{"id":8836,"date":"2017-08-21T09:10:26","date_gmt":"2017-08-21T17:10:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/21\/news-2609\/"},"modified":"2017-08-21T09:10:26","modified_gmt":"2017-08-21T17:10:26","slug":"news-2609","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/08\/21\/news-2609\/","title":{"rendered":"A week in security (August 14 \u2013 August 20)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 21 Aug 2017 16:02:37 +0000<\/strong><\/p>\n<p>Last week, we gave some <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/08\/back-school-cybersecurity-tips-parents-kids\/\" target=\"_blank\" rel=\"noopener\">security tips for parents and kids<\/a> aimed at the new school term. We also took a peek at the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/inside-kronos-malware\/\" target=\"_blank\" rel=\"noopener\">inside of the Kronos malware<\/a>, focusing on how it works and protects itself. And, once again, we spotted a return of Locky ransomware with two new flavors at once, <em>diablo6<\/em>\u00a0and <em>Lukitus<\/em>.<\/p>\n<p>Below are notable news stories and security-related happenings from last week:<\/p>\n<h3>Latest updates for\u00a0Consumers<\/h3>\n<ul>\n<li>The US government is seeking to unmask every person who visited an anti-Trump website in what privacy advocates say is an unconstitutional \u201cfishing expedition\u201d for political dissidents. <a href=\"https:\/\/www.theguardian.com\/world\/2017\/aug\/14\/donald-trump-inauguration-protest-website-search-warrant-dreamhost\" target=\"_blank\" rel=\"noopener\">A search warrant was issued to Dreamhost<\/a>, a company hosting a website that was used to coordinate protest against the US president&#8217;s inauguration.<\/li>\n<li><a href=\"https:\/\/betanews.com\/2017\/08\/15\/scottish-parliament-hack-attack\/\" target=\"_blank\" rel=\"noopener\">Hackers hit Scottish Parliament with brute force cyber-attack.<\/a> Staff at the Scottish parliament have been advised to change passwords as a result of the attack, performed by a yet unknown external source.<\/li>\n<li>An <a href=\"https:\/\/www.theregister.co.uk\/2017\/08\/16\/secret_service_shaun_bridges_agent_bitcoin_theft\/\" target=\"_blank\" rel=\"noopener\">ex-Secret Service agent who stole Bitcoins from the Silk Road Dark Web drugs bazaar<\/a> he was supposed to be investigating has admitted stealing even more sacks of the digital currency. Shaun Bridges pleaded guilty on Tuesday to stealing a further 1,600 Bitcoin.<\/li>\n<li>Researchers reported that a family of mobile apps, all &gt;4,000 of them, <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/08\/android-users-bombarded-with-4000-spy-apps-three-land-in-google-play\/\" target=\"_blank\" rel=\"noopener\">may appear benign but are actually capable of spying on users<\/a>. Some of these apps were said to have been present in the Google Play store since February. Researchers named some of these apps, and they are Hulk Messenger, Troy Chat, and Soniac. The aforementioned three are no longer on the Play store.<\/li>\n<\/ul>\n<h3>Latest updates for Businesses<\/h3>\n<ul>\n<li>A follow-up emerged about the Mandiant breach a few weeks ago when hackers announced a <a href=\"https:\/\/www.scmagazine.com\/fireeye-data-allegedly-leaked-after-mandiant-breach\/article\/681711\/\" target=\"_blank\" rel=\"noopener\">second data dump of FireEye documents<\/a>.<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoor-found-in-enterprise-software-used-by-banks-tech-and-energy-companies\/\" target=\"_blank\" rel=\"noopener\">A backdoor was found in enterprise software.<\/a> A software package produced by NetSarang was found to be modified to include an encrypted payload that could be remotely activated by a knowledgeable attacker.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Safe surfing, everyone!<\/p>\n<p><em>The Malwarebytes Labs Team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/a-week-in-security-august-14-august-20\/\">A week in security (August 14 \u2013 August 20)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/a-week-in-security-august-14-august-20\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 21 Aug 2017 16:02:37 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/a-week-in-security-august-14-august-20\/' title='A week in security (August 14 \u2013 August 20)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-702886-calendar-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of security news and blog posts from the 14th of August to the 20th of August. We looked at back to school cybersecurity tips, Kronos malware, and the return of Locky ransomware. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/kronos\/\" rel=\"tag\">kronos<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/kronos-malware\/\" rel=\"tag\">Kronos malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky\/\" rel=\"tag\">Locky<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky-ransomware\/\" rel=\"tag\">Locky ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/recap\/\" rel=\"tag\">recap<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/a-week-in-security-august-14-august-20\/' title='A week in security (August 14 \u2013 August 20)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/a-week-in-security-august-14-august-20\/\">A week in security (August 14 \u2013 August 20)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[13840,13907,10795,10971,3765,10503,10497,10498,10506],"class_list":["post-8836","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-kronos","tag-kronos-malware","tag-locky","tag-locky-ransomware","tag-ransomware","tag-recap","tag-security-world","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8836"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8836\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8836"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}