{"id":13845,"date":"2018-11-16T08:00:11","date_gmt":"2018-11-16T16:00:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/11\/16\/news-7612\/"},"modified":"2018-11-16T08:00:11","modified_gmt":"2018-11-16T16:00:11","slug":"news-7612","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/16\/news-7612\/","title":{"rendered":"This Week in Security News: Holiday Cybercriminals &amp; Cryptomining Malware"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Nov 2018 15:21:25 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best practices for defending against cybercriminals during November\u2019s online shopping season<em>. <\/em>Also, see the different cryptomining malware affecting Linux systems and learn what security tools are needed to defend against these threats.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-uses-various-evasion-techniques-including-windows-installer-as-part-of-its-routine\/\">Cryptocurrency Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine<\/a><\/strong><\/p>\n<p><em>The evolving aspect of cryptocurrency mining malware \u2014 constantly adding evasion techniques \u2014 means that powerful security tools are often needed to defend users from these kinds of threats.<\/em><strong><em>\u00a0<\/em><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.cyberscoop.com\/pwn2own-mobile-tokyo-2018\/\">Researchers Earn Thousands for Exposing Mobile Device Exploits at Pwn2Own<\/a><\/strong><\/p>\n<p><em>Security researchers competing in the Pwn2Own Tokyo competition earned a collective $325,000 for demonstrating new exploits on devices made by Samsung, Xiaomi and Apple.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cryptocurrency-mining-malware-targets-linux-systems-uses-rootkit-for-stealth\">Cryptocurrency-mining Malware Targets Linux Systems, Uses Rootkit for Stealth<\/a><\/strong><\/p>\n<p><em>Trend Micro recently encountered a cryptocurrency-mining malware affecting Linux systems. It is notable for hiding the malicious process\u2019 presence from monitoring tools.\u00a0<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/insidecybersecurity.com\/daily-news\/house-passes-final-version-bill-creating-cyber-agency-dhs-sends-measure-president\">House Passes Final Version of Bill Creating Cyber Agency at DHS, Sends Measure to President<\/a><\/strong><\/p>\n<p><em>The U.S. House of Representatives gave unanimous approval to create a stand-alone cybersecurity agency at the Department of Homeland Security, and sent the bill to President Trump for his signature.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/when-cybercriminals-hitch-on-your-holiday-spending-online-shopping-trends-and-threats\">When Cybercriminals Hitch On Your Holiday Spending: Online Shopping Trends and Threats<\/a><\/strong><\/p>\n<p><em>November is expected to see the\u00a0bulk of 2018 online traffic and spending. Learn the common threats and the best practices for defending against cybercriminals during this online shopping season.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.wsj.com\/articles\/russian-hackers-largely-skipped-the-midterms-and-no-one-really-knows-why-1542054493\"><strong>Russian Hackers Largely Skipped the Midterms, and No One Really Knows Why<\/strong><\/a><\/p>\n<p><em>After unleashing cyberattacks on the U.S. during the 2016 presidential election, Russia\u2019s hackers mostly appeared to have sat on the sidelines during the campaign ahead of last week\u2019s midterm elections.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/using-machine-learning-to-cluster-malicious-network-flows-from-gh0st-rat-variants\/\">Using Machine Learning to Cluster Malicious Network Flows From Gh0st RAT Variants<\/a><\/strong><\/p>\n<p><em>To address the growing number of network threats and keep abreast with the changing sophistication of network intrusion methods, Trend Micro looks into\u00a0network flow clustering.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.axios.com\/cybersecurity-paris-call-for-trust-france-21e434df-8a59-48bc-8cde-cd1c1f43dfd0.html\">More than 50 Nations, but not U.S., Sign onto Cybersecurity Pact<\/a><\/strong><\/p>\n<p><em>At the Paris Peace Forum, an international agreement on cybersecurity principles earned signatures from over 50 nations, 130 private sector groups and 90 charitable groups, but not the U.S., Russia or China.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/hide-and-script-inserted-malicious-urls-within-office-documents-embedded-videos\/\">Hide and Script: Inserted Malicious URLs within Office Documents\u2019 Embedded Videos<\/a><\/strong><\/p>\n<p><em>In late October, security researchers showed\u00a0from Cymulate\u00a0showed\u00a0a PoC exploiting a logic bug that could allow hackers to abuse the online video feature in Microsoft Office to deliver malware. <\/em><\/p>\n<p><strong><a href=\"https:\/\/www.cnet.com\/news\/firefox-monitor-warns-if-website-youre-visiting-suffered-data-breach\/\">Firefox Warns if the Website You&#8217;re Visiting Suffered a Data Breach<\/a><\/strong><\/p>\n<p><em>The Firefox Monitor service warns you if your account was among the hundreds of millions affected by data breaches at sites like Yahoo, LinkedIn and Equifax.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/the-importance-of-employee-cybersecurity-training-top-strategies-and-best-practices\/\">The Importance of Employee Cybersecurity Training: Top Strategies and Best Practices<\/a><\/strong><\/p>\n<p><em>With robust employee user training that helps drive home the importance of\u00a0a\u00a0staffer\u2019s role in the overall data protection and cybersecurity landscape, businesses can reduce the risk of a digital attacker.<\/em><\/p>\n<p>As cryptomining malware evolves, do you think more users will be prepared to defend against these threats in 2019? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-holiday-cybercriminals-cryptomining-malware\/\">This Week in Security News: Holiday Cybercriminals &amp; Cryptomining Malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-holiday-cybercriminals-cryptomining-malware\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Nov 2018 15:21:25 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best practices for defending against cybercriminals during November\u2019s online shopping season. Also, see the different cryptomining malware affecting Linux systems and&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-holiday-cybercriminals-cryptomining-malware\/\">This Week in Security News: Holiday Cybercriminals &amp; Cryptomining Malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11052,15080,10422,4500,12310,11448,10416,714,11410],"class_list":["post-13845","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cryptocurrency","tag-cryptomining","tag-current-news","tag-cybersecurity","tag-equifax","tag-linkedin","tag-pwn2own","tag-security","tag-yahoo"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13845"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13845\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13845"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}