{"id":15246,"date":"2019-05-03T08:00:01","date_gmt":"2019-05-03T16:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/03\/news-8995\/"},"modified":"2019-05-03T08:00:01","modified_gmt":"2019-05-03T16:00:01","slug":"news-8995","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/05\/03\/news-8995\/","title":{"rendered":"This Week in Security News: BEC Attacks and Botnet Malware"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 03 May 2019 14:00:25 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the prevalence and impact of BEC attacks. Also, find out how botnet malware can perform remote code execution, DDoS attacks and cryptocurrency mining.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tech-support-scam-employs-new-trick-by-using-iframe-to-freeze-browsers\/\">Tech Support Scam Employs New Trick by Using Iframe to Freeze Browsers<\/a><\/strong><\/p>\n<p><em>Trend Micro discovered a new technical support scam (TSS) campaign that makes use of iframe in combination with basic pop-up authentication to freeze a user\u2019s browser.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.fedscoop.com\/federal-rotational-cyber-workforce-program-passes-senate\/\">Cybersecurity Pros Could Work for Multiple Agencies Under Bill Passed by Senate<\/a><\/strong><\/p>\n<p><em>Skilled federal cybersecurity workers could be rotated among civilian agencies under bipartisan legislation the Senate passed to help fill specific gaps in the workforce.<\/em><em>\u00a0<\/em><\/p>\n<div class=\"header-content-container\">\n<p class=\"fs-headline speakable-headline font-base\"><strong><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/05\/02\/new-cybersecurity-report-warns-cios-if-youre-breached-or-hacked-its-your-own-fault\/#79878146fe08\">New Cybersecurity Report Warns CIOs &#8212; &#8216;If You&#8217;re Breached Or Hacked, It&#8217;s Your Own Fault&#8217;<\/a><\/strong><\/p>\n<div><em>A new\u00a0<a href=\"https:\/\/www.1e.com\/getting-your-house-in-order\/\" target=\"_blank\" rel=\"nofollow noopener\">cybersecurity survey<\/a>\u00a0conducted by endpoint management specialists\u00a0<a href=\"https:\/\/www.1e.com\/\" target=\"_blank\" rel=\"nofollow noopener\">1E<\/a>\u00a0and technology market researchers\u00a0<a href=\"https:\/\/www.vansonbourne.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Vanson Bourne<\/a>, a survey that questioned 600\u00a0IT operations and IT security decision-makers across the U.S. and U.K., and found that\u00a060% of the organizations had been breached in the last two years and 31% had been breached more than once.<\/em><\/div>\n<div><\/div>\n<\/p><\/div>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/aesddos-botnet-malware-exploits-cve-2019-3396-to-perform-remote-code-execution-ddos-attacks-and-cryptocurrency-mining\/\">AESDDoS Botnet Malware Exploits CVE-2019-3396 to Perform Remote Code Execution, DDoS Attacks, and Cryptocurrency Mining<\/a><\/strong><\/p>\n<p><em>Trend Micro\u2019s honeypot sensors detected an AESDDoS botnet malware variant exploiting a server-side template injection vulnerability in a collaboration software program used by DevOps professionals.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/u-k-government-fires-defense-secretary-gavin-williamson-over-huawei-leak-11556730704?emailToken=c7b9429b764699bae6432797f41319e4VriXbJEl2XSmmRWhaSOya86yVbzGG0UPjolqJ1JrGopNw3\/e3uWGf9WgE427fJv\/w16A82NBLDVMdDHOYyg0EHAaRSX2xAVeI37+zsXScE96s\/8VMQVp\/UWs7GMf\/OVQjcyichuRgH5tqE0hFy4Wgg%3D%3D&amp;reflink=article_copyURL_share\">U.K. Prime Minister Theresa May Fires Defense Secretary Gavin Williamson Over Huawei Leak<\/a><\/strong><\/p>\n<p><em>British Prime Minister Theresa May fired Defense Secretary Gavin Williamson, saying he leaked sensitive information surrounding a review into the use of equipment from China\u2019s Huawei Technologies Co. in the U.K.\u2019s telecoms network.