{"id":13749,"date":"2018-11-02T07:00:11","date_gmt":"2018-11-02T15:00:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/11\/02\/news-7516\/"},"modified":"2018-11-02T07:00:11","modified_gmt":"2018-11-02T15:00:11","slug":"news-7516","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/11\/02\/news-7516\/","title":{"rendered":"This Week in Security News: Spam Campaigns and Vulnerable Infrastructures"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 02 Nov 2018 13:00:26 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, see how cybercriminals have learned to become more creative with malware through spam campaigns. Also, understand why securing energy and water should remain top priority in integration of the industrial IOT.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/same-old-yet-brand-new-new-file-types-emerge-in-malware-spam-attachments\/\">Same Old yet Brand-new: New File Types Emerge in Malware Spam Attachments<\/a><\/strong><\/p>\n<p><em>As cybersecurity defenses continue to improve, cybercriminals have learned to become more creative with malware.\u00a0Trend Micro encountered threats being packaged inside old file types in spam campaigns.<\/em><em>\u00a0<\/em><\/p>\n<div class=\"c-entry-hero__header-wrap\">\n<p class=\"c-page-title\"><a href=\"https:\/\/www.theverge.com\/2018\/11\/1\/18050394\/internet-freedom-report-2018-freedom-house-chertoff\"><strong>Internet freedom continues to decline around the world, a new report says<\/strong><\/a><\/p>\n<p id=\"Z1tPa0\"><em>Digital authoritarianism is on the rise, according to a new report from a group that monitors internet freedoms.\u00a0<a href=\"http:\/\/www.freedomhouse.org\/\">Freedom House<\/a>, a pro-democracy think tank, said today that governments are seeking more control over users\u2019 data while also using laws nominally intended to address \u201cfake news\u201d to suppress dissent. It marked the eighth consecutive year that Freedom House found a decline in online freedoms around the world.<\/em><\/p>\n<\/p><\/div>\n<p><strong><u><a href=\"https:\/\/www.healthdatamanagement.com\/news\/hhs-opens-health-sector-cybersecurity-coordination-center\">HHS Opens Health Cybersecurity Coordination Center<\/a><\/u><\/strong><\/p>\n<p><em>The Department of Health and Human Services opened a cybersecurity center designed to support and improve the cyber defense of the U.S. healthcare industry.<\/em><strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/ransomware-threat-continues-how-infections-take-place\/\">Ransomware Threat Continues: How Infections Take Place<\/a><\/strong><\/p>\n<p><em>According to Trend Micro\u2019s report,\u00a0there has only been a slight increase in ransomware detection so far in 2018. However, this doesn\u2019t make ransomware any less of a threat to enterprise security.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/misconfigured-container-abused-to-deliver-cryptocurrency-mining-malware\/\">Misconfigured Container Abused to Deliver Cryptocurrency-mining Malware<\/a><\/strong><\/p>\n<p><em>Trend Micro recently observed cases of abuse of the systems running misconfigured Docker Engine-Community with Docker application program interface (API) ports exposed.\u00a0<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.wired.com\/story\/apple-t2-security-chip-macbook-microphone\/\">Apple\u2019s T2 Security Chip Makes it Harder to Tap MacBook Mics<\/a><\/strong><\/p>\n<p><em>To defend against eavesdropping malware, Apple\u2019s T2 security chip will now include a mechanism to cut off a laptop&#8217;s microphone at a hardware level whenever the lid is closed.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/disrupting-the-flow-exposed-and-vulnerable-water-and-energy-infrastructures\/\">Disrupting the Flow: Exposed and Vulnerable Water and Energy Infrastructures<\/a><\/strong><\/p>\n<p><em>As\u00a0vulnerabilities in the systems behind CIs increase, specifically for\u00a0supervisory control and data acquisition human machine interfaces, it\u2019s important to look at what risks these critical sectors face.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/spam-campaign-targets-japan-uses-steganography-to-deliver-the-bebloh-banking-trojan\">Spam Campaign Targets Japan, Uses Steganography to Deliver the BEBLOH Banking Trojan<\/a><\/strong><\/p>\n<p><em>This campaign is notable for its use of steganography, which hides malicious code in unexpected mediums (i.e., images) to evade signature-based detection<\/em>.<\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/exposed-and-vulnerable-critical-infrastructure-the-water-energy-industries\">Critical Infrastructures Exposed and at Risk: Energy and Water Industries<\/a><\/strong><\/p>\n<p><em>Securing energy and water should remain top priority<\/em><em> in the continuing integration of the industrial internet of things in these critical sectors.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/british-airways-says-data-breach-larger-than-estimated-1540490298\">British Airways Says Data Breach Larger Than Estimated<\/a><\/strong><\/p>\n<p><em>International Consolidated Airlines Group SA said 185,000 more British Airways passenger records were potentially stolen in a recent data breach, on top of the 380,000 credit card records previously reported.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/network-threats-examined-clustering-malicious-network-flows-with-machine-learning\">Network Threats Examined: Clustering Malicious Network Flows with Machine Learning<\/a><\/strong><\/p>\n<p><em>Cybercriminals are increasingly using\u00a0evasion tactics\u00a0to bypass detection methods, and proactive techniques are needed to discover a malware infection before it leads to a threat.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/perl-based-shellbot-looks-to-target-organizations-via-cc\/\">Perl-Based Shellbot Looks to Target Organizations via C&amp;C<\/a><\/strong><\/p>\n<p><em>Trend Micro uncovered an operation of a hacking group, which we\u2019re naming \u201cOutlaw\u201d, involving the use of an IRC bot built with the help of Perl Shellbot.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trickbot-shows-off-new-trick-password-grabber-module\/\">Trickbot Shows Off New Trick: Password Grabber Module<\/a><\/strong><\/p>\n<p><em>Trickbot now has a password grabber module that steals access from several applications and browsers, such as Microsoft Outlook, Google Chrome, Internet Explorer, Microsoft Edge, and more.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/this-is-how-hackers-can-take-down-our-core-water-energy-systems\/\">This is How Hackers Can Take Down our Critical Energy Systems Through the Internet<\/a><\/strong><\/p>\n<p><em>Researchers from Trend Micro published a report on the ways that Human Interface Systems (HMI), which are found in thousands of utilities worldwide, can be exploited.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/infosec-guide-remote-desktop-protocol-rdp\"><strong>InfoSec Guide: Remote Desktop Protocol (RDP)<\/strong><\/a><\/p>\n<p><em>The increasing attack incidences via Remote Desktop Protocol (RDP) have prompted the\u00a0<a href=\"https:\/\/www.ic3.gov\/media\/2018\/180927.aspx\">FBI to release an alert<\/a>\u00a0informing businesses to establish preventive measures.<\/em><\/p>\n<p>Do you think it\u2019s important for critical infrastructures to use proactive techniques to secure energy and water sectors? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <u><a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/u><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-spam-campaigns-and-vulnerable-infrastructures\/\">This Week in Security News: Spam Campaigns and Vulnerable Infrastructures<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-spam-campaigns-and-vulnerable-infrastructures\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 02 Nov 2018 13:00:26 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, see how cybercriminals have learned to become more creative with malware through spam campaigns. Also, understand why securing energy and water should remain top priority in integration&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-spam-campaigns-and-vulnerable-infrastructures\/\">This Week in Security News: Spam Campaigns and Vulnerable Infrastructures<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,714],"class_list":["post-13749","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13749"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13749\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}