McAfee Labs Threats Report December 2018

  • McAfee发布2018年12月威胁报告,重点介绍了2018年第三季度由McAfee高级威胁研究团队和McAfee实验室团队收集的调查研究成果、威胁统计数据和趋势观察。
  • 报告采用新格式,整合更多威胁情报数据,并与MITRE合作扩展MITRE ATT&CK™知识库技术,以提供更深入的威胁态势洞察。
  • 尽管地下市场的取缔行动在第三季度仍有影响,但新的地下市场迅速填补空缺,网络犯罪服务效率提升,尤其是GandCrab勒索软件通过联盟计划、敏捷开发及与其他犯罪服务结合发动大规模攻击。
  • 第三季度还举办了多场重要安全会议,McAfee团队在DEF CON和Black Hat USA等活动中分享了医疗设备攻击和朝鲜恶意软件代码重用的研究成果。
  • McAfee在拉斯维加斯、悉尼、东京和罗马的MPOWER会议上与客户及合作伙伴分享了最新研究,持续发布威胁分析成果并扩充研究团队。
总结

IntroductionWelcome to the McAfee® Labs Threats Report, December 2018. In this edition, we highlight the notable investigative research and trends in threats statistics and observations gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q3 of 2018.

We are very excited to present to you new insights and a new format in this report. We are dedicated to listening to our customers to determine what you find important and how we can add value. In recent months we have gathered more threat intelligence, correlating and analyzing data to provide more useful insights into what is happening in the evolving threat landscape. McAfee is collaborating closely with MITRE Corporation in extending the techniques of its MITRE ATT&CK™ knowledge base, and we now include the model in our report. We have just started to refine our process and reports. You can expect more from us, and we welcome your feedback.

Although the aftermath of takedowns of underground markets were still apparent in Q3, many other underground markets have eagerly filled the gaps. With the services on offer, the effectiveness of cybercriminals is increasing. During this quarter we also noticed greater activity from the GandCrab ransomware family. Using an affiliate program, demonstrating agile development, and mixing with other cybercrime services such as exploit kits have resulted in a big wave of attacks from this family.

The third quarter was also highlighted by major security conferences. Representatives of the McAfee Advanced Threat Research team shared insights from their research at several of these events. At DEF CON we demonstrated how an attacker could manipulate medical devices. During Black Hat USA, the team released research into code reuse by North Korean malware families that revealed previously undiscovered links.

We also welcomed many customers and partners as we shared our latest research at the McAfee MPOWER conferences in Las Vegas, Sydney, Tokyo, and Rome. During this quarter, we have stayed busy analyzing threats, welcoming new researchers to the team, and especially publishing our findings. You can read our results on our blogs page and our team’s page.We hope you enjoy the new format and we look forward to your reactions.

分享至:

作者:PANews

本文为PANews入驻专栏作者的观点,不代表PANews立场,不承担法律责任。

文章及观点也不构成投资意见

图片来源:PANews如有侵权,请联系作者删除。

关注PANews官方账号,一起穿越牛熊
推荐阅读
34分钟前
2小时前
3小时前
4小时前
4小时前
4小时前
相关专题
138篇文章

热门文章

行业要闻
市场热点
精选读物

精选专题

App内阅读