Table of Contents Operation High Roller
4
Dynamically hiding the evidence
5
Links to European and Asia-Pacific campaigns
6
Mobile Malware
7
General Malware Threats
9
Ransomware
15
Network Threats
16
Database Security
19
Web Threats
20
Phishing 23 Spam URLs Messaging Threats
25
Spam volume
26
Botnet breakdowns
28
New botnet senders
29
Drug spam a popular subject
32
Cybercrime
33
Demanding ransom
33
Crimeware tools
34
Actions against cybercriminals
35
Hacktivism A touch of cyberwarfare
2
25
36 37
About the Authors
39
About McAfee Labs
39
About McAfee
39
McAfee Threats Report: Third Quarter 2012