The summer months usher in longer days, more sunshine, and sometimes a decline in creativity – often causing a lack of creative energy. For those of us who find ourselves working through the summer months...
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS's) are listed below.
Endpoint Security, Part 1 of 5: The Risk of Going Unprotected
Making a business case for investments in information security has never been easy. We make these types of investments to protect against...
The W32/Worm-AAEH family (aliases: Beebone, VObfus, Changeup) of Trojans/downloaders/worms has been notorious for consistently morphing itself and switching control servers since June 2009. In June 2013, the AAEH worm made its biggest cosmetic change since 2009 by packaging an entire encrypted binary (containing all the malicious W32/Worm-AAEH code) inside its signature cryptor, which previously held only […]
Porta-Johns, King’s Commode, Royal Throne, Porta-Potties—there are countless names for the portable restroom, but they all share two traits: they’re useful when needed, but they often leave the user feeling unclean. The same principal, sadly, also applies to publicly available computers. Libraries, universities and hotels are all used by a large number of people in […]
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
In the 1999 film, Office Space, an average-Joe employee discovers two of his friends are about to be fired as a cost-saving measure at an incredibly monotonous company. As revenge, the group implants a malicious program into the company’s accounting system in an ill-fated attempt to steal a miniscule amount of money. But, thanks to […]
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying to get their data back. Their systems had been hijacked by ransomware. Ransomware is a type of malware that infects a machine, locks data files or the entire system, and demands payment to free the […]