{"id":8227,"date":"2017-07-03T12:10:06","date_gmt":"2017-07-03T20:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/03\/news-2002\/"},"modified":"2017-07-03T12:10:06","modified_gmt":"2017-07-03T20:10:06","slug":"news-2002","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/03\/news-2002\/","title":{"rendered":"A week in security (June 26 \u2013 July 02)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 03 Jul 2017 19:24:13 +0000<\/strong><\/p>\n<p>Last week, we offered our readers <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener noreferrer\">tips on how to detect phishing attempts<\/a>, gave <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/the-smart-alert-strong-kind-brave-way-to-internet-awesome\/\" target=\"_blank\" rel=\"noopener noreferrer\">an overview of Google&#8217;s Be Internet Awesome campaign<\/a>, supplemented <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\" target=\"_blank\" rel=\"noopener noreferrer\">an ongoing series on adware<\/a>, and introduced <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/product-updates\/2017\/06\/solution-corner-malwarebytes-endpoint-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Malwarebytes Endpoint Protection<\/a> to those who aren&#8217;t already in the know.<\/p>\n<p>We also pushed out a number of blog posts revolving around the latest ransomware outbreak that hit the EU: EternalPetya. You can read more about it in these posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/petya-esque-ransomware-is-spreading-across-the-world\/\">Petya-esque ransomware is spreading across the world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/eternalpetya-lost-salsa20-key\/\">EternalPetya and the lost Salsa20 key<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/eternalpetya-yet-another-stolen-piece-package\/\">EternalPetya \u2013 yet another stolen piece in the package?<\/a><\/li>\n<\/ul>\n<blockquote data-secret=\"2Nt7ngOhwR\" class=\"wp-embedded-content\">\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/mobile-menace-monday-fake-wannacry-scanner\/\">Mobile Menace Monday: Fake WannaCry Scanner<\/a><\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/mobile-menace-monday-fake-wannacry-scanner\/embed\/#?secret=2Nt7ngOhwR\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>Below are notable news stories and security-related happenings from last week:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2017\/06\/27\/cybersecurity-battleground-shifting-linux\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Battleground Shifting To Linux And Web Servers.<\/a> &#8220;Despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017. This attack pattern demonstrates the urgent need for heightened security measures to protect Linux servers and Linux-dependent IoT devices, according to WatchGuard Technologies.&#8221; <em>(Source: Help Net Security)<\/em><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/jun\/25\/uk-electricity-grid-cyber-attack-risk-energy-industry\" target=\"_blank\" rel=\"noopener noreferrer\">UK Energy Industry Cyber-attack Fears Are &#8216;Off The Scale&#8217;.<\/a> &#8220;He said the danger posed to energy systems was coming to the fore now because of the trend away from well-protected, centralised large power stations and towards decentralised power, such as lots of small, flexible gas power plants and solar panels on homes.&#8221; <em>(Source: The Guardian)<\/em><\/li>\n<li><a href=\"https:\/\/www.cnet.com\/news\/what-it-will-take-for-cybersecurity-to-become-common-sense\/\" target=\"_blank\" rel=\"noopener noreferrer\">What It Will Take For Cybersecurity To Become Common Sense.<\/a> &#8220;In March, the Pew Research Center surveyed more than 1,000 American adults on what they knew about cybersecurity. The survey asked what&#8217;s two-factor authentication, what is a virtual private network and how secure is public Wi-Fi. On average, people only answered five out of the 13 questions correctly. Only 1 percent of respondents got every question right.&#8221; <em>(Source: CNET)<\/em><\/li>\n<li><a href=\"https:\/\/securityintelligence.com\/news\/fireball-malware-ticking-time-bomb-or-all-hot-air\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fireball Malware: Ticking Time Bomb Or All Hot Air?<\/a> &#8220;Both Check Point and Microsoft agreed that the malware originated from a Chinese digital marketing agency called Rafotech, which uses the code to infect machines, hijack browsers and steal personal information. The company\u2019s fake search engines rank among the world\u2019s top 10,000 websites and occasionally break the top 1,000. It claims to have around 300 million users worldwide, which is suspiciously close to the 250 million infections reported by Check Point.&#8221; <em>(Source: Security Intelligence)<\/em><\/li>\n<li><a href=\"https:\/\/www.bna.com\/hollywood-risk-without-b73014460797\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hollywood At Risk Without Better Encryption.<\/a> &#8220;The summer blockbuster season has begun with movies such as Sony Pictures Entertainment Inc.\u2019s Spider-Man: Homecoming set to launch. Summer is no longer re-run land for television with shows such as Home Box Office Inc.\u2019s Game of Thrones beginning its next season soon. However, if the movie and television industries aren\u2019t careful about their data security, hackers and other cybercriminals might pirate these prizes or try to hold them hostage.&#8221; <em>(Source: Bloomberg)<\/em><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/06\/26\/how-snapchat-shares-your-and-your-kids-location\/\" target=\"_blank\" rel=\"noopener noreferrer\">How Snapchat Shares Your (And Your Kids&#8217;) Location.<\/a> &#8220;Snap Map shows that, security- and privacy-wise, Snapchat\u2019s come a long way since its early days, with its infamous &#8216;disappearing&#8217; photos and video messages that never actually went away at all, either on your phone or on its own servers.&#8221; <em>(Source: Sophos&#8217;s Naked Security Blog)<\/em><\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2017\/06\/28\/criminalization-dns-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Criminalization Of DNS For Phishing Continues To Advance.<\/a> &#8220;Cybercriminals have been shifting their tactics markedly, by registering more and more domain names, rather using web servers and domains they have hacked into. These &#8216;malicious domain registrations&#8217; accounted for half of all the domain names used for phishing in 2016, according to APWG.&#8221; <em>(Source: Help Net Security)<\/em><\/li>\n<\/ul>\n<p>Safe surfing, everyone!<\/p>\n<p><em>The Malwarebytes Labs Team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/week-security-june-26-july-02\/\">A week in security (June 26 \u2013 July 02)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/week-security-june-26-july-02\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 03 Jul 2017 19:24:13 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/week-security-june-26-july-02\/' title='A week in security (June 26 \u2013 July 02)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-702886-calendar-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of security news and blog posts from the 26th of June to the 2nd of July. We delved deep into EternalPetya, the latest ransomware to make headlines last week. We also outed a fake WannaCry scanner and touched on other topics like adware, an educational campaign, and phishing.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/eternalpetya\/\" rel=\"tag\">EternalPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/recap\/\" rel=\"tag\">recap<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/week-security-june-26-july-02\/' title='A week in security (June 26 \u2013 July 02)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/week-security-june-26-july-02\/\">A week in security (June 26 \u2013 July 02)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12849,3765,10503,10497,10498,10506],"class_list":["post-8227","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-eternalpetya","tag-ransomware","tag-recap","tag-security-world","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8227"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8227\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8227"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}