{"id":17877,"date":"2020-03-17T20:27:09","date_gmt":"2020-03-18T04:27:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11610\/"},"modified":"2020-03-17T20:27:09","modified_gmt":"2020-03-18T04:27:09","slug":"news-11610","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11610\/","title":{"rendered":"This Week in Security News: Operation Overtrap Targets Japanese Online Banking Users and Everything You Need to Know About Tax Scams"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Mar 2020 12:40:26 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"week in security\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the number of ways Operation Overtrap can infect or trap victims with its payload. Also, read about how to protect your personal identity data and money during tax-filing season.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/techcrunch.com\/2020\/03\/11\/aws-launches-bottlerocket-a-linux-based-os-for-container-hosting\/amp\/\"><strong>AWS Launches Bottlerocket, a Linux-based OS for Container Hosting<\/strong><\/a><\/p>\n<p><em>AWS has\u00a0launched\u00a0Bottlerocket, its own open-source operating system for running containers on both virtual machines and bare metal hosts.\u00a0The new OS is a stripped-down Linux distribution that\u2019s akin to projects like CoreOS\u2019s now-defunct\u00a0Container Linux\u00a0and Google\u2019s\u00a0container-optimized OS. The project is launching in cooperation with several partners including Alcide, Armory, CrowdStrike, Datadog, New Relic, Sysdig, Tigera, Trend Micro and Waveworks.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/tax-scams-everything-you-need-to-know-to-keep-your-money-and-data-safe\/\"><strong>Tax Scams \u2013 Everything You Need to Know to Keep Your Money and Data Safe<\/strong><\/a><\/p>\n<p><em>There are two things that cybercriminals are always on the hunt for: personal identity data and money. During the tax-filing season, both can be unwittingly exposed. Over the years, cybercriminals have adapted multiple tools and techniques to part taxpayers with their personal information and funds. This blog looks at the main threats out there and what you can do to stay safe.<\/em><\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2020\/03\/10\/march-2020-patch-tuesday\/\"><strong>March 2020 Patch Tuesday: Microsoft Fixes 115 Vulnerabilities, Adobe None<\/strong><\/a><\/p>\n<p><em>This week for March 2020 Patch Tuesday, Microsoft dropped\u00a0fixes for 115 CVE-numbered flaws: 26 are critical, 88 important, and one of moderate severity. The good news is that none of them are under active attack.<\/em> <em>Adobe seems to have skipped this Patch Tuesday and there\u2019s no indication whether the customary security updates are just delayed or if there won\u2019t be any in the coming days.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/operation-overtrap-targets-japanese-online-banking-users-via-bottle-exploit-kit-and-brand-new-cinobi-banking-trojan\/\"><strong>Operation Overtrap Targets Japanese Online Banking Users<\/strong><strong> Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan<\/strong><\/a><\/p>\n<p><em>Trend Micro recently discovered a new campaign dubbed \u201cOperation Overtrap\u201d for the number of ways it can infect or trap victims with its payload. The campaign targets online users of various Japanese banks by stealing their banking credentials using a three-pronged attack. Based on Trend Micro\u2019s telemetry, Operation Overtrap has been active since April 2019.<\/em><\/p>\n<p><a href=\"https:\/\/www.techrepublic.com\/article\/hackers-are-working-harder-to-make-phishing-and-malware-look-legitimate\/\"><strong>Hackers Are Working Harder to Make Phishing and Malware Look Legitimate<\/strong><\/a><\/p>\n<p><em>Even though the overall volume of malware dropped in 2019, phishing and business email compromise (BEC) went up sharply, according to\u00a0Trend Micro&#8217;s 2019 Cloud App Security Roundup. The company blocked nearly 400,000 attempted BEC attacks in 2018, which is 271% more than the previous year and 35% more credential phishing attempts than in 2018.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/busting-ghostcat-an-analysis-of-the-apache-tomcat-vulnerability-cve-2020-1938-and-cnvd-2020-10487\/\"><strong>Busting Ghostcat: An Analysis of the Apache Tomcat Vulnerability (CVE-2020-1938 and CNVD-2020-10487)<\/strong><\/a><\/p>\n<p><em>Discussions surrounding the Ghostcat vulnerability (CVE-2020-1938\u00a0and\u00a0CNVD-2020-10487) found in Apache Tomcat puts it in the spotlight as researchers investigated its security impact&#8211; specifically, its potential use for remote code execution (RCE). Learn more about the Ghostcat vulnerability in this blog analysis. <\/em><\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/10-key-female-cybersecurity-leaders-to-know-in-2020\/\"><strong>10 Key Female Cybersecurity Leaders to Know in 2020<\/strong><\/a><\/p>\n<p><em>In celebration of Women\u2019s History Month, the editors of Solutions Review\u00a0shared the accomplishments of ten key female cybersecurity leaders in 2020.\u00a0Trend Micro\u2019s CEO Eva Chen made the list based on her numerous accomplishments in the cybersecurity industry. <\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains\"><strong>Coronavirus Used in Spam, Malware, and Malicious Domains<\/strong><\/a><\/p>\n<p><em>The coronavirus disease (COVID-19) is being used as bait in\u00a0email spam\u00a0attacks on targets across the globe. As the number of cases continues to grow, campaigns using the virus as a lure will likewise increase. This has been observed by multiple entities, and researchers from Trend Micro have also seen a significant spike in the detection of the subject in email spam attacks.<\/em><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/android-malware-tweaks-expose-devices-to-browser-app-cookie-theft\/\"><strong>Cookiethief Android Malware Uses Proxies to Hijack Your Facebook Account<\/strong><\/a><\/p>\n<p><em>A combination of new modifications to Android malware code has given rise to Trojans able to steal browser and app cookies from compromised devices.\u00a0Researchers from Kaspersky said the new malware families,\u00a0dubbed Cookiethief, use a combination of exploits to acquire root rights to an Android device and then to steal Facebook cookie data.\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/nemty-ransomware-spreads-via-love-letter-emails\"><strong>Nemty Ransomware Spreads via Love Letter Emails<\/strong><\/a><\/p>\n<p><em>Threat actors have been found distributing Nemty\u00a0ransomware\u00a0through a spam campaign using emails that pose as messages from lovers, according to a report by\u00a0Malwarebytes and X-Force Iris researchers.\u00a0Researchers from Trend Micro have\u00a0also encountered the emails.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/wordpress-gdpr-plugin-vulnerable-to-cross-site-scripting-attack\"><strong>WordPress GDPR Plugin Vulnerable to Cross-Site Scripting Attacks<\/strong><\/a><\/p>\n<p><em>GDPR Cookie Consent, a WordPress plugin, inadvertently exposed websites to\u00a0cross-site scripting (XSS)\u00a0attacks through a vulnerability that affects versions 1.8.2 and below of the plugin. As disclosed in a\u00a0report by NinTechNet, the vulnerability allowed privilege escalation. The plugin had over 700,000 active installations at the time of the exploit.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/analysis-abuse-of-net-features-for-compiling-malicious-programs\"><strong>Analysis: Abuse of .NET Features for Compiling Malicious Programs<\/strong><\/a><\/p>\n<p><em>While the .NET framework is originally intended to help software engineers, cybercriminals have found a way to abuse its features to compile and execute malware on the fly. Recently, Trend Micro discovered several kinds of malware, such as\u00a0LokiBot, utilizing this technique.\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/opensmtpd-vulnerability-cve-2020-8794-can-lead-to-root-privilege-escalation-and-remote-code-execution\/\"><strong>OpenSMTPD Vulnerability (CVE-2020-8794) Can Lead to Root Privilege Escalation and Remote Code Execution<\/strong><\/a><\/p>\n<p><em>A root privilege escalation and remote execution vulnerability (designated as\u00a0CVE-2020-8794) has been discovered in the free and open-source Unix Daemon, OpenSMTPD. The flaw originates from an out-of-bounds read, which attackers can take advantage of to execute arbitrary code on vulnerable systems.<\/em><\/p>\n<p>Are you concerned about the security risks involved with filing your taxes online? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-operation-overtrap-targets-japanese-online-banking-users-and-everything-you-need-to-know-about-tax-scams\/\">This Week in Security News: Operation Overtrap Targets Japanese Online Banking Users and Everything You Need to Know About Tax Scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-operation-overtrap-targets-japanese-online-banking-users-and-everything-you-need-to-know-about-tax-scams\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Mar 2020 12:40:26 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"week in security\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the number of ways Operation Overtrap can infect or trap victims with its payload. Also, read about how to protect your personal identity data and&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-operation-overtrap-targets-japanese-online-banking-users-and-everything-you-need-to-know-about-tax-scams\/\">This Week in Security News: Operation Overtrap Targets Japanese Online Banking Users and Everything You Need to Know About Tax Scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422],"class_list":["post-17877","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17877"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17877\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17877"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}