Key Findings: McAfee Labs Threat Report September 2018

Key Findings: McAfee Labs Threat Report September 2018

Earlier today, endpoint security solution researcher McAfee Labs released their “McAfee Labs Threat Report Septemeber 2018.” This edition of the quarterly report compiles McAfee Labs’ investigative research on modern digital threats for Q2 2018.

McAfee Labs’ s research indicates Q2 of 2018 saw a growth of ransomware mobile malware, spam botnets, and cryptocurrency mining malware. The latter in particular is experiencing a rise in popularity; hackers are migrating to new attack vectors as they prove increasingly more profitable.

The key findings from the McAfee Labs Threat Report Septemeber 2018 include:

  • Cryptocurrency mining malware experiences an increase of 85% in Q2 2018.
  • 2.5 million new cryptocurrency mining files were added to the malware database.
  • Malware exploiting patchable vulnerabilities rose 151%.
  • Mobile malware accelerated another 27% from last quarter.
  • 52% of network attacks in Q2 were server message block attacks.
  • Gamut composed the majority of spam botnets at 86%.
  • The U.S.A. hosted the most botnet control servers at 36%.
  • New malware has fallen for the second successive quarter. New malware samples have been relatively flat over several quarters.
  • Compounding these issues, McAfee Labs found new vulnerabilities in virtual assistants, blockchain, and IoT devices.

McAfee Labs’ Global Threat Intelligence received an average of 49 billion queries per day throughout Q2 2018. Out of 86 million tested files, 0.1% were determined to be risky in Q2 2018. 365,000 URLs were found to be risky. You can read the full McAfee Labs Threat Report Septemeber 2018 here.   

Other Resources: 

You Need to Hire More Female Cybersecurity Professionals

In Focus: The Desperate Shortage of Women in Cyber Security

Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?

4 Tips For Endpoint Security Solutions (That Everyone Forgets)

Comparing the Top Endpoint Security Vendors — Solutions Review

Answering the Top 4 Enterprise Endpoint Security Questions

What Can We Expect for the Future of Endpoint Security?

Six Endpoint Security Vendors to Watch in 2018

The 25 Best Endpoint Security Platforms and Tools of 2018

Follow me

Ben Canner

Editor, Cybersecurity at Solutions Review
Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner
Follow me

Leave a Reply

Your email address will not be published. Required fields are marked *