Ursnif, and invokes rundll32.exe to execute it.

Crypto Scammers exploit talk on Cryptocurrency

The modified live streams make the original video smaller and put a frame around it advertising malicious sites that it claims will double the amount of cryptocurrency you send them.

Scammers are Exploiting Ukraine Donations

Scammers are exploiting the current events in Ukraine especially after the official Ukrainian Twitter account tweeted Bitcoin and Ethereum wallet addresses for donations.

Hancitor maldoc drops via Windows Clipboard

Hancitor, a malware loader that provides Malware-as-a-Service, has been observed distributing malware such as FickerStealer, Pony, CobaltStrike, Cuba Ransomware, and many more.

Malicious PowerPoint Documents Used to Distribute AgentTesla RAT

McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this campaign, the spam email comes with a PowerPoint file as an attachment.

Android Malware Distributed in Mexico Uses COVID-19 Theme to Steal Financial Credentials

McAfee Mobile Malware Research Team has identified malware targeting Mexico. It poses as a security banking tool or as a bank application designed to report an out-of-service ATM.

Android malware distributed in Mexico uses Covid-19 to steal financial credentials

McAfee Mobile Malware Research Team has identified malware targeting Mexico. It poses as a security banking tool or as a bank application designed to report an out-of-service ATM.

The Rise of Deep Learning for Detection and Classification of Malware

Different types of deep learning algorithms, such as convolutional neural networks (CNN), recurrent neural networks and Feed-Forward networks, have been applied to a variety of use cases in malware analysis.

XLSM Malware with MacroSheets

In the first half of 2021, McAfee saw a surge in XLSM malware delivering different payloads. In XLSM, adversaries make use of Macrosheets to enter their malicious code directly into the cell formulas.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags