{"id":17279,"date":"2019-12-23T10:10:05","date_gmt":"2019-12-23T18:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/12\/23\/news-11015\/"},"modified":"2019-12-23T10:10:05","modified_gmt":"2019-12-23T18:10:05","slug":"news-11015","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/23\/news-11015\/","title":{"rendered":"A week in security (December 16 \u2013 22)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 23 Dec 2019 17:40:23 +0000<\/strong><\/p>\n<p> Last week on Malwarebytes Labs, we signalled that <a rel=\"noreferrer noopener\" aria-label=\"Mac threat detections have been on the rise in 2019 (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/mac\/2019\/12\/mac-threat-detections-on-the-rise-in-2019\/\" target=\"_blank\">Mac threat detections have been on the rise in 2019<\/a>, discussed how a <a rel=\"noreferrer noopener\" aria-label=\"new Consumer Online Privacy Rights Act (COPRA) would empower American users (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/12\/new-consumer-online-privacy-rights-act-copra-would-empower-consumers\/\" target=\"_blank\">new Consumer Online Privacy Rights Act (COPRA) would empower American users<\/a>, warned that the <a rel=\"noreferrer noopener\" aria-label=\"Spelevo exploit kit debuts a new social engineering trick (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/\" target=\"_blank\">Spelevo exploit kit debuts a new social engineering trick<\/a>, and let our own Statler and Waldorf take you through <a rel=\"noreferrer noopener\" aria-label=\"a decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/\" target=\"_blank\">a decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s<\/a>.<\/p>\n<h3><strong>Other cybersecurity news<\/strong><\/h3>\n<ul>\n<li>Much aligned with our <a rel=\"noreferrer noopener\" aria-label=\"own findings (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/please-dont-buy-this\/2019\/12\/please-dont-buy-this-smart-doorbells\/\" target=\"_blank\">own findings<\/a> Amazon&#8217;s <a rel=\"noreferrer noopener\" aria-label=\"Ring security (opens in a new tab)\" href=\"https:\/\/www.vice.com\/en_us\/article\/epg4xm\/amazon-ring-camera-security\" target=\"_blank\">Ring security<\/a> was found to be below par, awful even. (Source: Vice.com)<\/li>\n<li>A <a rel=\"noreferrer noopener\" aria-label=\"Canadian clinical laboratory (opens in a new tab)\" href=\"https:\/\/www.techspot.com\/news\/83246-canadian-lab-pays-ransom-retrieve-stolen-data-15.html\" target=\"_blank\">Canadian clinical laboratory<\/a> services provider has suffered a data breach that exposed sensitive information and admitted to paying the hackers to retrieve the stolen data. (Source: TechSpot)<\/li>\n<li>22-year old Londoner Kerem Albayrak was sentenced after attempting to blackmail <a rel=\"noreferrer noopener\" aria-label=\"Apple (opens in a new tab)\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-blackmailed-for-100k-in-itunes-cards-to-avoid-data-leak\/\" target=\"_blank\">Apple<\/a> by threatening to factory reset 319 million iCloud accounts and selling the users&#8217; data. (Source: BleepingComputer)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Hackensack Meridian Health (opens in a new tab)\" href=\"https:\/\/seclists.org\/dataloss\/2019\/q4\/201\" target=\"_blank\">Hackensack Meridian Health<\/a> paid an undisclosed amount in ransom to stop a cyber-attack that has disrupted the hospital owner&#8217;s computer network. (Source: Seclists.org)<\/li>\n<li>If you stopped at a <a rel=\"noreferrer noopener\" aria-label=\"Wawa mini mart (opens in a new tab)\" href=\"https:\/\/www.theverge.com\/2019\/12\/19\/21030661\/wawa-data-breach-gas-convenience-store-credit-debit-card-info-leak\" target=\"_blank\">Wawa mini mart<\/a> recently, your payment card details may have been snatched. (Source: TheVerge)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Contractor (opens in a new tab)\" href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/12\/contractor-admits-planting-logic-bombs-in-his-software-to-ensure-hed-get-new-work\/\" target=\"_blank\">Contractor<\/a> admits planting logic bombs in his software to ensure he would get new work. (Source: ArsTechnica)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Frankfurt (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/frankfurt-shuts-down-it-network-following-emotet-infection\/\" target=\"_blank\">Frankfurt<\/a>, one of the largest financial hubs in the world had to shut down its IT network following an infection with the Emotet malware. (Source: ZDNet)<\/li>\n<li>The <a rel=\"noreferrer noopener\" aria-label=\"Maze ransomware (opens in a new tab)\" href=\"https:\/\/searchsecurity.techtarget.com\/news\/252475664\/Maze-gang-outs-ransomware-victims-in-shame-campaign\" target=\"_blank\">Maze ransomware<\/a> gang started a campaign to pressure victims into paying ransom by publicly listing successful attacks and threatening to leak data. (Source: TechTarget) <\/li>\n<li> Every minute of every day, everywhere on the planet, dozens of companies are logging the <a rel=\"noreferrer noopener\" aria-label=\"movements of millions of people (opens in a new tab)\" href=\"https:\/\/www.nytimes.com\/interactive\/2019\/12\/19\/opinion\/location-tracking-cell-phone.html\" target=\"_blank\">movements of millions of people<\/a> with mobile phones and storing the information in gigantic data files.  (Source: The New York Times)<\/li>\n<li>A United Kingdom national appeared today in federal court on charges related to his role in a computer hacking collective known as <a rel=\"noreferrer noopener\" aria-label=\"The Dark Overlord (opens in a new tab)\" href=\"https:\/\/www.justice.gov\/opa\/pr\/member-dark-overlord-hacking-group-extradited-united-kingdom-face-charges-st-louis\" target=\"_blank\">The Dark Overlord<\/a>. (Source: Department of Justice)\n<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/12\/a-week-in-security-december-16-22\/\">A week in security (December 16 \u2013 22)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/12\/a-week-in-security-december-16-22\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 23 Dec 2019 17:40:23 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/12\/a-week-in-security-december-16-22\/' title='A week in security (December 16 \u2013 22)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of cybersecurity news from December 16 \u2013 22, including rise of Mac threats, COPRA, Spelevo exploit kit, the security fails of the 2010s, and much more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/2010s\/\" rel=\"tag\">2010s<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/copra\/\" rel=\"tag\">COPRA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dark-overlord\/\" rel=\"tag\">Dark Overlord<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/frankfurt\/\" rel=\"tag\">Frankfurt<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hackensack\/\" rel=\"tag\">hackensack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-threats\/\" rel=\"tag\">mac threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/maze\/\" rel=\"tag\">Maze<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ring\/\" rel=\"tag\">Ring<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spelevo\/\" rel=\"tag\">Spelevo<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wawa\/\" rel=\"tag\">wawa<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/12\/a-week-in-security-december-16-22\/' title='A week in security (December 16 \u2013 22)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/12\/a-week-in-security-december-16-22\/\">A week in security (December 16 \u2013 22)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23823,12969,23781,23824,6807,23825,23775,23826,23437,21791,23827],"class_list":["post-17279","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2010s","tag-a-week-in-security","tag-copra","tag-dark-overlord","tag-frankfurt","tag-hackensack","tag-mac-threats","tag-maze","tag-ring","tag-spelevo","tag-wawa"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17279"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17279\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17279"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}