{"id":15095,"date":"2019-04-15T07:10:03","date_gmt":"2019-04-15T15:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/15\/news-8844\/"},"modified":"2019-04-15T07:10:03","modified_gmt":"2019-04-15T15:10:03","slug":"news-8844","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/15\/news-8844\/","title":{"rendered":"A week in security (April 8 \u2013 14)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 15 Apr 2019 14:42:29 +0000<\/strong><\/p>\n<p>Last week on Labs, we said hello to <a rel=\"noreferrer noopener\" aria-label=\"Baldr, a new stealer on the market (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/\" target=\"_blank\">Baldr, a new stealer on the market<\/a>, we wondered who is <a rel=\"noreferrer noopener\" aria-label=\"managing the security of medical management apps (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/04\/managing-security-medical-management-apps\/\" target=\"_blank\">managing the security of medical management apps<\/a>, discussed the different <a rel=\"noreferrer noopener\" aria-label=\"perceptions of personal information (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"_blank\">perceptions of personal information<\/a>, and we looked at <a rel=\"noreferrer noopener\" aria-label=\"fake Instagram assistance apps (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/instagram-password-stealing-apps-found-on-google-play\/\" target=\"_blank\">fake Instagram assistance apps<\/a> found on Google Play that are stealing passwords.<\/p>\n<h3>Other cybersecurity news <\/h3>\n<ul>\n<li>German pharmaceuticals giant <a rel=\"noreferrer noopener\" aria-label=\"Bayer (opens in a new tab)\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/04\/chinese_hackers_bayer_but_german_giant_says_it_withstood_attack\/\" target=\"_blank\">Bayer<\/a> says it has been hit by malware, possibly from China, but that none of its intellectual property has been accessed. (Source: The Register)<\/li>\n<li>Canadian police last week raided the residence of a Toronto software developer behind \u201c<a rel=\"noreferrer noopener\" aria-label=\"Orcus RAT (opens in a new tab)\" href=\"https:\/\/krebsonsecurity.com\/2019\/04\/canadian-police-raid-orcus-rat-author\/\" target=\"_blank\">Orcus RAT<\/a>,\u201d a product that has been used in countless malware attacks. (Source: Krebs on Security)<\/li>\n<li>In response to concerns raised by the European Commission, <a rel=\"noreferrer noopener\" aria-label=\"Facebook (opens in a new tab)\" href=\"https:\/\/betanews.com\/2019\/04\/09\/facebook-european-terms-and-conditions\/\" target=\"_blank\">Facebook<\/a> has agreed to update its terms and conditions in the EU to make it clear to users how their personal data is used. (Source: BetaNews)<\/li>\n<li> Three vulnerabilities have been discovered in the Verizon <a rel=\"noreferrer noopener\" aria-label=\"Fios Quantum Gateway (opens in a new tab)\" href=\"https:\/\/threatpost.com\/verizon-quantum-gateway-command-injection-flaw-impacts-millions\/143606\/\" target=\"_blank\">Fios Quantum Gateway<\/a>, a very popular router which, when exploited together, could give an attacker complete control of a victim\u2019s network. (Source: ThreatPost)<\/li>\n<li>New variants of the <a rel=\"noreferrer noopener\" aria-label=\"sextortion scams (opens in a new tab)\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sextortion-scams-now-using-password-protected-evidence-files\/\" target=\"_blank\">sextortion scams<\/a> are now attaching password-protected zip files that contain alleged proof that the sender has a video recording of the recipient. (Source: BleepingComputer)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Chamois (opens in a new tab)\" href=\"https:\/\/duo.com\/decipher\/chamois-the-big-botnet-you-didnt-hear-about\" target=\"_blank\">Chamois<\/a>, the botnet you probably never heard about before, is losing ground again after having controlled some 20 million devices at its peak. (Source: Duo Secuirty)<\/li>\n<li> A global <a rel=\"noreferrer noopener\" aria-label=\"Amazon (opens in a new tab)\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio\" target=\"_blank\">Amazon<\/a> team listens to what we tell Alexa and reviews audio clips in an effort to help the voice-activated assistant respond to commands. (Source: Bloomberg)<\/li>\n<li>An attacker gained access to the servers hosting <a rel=\"noreferrer noopener\" aria-label=\"Matrix.org (opens in a new tab)\" href=\"https:\/\/matrix.org\/blog\/2019\/04\/11\/security-incident\/\" target=\"_blank\">Matrix.org<\/a>. The intruder potentially had access to unencrypted message data, password hashes, and access tokens. (Source: Matrix.org)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"US-Cert (opens in a new tab)\" href=\"https:\/\/www.kb.cert.org\/vuls\/id\/192371\/\" target=\"_blank\">US-Cert<\/a> issued a warning that Multiple Virtual Private Network (VPN) applications store the authentication and\/or session cookies insecurely in memory and\/or log files. (Source: Cert.org)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Fake news peddlers (opens in a new tab)\" href=\"https:\/\/threatpost.com\/sas-2019-fake-news-peddlers-adopt-clever-new-trick-to-fool-facebook-twitter\/143701\/\" target=\"_blank\">Fake news peddlers<\/a> have devised a cunning new way to prevent their posts from getting removed from social media. Instead of linking to fake news, bad actors are now linking to posts promoting older news articles that may no longer be accurate, but won\u2019t be reported as fake since they were once legitimate news. (Source: ThreatPost)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/a-week-in-security-april-8-14\/\">A week in security (April 8 \u2013 14)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/a-week-in-security-april-8-14\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 15 Apr 2019 14:42:29 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/a-week-in-security-april-8-14\/' title='A week in security (April 8 \u2013 14)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of news stories from April 8\u20134, including Baldr, medical management apps, an Android password stealer, and new sextortion scams.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/alexa\/\" rel=\"tag\">alexa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon\/\" rel=\"tag\">amazon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/baldr\/\" rel=\"tag\">Baldr<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/china\/\" rel=\"tag\">china<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-news\/\" rel=\"tag\">fake news<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/instagram\/\" rel=\"tag\">Instagram<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personal-information\/\" rel=\"tag\">personal information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security\/\" rel=\"tag\">security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sextortion-scams\/\" rel=\"tag\">sextortion scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vpn\/\" rel=\"tag\">vpn<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week\/\" rel=\"tag\">week<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/a-week-in-security-april-8-14\/' title='A week in security (April 8 \u2013 14)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/a-week-in-security-april-8-14\/\">A week in security (April 8 \u2013 14)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[7003,5588,21510,402,3589,4724,2143,17588,714,10497,21560,10863,21561,10498],"class_list":["post-15095","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-alexa","tag-amazon","tag-baldr","tag-china","tag-facebook","tag-fake-news","tag-instagram","tag-personal-information","tag-security","tag-security-world","tag-sextortion-scams","tag-vpn","tag-week","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15095"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15095\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15095"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}