{"id":11655,"date":"2018-03-05T10:10:09","date_gmt":"2018-03-05T18:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/05\/news-5426\/"},"modified":"2018-03-05T10:10:09","modified_gmt":"2018-03-05T18:10:09","slug":"news-5426","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/05\/news-5426\/","title":{"rendered":"Week in security (February 26 \u2013 March 4)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 05 Mar 2018 17:00:00 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we explained <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/how-to-protect-your-computer-from-malicious-cryptomining\/\" target=\"_blank\" rel=\"noopener\">how to protect your computer from malicious cryptomining<\/a>, we gave an <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/02\/encryption-101-shione-ransomware-case-study\/\" target=\"_blank\" rel=\"noopener\">encryption 101<\/a>\u00a0lesson using ShiOne ransomware as a case study, and we offered an explanation about <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/03\/explained-sql-injection\/\" target=\"_blank\" rel=\"noopener\">SQL injection.<\/a>\u00a0We also released a report on\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/state-malicious-cryptomining\/\" target=\"_blank\" rel=\"noopener\">the state of malicious cryptomining<\/a>\u00a0from its first resurgence in the fall until now.<\/p>\n<p>In active malware, we discussed <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/02\/new-rig-malvertising-campaign-uses-cryptocurrency-theme-decoy\/\" target=\"_blank\" rel=\"noopener\">how the RIG malvertising campaign uses cryptocurrency themes as a decoy<\/a>, how an old virus made its way onto a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/blast-from-the-past-stowaway-virut-delivered-with-chinese-ddos-bot\/\" target=\"_blank\" rel=\"noopener\">Chinese DDoS bot<\/a>, and how a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/massive-ddos-attack-washes-over-github\/\" target=\"_blank\" rel=\"noopener\">massive DDoS attack washed over GitHub<\/a>.<\/p>\n<p>We also drew your attention to our own <a href=\"https:\/\/twitter.com\/paperghost\">Chris Boyd<\/a> appearing in <a href=\"http:\/\/jennyradcliffe.com\/the-deception-chronicles\/\" target=\"_blank\" rel=\"noopener\">Jenny Radcliffe\u2019s Human Factor Podcast<\/a>.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li>Does your endpoint solution <a href=\"https:\/\/www.bricata.com\/blog\/fileless-attacks-security\/\" target=\"_blank\" rel=\"noopener\">stop fileless attacks<\/a>? They are gaining traction, says a Ponemon Institute study. (Source: Bricata)<\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2018\/2\/26\/17046608\/feedless-app-content-blocker-instagram-facebook-newsfeed\" target=\"_blank\" rel=\"noopener\">Feedless<\/a> is an iOS content blocker that takes the media out of social media. (Source: The Verge)<\/li>\n<li>A serious remote code execution vulnerability in both the &#8216;<a href=\"https:\/\/thehackernews.com\/2018\/02\/torrent-download-software.html\" target=\"_blank\" rel=\"noopener\">\u03bcTorrent<\/a> desktop app for Windows and the newly launched &#8216;\u03bcTorrent Web&#8217; was reported. (Source: The Hacker News)<\/li>\n<li>But apparently, the Torrent vulnerabilities have already been <a href=\"https:\/\/engineering.bittorrent.com\/2018\/02\/22\/httprpc-security-vulnerabilities-resolved-in-utorrent-bittorrent-and-utorrent-web\/\" target=\"_blank\" rel=\"noopener\">fixed<\/a>. (Source: The BitTorrent Engineering Blog)<\/li>\n<li>An <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/02\/ad-network-uses-advanced-malware-technique-to-conceal-cpu-draining-mining-ads\/\" target=\"_blank\" rel=\"noopener\">ad network<\/a> used an advanced malware technique to conceal CPU-draining mining ads. (Source: Ars Technica)<\/li>\n<li><a href=\"https:\/\/www.reuters.com\/article\/us-usa-court-microsoft\/u-s-supreme-court-wrestles-with-microsoft-data-privacy-fight-idUSKCN1GB0GY\" target=\"_blank\" rel=\"noopener\">US Supreme Court<\/a> wrestles with Microsoft data privacy fight. (Source: Reuters)<\/li>\n<li><a href=\"http:\/\/www.newsweek.com\/loapi-cryptocurrency-mining-malware-so-powerful-it-can-melt-your-phone-752517\" target=\"_blank\" rel=\"noopener\">Loapi<\/a> cryptocurrency mining malware is so powerful it can melt your phone. (Source: Newsweek)<\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/world\/2018\/mar\/01\/german-government-intranet-under-ongoing-attack\" target=\"_blank\" rel=\"noopener\">German government<\/a>\u00a0Intranet under ongoing attack. (Source: TheGuardian)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trustico-states-they-stored-private-keys-for-customers-ssl-certificates\/\" target=\"_blank\" rel=\"noopener\">Trustico<\/a> states they stored private keys for customers&#8217; SSL certificates. (Source: Bleeping Computer)<\/li>\n<li><a href=\"https:\/\/blog.morphisec.com\/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign\" target=\"_blank\" rel=\"noopener\">Flash exploit CVE-2018-4878<\/a>\u00a0was spotted in the wild as part of massive malspam campaign. (Source: Morphisec)<\/li>\n<li><a href=\"http:\/\/philadelphia.cbslocal.com\/2018\/03\/01\/equifax-hackers-stole-more\/\" target=\"_blank\" rel=\"noopener\">Equifax<\/a> says hackers stole more than previously reported. (Source: CBS Philly)<\/li>\n<li>Virus downs hundreds of <a href=\"https:\/\/www.ctvnews.ca\/business\/virus-downs-hundreds-of-tim-hortons-cash-registers-furious-owners-threaten-lawsuit-1.3821172\" target=\"_blank\" rel=\"noopener\">Tim Hortons<\/a> cash registers; furious owners threaten lawsuit. (Source: CTV News)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sgxspectre-attack-can-extract-data-from-intel-sgx-enclaves\/\" target=\"_blank\" rel=\"noopener\">SgxSpectre<\/a> attack can extract data from Intel SGX enclaves. (Source: Bleeping Computer)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/03\/week-in-security-february-26-march-4\/\">Week in security (February 26 \u2013 March 4)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/03\/week-in-security-february-26-march-4\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 05 Mar 2018 17:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/03\/week-in-security-february-26-march-4\/' title='Week in security (February 26 \u2013 March 4)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Last week in infosec, cryptomining kept chugging along, exploits were spotted in the wild, and a massive DDoS attack targeted GitHub.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/fileless\/\" rel=\"tag\">fileless<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/german-government\/\" rel=\"tag\">german government<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-cryptomining\/\" rel=\"tag\">malicious cryptomining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/torrent\/\" rel=\"tag\">torrent<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/03\/week-in-security-february-26-march-4\/' title='Week in security (February 26 \u2013 March 4)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/03\/week-in-security-february-26-march-4\/\">Week in security (February 26 \u2013 March 4)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12843,17701,17702,10497,15554,10498,10506],"class_list":["post-11655","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-fileless","tag-german-government","tag-malicious-cryptomining","tag-security-world","tag-torrent","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11655"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11655\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}