Menu
Bitcoins used to buy drugs and weapons: McAfee

Bitcoins used to buy drugs and weapons: McAfee

McAfee labs latest threats report finds new and unseen levels of criminal activity

Hackers have created a new family of mobile malware which has contributed to a 30 per cent increase in Android based malware.

The latest McAfee Labs Threats report has found hackers have made new efforts to circumvent digital signature app validation on both PCs and Android based devices.

The third quarter report revealed traditional malware signed with digital signatures grew by 50 per cent to more than 1.5 million samples. Less surprising was the 125 per cent increase in spam.

The third quarter also saw notable events in the use of Bitcoin for illicit activities such as the purchase of drugs, weapons, and other illegal goods on websites such as Silk Road.

The growing presence of Bitcoin-mining malware reinforced the increasing popularity of the currency.

McAffee enterprise solutions architect, Sean Duca, said as digital currencies became further integrated into the global financial system, their safety and stability required initiatives leveraging both the financial system’s monetary controls and oversight and the technical controls and defences our industry provides.

“As these currencies become further integrated into our global financial system, their safety and stability will require initiatives leveraging both the financial system’s monetary controls and oversight and the technical controls and defences our industry provides.”

Use of new digital currencies by cybercriminals to both execute illegal transactions and launder profits is enabling new and previously unseen levels of criminal activity.

These transactions can be executed anonymously, drawing the interest of the cybercriminal community and allowing them to offer illicit goods and services for sale in transactions that would normally be transparent to law enforcement.

McAfee Labs also saw cybercriminals develop Bitcoin-mining malware to infect systems, mine their processing power, and produce Bitcoins for commercial transactions.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags weaponsdrugsbitcoinsAndroidcriminal activitysilk roadmalwareMcAffee enterprise solutions architect Sean Duca

Upcoming

Slideshows

In Pictures: Houston, we have a bug - 9 famous software glitches in space

In Pictures: Houston, we have a bug - 9 famous software glitches in space

There’s never a good time to run into software bugs, but some times are worse than others - like during a mission to space. Spacecraft of all shapes and sizes rely heavily on software to complete their objectives. But those missions can be quickly ended by the simplest of human errors when writing code. The omission of an overbar here or overflow error checking code there can mean the difference between success or failure, not to mention the loss of hundreds of millions of dollars, years of work and, on manned missions, human life. Use the arrows above to read about 9 examples that show that, despite the care with which these systems are built, bugs have occurred in spacecraft software since we started to fling rockets into space - and will, no doubt, continue to crop up.

In Pictures: Houston, we have a bug - 9 famous software glitches in space
IN PICTURES: Windows 10 Sydney launch

IN PICTURES: Windows 10 Sydney launch

Tech lovers and party-goers alike headed down to Mrs Macquarie's Chair to be part of the world-first Windows 10 Launch Party. The night featured a presentation by Microsoft Australia managing director, Pip Marlow, DJs, live demonstrations and digital artistry by Lister.

IN PICTURES: Windows 10 Sydney launch

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments