{"id":10804,"date":"2017-12-11T13:10:10","date_gmt":"2017-12-11T21:10:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/11\/news-4576\/"},"modified":"2017-12-11T13:10:10","modified_gmt":"2017-12-11T21:10:10","slug":"news-4576","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/11\/news-4576\/","title":{"rendered":"A week in security (December 04 \u2013 December 10)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Dec 2017 19:58:39 +0000<\/strong><\/p>\n<p>Last week on the blog, we looked at a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/seamless-campaign-caught-using-punycode\/\" target=\"_blank\" rel=\"noopener\">RIG EK malware campaign<\/a>, explored how children are being tangled up in <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/children-and-young-adults-the-next-generation-money-mules\/\" target=\"_blank\" rel=\"noopener\">money mule antics<\/a>, took a walk through the world of\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/12\/blockchain-technology-not-just-for-cryptocurrency\/\" target=\"_blank\" rel=\"noopener\">Blockchain<\/a>, and gave a rundown of what&#8217;s involved when <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/12\/harden-adwcleaner-php-web-backend\/\" target=\"_blank\" rel=\"noopener\">securing web applications<\/a>. We also laid out the trials and tribulations of the <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/\" target=\"_blank\" rel=\"noopener\">Internet of Things<\/a>, advised you to be on the lookout for an urgent <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/use-teamviewer-fix-this-dangerous-permissions-bug-with-an-update\/\" target=\"_blank\" rel=\"noopener\">TeamViewer update<\/a>, tore down the disguise of new Mac malware <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/interesting-disguise-employed-by-new-mac-malware\/\" target=\"_blank\" rel=\"noopener\">HiddenLotus<\/a>, sighed at the inevitability of a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/napoleon-ransomware\/\" target=\"_blank\" rel=\"noopener\">Napoleon-themed piece of ransomware<\/a>, and unveiled our <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/12\/how-we-can-stop-new-mafias-digital-footprint-spreading-2018\/\" target=\"_blank\" rel=\"noopener\">New Mafia report<\/a>.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li>Bitcoin chaos as NiceHash is compromised and thousands of Bitcoins go <a href=\"https:\/\/www.reddit.com\/r\/NiceHash\/comments\/7i0s6o\/official_press_release_statement_by_nicehash\/\" target=\"_blank\" rel=\"noopener\">wandering into the void<\/a>, potentially to the tune of $62m. (source: Reddit)<\/li>\n<li>How easy is it to make a children&#8217;s toy start swearing? <a href=\"https:\/\/www.theregister.co.uk\/2017\/12\/07\/robot_bird_teksa_toucan_hack\/\" target=\"_blank\" rel=\"noopener\">This easy<\/a>. (source: The Register)<\/li>\n<li>Chrome 63 is now available and comes with <a href=\"https:\/\/chromereleases.googleblog.com\/2017\/12\/stable-channel-update-for-desktop.html\" target=\"_blank\" rel=\"noopener\">multiple security improvements and additions<\/a>. (source: Chrome updates website)<\/li>\n<li>Phishers are slowly turning to HTTPs scam sites\u2014but <a href=\"https:\/\/info.phishlabs.com\/blog\/quarter-phishing-attacks-hosted-https-domains\" target=\"_blank\" rel=\"noopener\">why<\/a>? (source: PhishLabs)<\/li>\n<li>The Andromeda Botnet is <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/12\/04\/andromeda-botnet-dismantled\/\" target=\"_blank\" rel=\"noopener\">finally dismantled<\/a> by law enforcement. (source: Help Net Security)<\/li>\n<li>If you try to hack your friends out of jail, you may well end up <a href=\"http:\/\/www.mlive.com\/news\/ann-arbor\/index.ssf\/2017\/08\/hacking_suspect_accused_of_att.html\" target=\"_blank\" rel=\"noopener\">joining them.<\/a> (source: MLive)<\/li>\n<li>Perfect email spoofs? <a href=\"https:\/\/www.wired.com\/story\/mailsploit-lets-hackers-forge-perfect-email-spoofs\/\" target=\"_blank\" rel=\"noopener\">Oh dear.<\/a> (source: Wired)<\/li>\n<li>Think you&#8217;ll be getting a ransom out of North Carolina, <a href=\"http:\/\/www.chicagotribune.com\/bluesky\/technology\/ct-hackers-north-carolina-20171207-story.html\" target=\"_blank\" rel=\"noopener\">think again.<\/a> (source: Chicago Tribune)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/12\/a-week-in-security-december-04-december-10\/\">A week in security (December 04 \u2013 December 10)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/12\/a-week-in-security-december-04-december-10\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Dec 2017 19:58:39 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/12\/a-week-in-security-december-04-december-10\/' title='A week in security (December 04 \u2013 December 10)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/shutterstock_527624266.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of notable security news and blog posts from December 04 to December 10, including Botnets, hacked toys, ransom demands and jailbreaks gone horribly wrong.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hiddenlotus\/\" rel=\"tag\">hiddenlotus<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/new-mafia\/\" rel=\"tag\">New Mafia<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-round-up\/\" rel=\"tag\">weekly round up<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/12\/a-week-in-security-december-04-december-10\/' title='A week in security (December 04 \u2013 December 10)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/12\/a-week-in-security-december-04-december-10\/\">A week in security (December 04 \u2013 December 10)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10528,16908,16874,3765,13053,10497,10498,11383],"class_list":["post-10804","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploit-kits","tag-hiddenlotus","tag-new-mafia","tag-ransomware","tag-roundup","tag-security-world","tag-week-in-security","tag-weekly-round-up"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10804"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10804\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10804"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}