{"id":12017,"date":"2018-04-16T08:10:05","date_gmt":"2018-04-16T16:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/16\/news-5786\/"},"modified":"2018-04-16T08:10:05","modified_gmt":"2018-04-16T16:10:05","slug":"news-5786","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/04\/16\/news-5786\/","title":{"rendered":"Week in security (April 09 \u2013 April 15)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Apr 2018 15:05:00 +0000<\/strong><\/p>\n<p>Last week, we took a look at a malware-campaign called <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/\" target=\"_blank\" rel=\"noopener\">FakeUpdates<\/a>, methods to use <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/04\/keeping-your-business-and-personal-instant-messages-secure\/\" target=\"_blank\" rel=\"noopener\">secure instant messaging<\/a>, the inner <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/encryption-101-decryption-tool-code-walkthrough\/\" target=\"_blank\" rel=\"noopener\">workings of a decryption tool<\/a>, and some <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/04\/facebook-spammers-making-things-worse\/\" target=\"_blank\" rel=\"noopener\">Facebook spam<\/a> campaigns.<\/p>\n<p>We also published our first <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/04\/labs-ctnt-report-shows-shift-in-threat-landscape-to-cryptomining\/\" target=\"_blank\" rel=\"noopener\">quarterly Malwarebytes Labs CTNT report<\/a> of 2018.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li>A security researcher discovered a <a href=\"https:\/\/medium.com\/@AkshaySharmaUS\/p-f-changs-security-flaw-revealed-following-panera-bread-s-leak-b47fa6a1bba6\" target=\"_blank\" rel=\"noopener\">flaw in P.F.Changs Rewards website<\/a>. (Source: <a href=\"mailto:AkshaySharmaUS@medium.com\">AkshaySharmaUS@medium.com<\/a>)<\/li>\n<li>Security Consultant Xavier Mertens described a <a href=\"https:\/\/isc.sans.edu\/diary\/rss\/23517\" target=\"_blank\" rel=\"noopener\">suspicious use of certutil.exe<\/a>. (Source: InfoSec Handlers Diary Blog)<\/li>\n<li>A significant number of <a href=\"https:\/\/thehackernews.com\/2018\/04\/hacking-cisco-smart-install.html\" target=\"_blank\" rel=\"noopener\">Cisco devices<\/a> belonging to organizations in Russia and Iran were hacked by a group calling itself JHT. (Source: The Hacker News)<\/li>\n<li>Facebook CEO Mark <a href=\"https:\/\/www.siliconrepublic.com\/enterprise\/mark-zuckerberg-senate-summary\" target=\"_blank\" rel=\"noopener\">Zuckerberg<\/a> spoke at a joint hearing of the US Senate judiciary and commerce committees in Washington, DC. (Source: siliconrepublic)<\/li>\n<li>A vulnerability in Microsoft <a href=\"https:\/\/threatpost.com\/outlook-bug-allowed-hackers-to-use-rtf-files-to-steal-windows-passwords\/131169\/\" target=\"_blank\" rel=\"noopener\">Outlook<\/a> allowed hackers to steal a user\u2019s Windows password. (Source: ThreatPost)<\/li>\n<li>A malware gang is going for identity theft and phony tax refunds by targeting <a href=\"https:\/\/krebsonsecurity.com\/2018\/04\/when-identity-thieves-hack-your-accountant\/\" target=\"_blank\" rel=\"noopener\">CPAs<\/a>. (Source: Krebs on Security)<\/li>\n<li>Researchers <a href=\"https:\/\/www.securityweek.com\/researchers-sinkhole-deep-rooted-eitest-infection-chain\" target=\"_blank\" rel=\"noopener\">sinkholed<\/a> the infamous EITest infection chain. (Source: SecurityWeek)<\/li>\n<li>A <a href=\"http:\/\/www.sun-sentinel.com\/local\/broward\/fl-reg-computer-malware-reveton-ransomware-20180412-story.html\" target=\"_blank\" rel=\"noopener\">Microsoft network engineer<\/a> was charged with money laundering linked to Reveton computer ransomware. (Source: SunSentinel)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/intel-spi-flash-flaw-lets-attackers-alter-or-delete-bios-uefi-firmware\/\" target=\"_blank\" rel=\"noopener\">Intel<\/a> has addressed a vulnerability in the configuration of several CPU series that allow an attacker to alter the behavior of the chip&#8217;s SPI Flash memory. (Source: Bleeping Computer)<\/li>\n<li>An old and flawed <a href=\"https:\/\/www.theregister.co.uk\/2018\/04\/12\/javascript_crypto_library_fingered_for_weak_wallets\/\" target=\"_blank\" rel=\"noopener\">Javascript crypto-library<\/a> could allow Bitcoin theft. (Source: The Register)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/week-security-april-09-april-15\/\">Week in security (April 09 \u2013 April 15)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/week-security-april-09-april-15\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Apr 2018 15:05:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/week-security-april-09-april-15\/' title='Week in security (April 09 \u2013 April 15)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from April 09 \u2013 April 16, including fake updates, safe messaging, and Facebook spammers. And our quarterly CTNT report is out.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/encryption\/\" rel=\"tag\">encryption<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fakeupdates\/\" rel=\"tag\">FakeUpdates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes\/\" rel=\"tag\">Malwarebytes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/safe-messaging\/\" rel=\"tag\">safe messaging<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security\/\" rel=\"tag\">security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spammers\/\" rel=\"tag\">spammers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/week-security-april-09-april-15\/' title='Week in security (April 09 \u2013 April 15)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/week-security-april-09-april-15\/\">Week in security (April 09 \u2013 April 15)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10439,3589,18060,10560,18104,714,10497,10595,10498,10506],"class_list":["post-12017","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-encryption","tag-facebook","tag-fakeupdates","tag-malwarebytes","tag-safe-messaging","tag-security","tag-security-world","tag-spammers","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12017"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12017\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}