Menu
Bitcoins used to buy drugs and weapons: McAfee

Bitcoins used to buy drugs and weapons: McAfee

McAfee labs latest threats report finds new and unseen levels of criminal activity

Hackers have created a new family of mobile malware which has contributed to a 30 per cent increase in Android based malware.

The latest McAfee Labs Threats report has found hackers have made new efforts to circumvent digital signature app validation on both PCs and Android based devices.

The third quarter report revealed traditional malware signed with digital signatures grew by 50 per cent to more than 1.5 million samples. Less surprising was the 125 per cent increase in spam.

The third quarter also saw notable events in the use of Bitcoin for illicit activities such as the purchase of drugs, weapons, and other illegal goods on websites such as Silk Road.

The growing presence of Bitcoin-mining malware reinforced the increasing popularity of the currency.

McAffee enterprise solutions architect, Sean Duca, said as digital currencies became further integrated into the global financial system, their safety and stability required initiatives leveraging both the financial system’s monetary controls and oversight and the technical controls and defences our industry provides.

“As these currencies become further integrated into our global financial system, their safety and stability will require initiatives leveraging both the financial system’s monetary controls and oversight and the technical controls and defences our industry provides.”

Use of new digital currencies by cybercriminals to both execute illegal transactions and launder profits is enabling new and previously unseen levels of criminal activity.

These transactions can be executed anonymously, drawing the interest of the cybercriminal community and allowing them to offer illicit goods and services for sale in transactions that would normally be transparent to law enforcement.

McAfee Labs also saw cybercriminals develop Bitcoin-mining malware to infect systems, mine their processing power, and produce Bitcoins for commercial transactions.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags weaponsdrugsbitcoinsAndroidcriminal activitysilk roadmalwareMcAffee enterprise solutions architect Sean Duca

Upcoming

Slideshows

IN PICTURES: VMworld 2015 Asia-Pacific and Japan party (+ 32 photos)

IN PICTURES: VMworld 2015 Asia-Pacific and Japan party (+ 32 photos)

VMware recently held an Asia-Pacific and Japan party for its partners in San Francisco following two days of keynotes and sessions. Whilst mingling and enjoying drinks and finger food, the partners were joined by VMware management who also took the opportunity to let their hair down to have some fun.

IN PICTURES: VMworld 2015 Asia-Pacific and Japan party (+ 32 photos)
IN PICTURES: VMworld 2015 sponsor and partner showcase (+41 photos)

IN PICTURES: VMworld 2015 sponsor and partner showcase (+41 photos)

VMware's sponsors and partners used the opportunity at VMworld 2015 to showcase some of their technologies. At an exhibition hall, these vendors educated those that popped by their stands on these solutions and addressed some of the issues surrounding mobility, datacentres, and the Cloud. SOme of the big names there included f5, Palo Alto Networks, HP, Intel, Samsung, and Symantec.

IN PICTURES: VMworld 2015 sponsor and partner showcase (+41 photos)
IN PICTURES: VMware's VMworld 2015 day 1 (+13 photos)

IN PICTURES: VMware's VMworld 2015 day 1 (+13 photos)

VMware has kicked off VMworld 2015 in San Francisco and the first day saw keynotes from its president and CEO, Carl Eschenbach; executive vice-president and general manager, Bill Fathers; and executive vice-president and general manager of SDDC, Raghu Raghuram; amongst others. VMware also made Cloud-related announcements and demonstrated its latest technology.

IN PICTURES: VMware's VMworld 2015 day 1 (+13 photos)

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments