{"id":16896,"date":"2019-11-15T07:00:01","date_gmt":"2019-11-15T15:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/15\/news-10634\/"},"modified":"2019-11-15T07:00:01","modified_gmt":"2019-11-15T15:00:01","slug":"news-10634","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/15\/news-10634\/","title":{"rendered":"This Week in Security News: APT33 Botnets Used for Extreme Narrow Targeting and Microsoft\u2019s Patch Tuesday Arrives with A Patch for An IE Zero-Day"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Nov 2019 14:05:44 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the APT33 threat group that is using live C&amp;C servers for extremely narrow targeting. Also, read about Trend Micro\u2019s complete smart factory solutions and November Patch Tuesday updates.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2019\/11\/13\/trend-micro-smart-factory-security-solutions\/\"><strong>Trend Micro Enhances Protection for Industrial Orgs<\/strong><\/a><\/p>\n<p><em>This week, Trend Micro announced its complete smart factory solutions, designed to provide enhanced visibility and protection for embattled industrial control system (ICS) environments. The solutions will secure across all layers of Industry 4.0, mitigating this growing area of cyber risk to keep operations running.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/faster-and-more-accurate-malware-detection-through-predictive-machine-learning-correlating-static-and-behavioral-features\"><strong>Faster and More Accurate Malware Detection Through Predictive Machine Learning<\/strong><\/a><\/p>\n<p><em>Machine learning gives traditional cybersecurity solutions the edge it needs to catch destructive threats such as ransomware before it gets deployed in a system, which saves organizations\u2019 time, money, and reputations. <\/em><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/microsofts-november-2019-patch-tuesday-arrives-with-a-patch-for-an-ie-zero-day\/\"><strong>Microsoft&#8217;s November 2019 Patch Tuesday Arrives with a Patch for an IE Zero-Day<\/strong><\/a><\/p>\n<p><em>Microsoft has released the November 2019 Patch Tuesday security updates. This month&#8217;s updates include a patch for a vulnerability in the Internet Explorer scripting engine that hackers have been seen exploiting in the wild.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/amazon-patches-ring-video-doorbell-pro-vulnerability-that-threatens-network-security\"><strong>Amazon Patches Ring Video Doorbell Pro Vulnerability that Threatens Network Security<\/strong><\/a><\/p>\n<p><em>Researchers at Bitdefender discovered a vulnerability in Amazon\u2019s Ring Video Doorbell Pro that, if exploited, could allow a threat actor to get network or Wi-Fi credentials. Amazon fixed the issue back in September, but the vulnerability was only recently disclosed.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/asp-net-service-provider-smartasp-net-targeted-by-ransomware-attack\"><strong>ASP.NET Service Provider SmartASP.net Targeted by Ransomware Attack<\/strong><\/a><\/p>\n<p><em>Less than a week after\u00a0ransomware attacks disrupted operations of various Spanish companies and government services in the Canadian territory of Nunavut, another company has disclosed that that they were hit by an attack, this time involving the encryption of the customer data of SmarterASP.net, a popular hosting service provider for the web application framework ASP.NET.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/bluekeep-exploit-gets-an-update-following-recent-attacks\"><strong>BlueKeep Exploit Will Get an Update Following Recent Attacks<\/strong><\/a><\/p>\n<p><em>Reports from security researchers have shed light on the recent BlueKeep attacks that installed cryptocurrency miners on compromised devices. In November, Kevin Beaumont noticed that his honeypots kept crashing and later determined that the cause was the BlueKeep exploit module. These blue screen of death (BSOD) crashes in the honeypots were the issues that helped Beaumont discover the real-world attacks.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/youtube-videos-promise-private-key-generator-for-bitcoin-addresses-lead-users-to-info-stealing-trojan-instead\"><strong>YouTube Videos Promise Private Key Generator for Bitcoin Addresses, Lead Users to Info-Stealing Trojan Instead<\/strong><\/a><\/p>\n<p><em>YouTube videos were being used in a scam to deliver an information-stealing Trojan called Predator the Thief (detected by Trend Micro as TrojanSpy.MSIL.PREDATOR.AA). Discovered by security researcher Frost, the threat actors use the videos to promote a tool that can generate a bitcoin address\u2019 private key.<\/em><\/p>\n<p><a href=\"https:\/\/techcrunch.com\/2019\/11\/12\/5g-flaws-locations-spoof-alerts\/\"><strong>New 5G Flaws Can Track Phone Locations and Spoof Emergency Alerts<\/strong><\/a><\/p>\n<p><em>Security researchers at Purdue University and the University of Iowa have found nearly a dozen 5G vulnerabilities, which they say can be used to track a victim\u2019s real-time location, spoof emergency alerts that can trigger panic or silently disconnect a 5G-connected phone from the network altogether.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/ddos-attacks-that-employ-tcp-amplification-cause-network-congestion-secondary-outages\"><strong>DDoS Attacks That Employ TCP Amplification Cause Network Congestion, Secondary Outages<\/strong><\/a><\/p>\n<p><em>Over the past month, threat actors have been using a relatively non-conventional approach to mount a flurry of distributed denial-of-service (DDoS) attacks through Transmission Control Protocol (TCP) amplification.<\/em><\/p>\n<p><a href=\"https:\/\/threatpost.com\/apt33-mounts-targeted-botnet-attacks-us\/150248\/\"><strong>APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims<\/strong><\/a><\/p>\n<p><em>The Iran-linked, espionage-focused advanced threat group known as APT33 has been spotted using more than a dozen obfuscated botnets to carry out narrowly targeted attacks against government and academic targets. As of last month, researchers counted 10 live bot C2s in active operation.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/there-is-a-skills-shortage-but-it-isnt-your-real-problem\/\"><strong>There Is a Skills Shortage, but It Isn\u2019t Your Real Problem<\/strong><\/a><\/p>\n<p><em>Without automated event correlation and analysis, the skills problem ceases to be a crisis.\u00a0Bill Malik, vice president of infrastructure strategies at Trend Micro, discusses how organizations can use\u00a0automation, a managed detection and response tool (like MRDR) and a cross-platform discovery and response tool (like XDR) to help alleviate the information security skills gap.<\/em><\/p>\n<p>Is your company taking steps and using solutions to alleviate the information security skills shortage? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-apt33-botnets-used-for-extreme-narrow-targeting-and-microsofts-patch-tuesday-arrives-with-a-patch-for-an-ie-zero-day\/\">This Week in Security News: APT33 Botnets Used for Extreme Narrow Targeting and Microsoft\u2019s Patch Tuesday Arrives with A Patch for An IE Zero-Day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-apt33-botnets-used-for-extreme-narrow-targeting-and-microsofts-patch-tuesday-arrives-with-a-patch-for-an-ie-zero-day\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Nov 2019 14:05:44 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the APT33 threat group that is using live C&#38;C servers for extremely narrow targeting. Also, read about Trend Micro\u2019s complete smart factory solutions and November&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-apt33-botnets-used-for-extreme-narrow-targeting-and-microsofts-patch-tuesday-arrives-with-a-patch-for-an-ie-zero-day\/\">This Week in Security News: APT33 Botnets Used for Extreme Narrow Targeting and Microsoft\u2019s Patch Tuesday Arrives with A Patch for An IE Zero-Day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,714],"class_list":["post-16896","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16896"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16896\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16896"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}