McAfee Threats Report: Third Quarter 2012

Page 2

Table of Contents Operation High Roller

4

Dynamically hiding the evidence

5

Links to European and Asia-Pacific campaigns

6

Mobile Malware

7

General Malware Threats

9

Ransomware

15

Network Threats

16

Database Security

19

Web Threats

20

Phishing 23 Spam URLs Messaging Threats

25

Spam volume

26

Botnet breakdowns

28

New botnet senders

29

Drug spam a popular subject

32

Cybercrime

33

Demanding ransom

33

Crimeware tools

34

Actions against cybercriminals

35

Hacktivism A touch of cyberwarfare

2

25

36 37

About the Authors

39

About McAfee Labs

39

About McAfee

39

McAfee Threats Report: Third Quarter 2012


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.