500 new cyber threats emerge every minute

McAfee: Mac malware and healthcare attacks are also on the rise

Eight new cyber threats were discovered every second at the end of 2017, almost twice the rate of the previous quarter, according to new figures.

An average of almost 500 new threats were discovered every minute in Q4 last year, McAfee Labs' quarterly Threats Report revealed yesterday, with huge spikes in cryptocurrency attacks, Mac malware and attacks against healthcare.

"Our research reveals a 211% surge in disclosed security incidents against the healthcare industry last quarter," said Nigel Hawthorn, McAfee's data privacy expert for cloud security.

Advertisement - Article continues below

"Healthcare organisations are a valuable target for cybercriminals who have set aside ethics in favour of profits, as they hold some very valuable personal data. Many incidents were caused by organisational failure to comply with security best practice or address known vulnerabilities in medical software."

Malware designed specifically for macOS devices also saw big growth, with a 24% increase in the number of new Mac malware samples detected over the course of Q4. McAfee saw a total increase in Mac malware of 243% over the course of last year, a figure which tallies with similar reports from Malwarebytes earlier this week.

Another commonly-identified trend highlighted by the report's findings was the shift in cyber crime tactics to target Bitcoin and other cryptocurrencies. The market's massive spike in value has driven an increasing number of criminals to cryptocurrency-based attacks, such as hacks on wallet platforms and malware that uses victims' compute power to mine currencies like Monero and others.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"By going digital along with so many other things in our world, crime has become easier to execute, less risky and more lucrative than ever before," said McAfee CTO Steve Grobman. "It should be no surprise to see criminals focusing on stealthy fileless PowerShell attacks, low risk routes to cash through cryptocurrency mining, and attacks on soft targets such as hospitals."

Advertisement

Recommended

Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020
Visit/security/internet-security/355228/mozilla-fixes-two-firefox-zero-days-being-actively-exploited
internet security

Mozilla fixes two Firefox zero-days being actively exploited

6 Apr 2020

Most Popular

Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft’s patent design reveals a mobile device with a third screen

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020