<\/em><em>\u00a0<\/em><\/p>\n<p class=\"entry-title\"><strong><a href=\"https:\/\/fossbytes.com\/hacker-selling-dangerous-windows-zero-day-hacks-for-3-years\/\">This Hacker Is Selling Dangerous Windows 0-Day Hacks For Past 3 Years<\/a><\/strong><\/p>\n<p><em><span class=\"dropcap dropcap3\">A\u00a0<\/span>report by\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/mysterious-hacker-has-been-selling-windows-0-days-to-apt-groups-for-three-years\/#modal-absolute-f920f6d6-bb7b-4fdc-a2f1-cdd69c36ee85\" target=\"_blank\" rel=\"nofollow noopener\">ZDNet<\/a>\u00a0has revealed that a mysterious hacker is selling Windows zero-day exploits to the world\u2019s most notorious cybercrime groups for the past three years. At least three cyber-espionage groups also known as\u00a0Advanced Persistent Threats\u00a0(APTs) are regular customers of this hacker.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/docker-hub-repository-suffers-data-breach-190-000-users-potentially-affected\">Docker Hub Repository Suffers Data Breach, 190,000 Users Potentially Affected<\/a><\/strong><\/p>\n<p><em>In an email sent to their customers on April 26, Docker reported that the online repository of their popular container platform suffered a data breach that affected 190,000 users.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ic3-bec-cost-organizations-us-1-2-billion-in-2018\">IC3: BEC Cost Organizations US$1.2 Billion in 2018<\/a><\/strong><\/p>\n<p><em>In the recently published 2018 Internet Crime Report by the FBI\u2019s Internet Crime Complaint Center (IC3), the agency states that in 2018 alone, it received 20,373 BEC\/email account compromise (EAC) complaints that racked up a total of over US$1.2 billion in adjusted losses.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/dallasinnovates.com\/deadline-tuesday-for-trend-forward-capitals-1st-startup-pitch-competition-in-dallas\/\">Trend Forward Capital\u2019s First Startup Pitch Competition in Dallas<\/a><\/strong><\/p>\n<p><em>Trend Forward Capital, in a partnership with Veem, is bringing its Forward Thinker Award and pitch competition to Dallas on May 20.<\/em><em>\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/bec-scammers-steal-us-1-75-million-from-an-ohio-church\">BEC Scammers Steal US$1.75 Million From an Ohio Church<\/a><\/strong><\/p>\n<p><em>The Saint Ambrose Catholic Parish in Brunswick, Ohio was the victim of a BEC attack when cybercriminals gained access to employee email accounts and used them to trick other members of the organization into wiring the payments into a fraudulent bank account.<\/em><em>\u00a0<\/em><\/p>\n<div class=\"header-content-container\">\n<p class=\"fs-headline speakable-headline font-base\"><strong><a href=\"https:\/\/www.forbes.com\/sites\/tonybradley\/2019\/05\/02\/cybersecurity-experts-share-tips-and-insights-for-world-password-day\/#7fe9a6dc5c2e\">Cybersecurity Experts Share Tips And Insights For World Password Day<\/a><\/strong><\/p>\n<p><em>May 2 is World Password Day. World Password Day falls on the first Thursday in May each year and is intended to raise awareness of password best practices and the need for strong passwords.\u00a0<\/em><\/p>\n<\/p><\/div>\n<p><strong><a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/confluence-vulnerability-opens-door-to-gandcrab\/d\/d-id\/1334577\">Confluence Vulnerability Opens Door to GandCrab<\/a><\/strong><\/p>\n<p><em>A vulnerability in a popular devops tool could leave companies with a dose of ransomware to go with their organizational agility, according to researchers at Trend Micro and Alert Logic.<\/em><\/p>\n<p>Were you surprised by the amount of business email compromise complaints the FBI received in 2018? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-bec-attacks-and-botnet-malware\/\">This Week in Security News: BEC Attacks and Botnet Malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-bec-attacks-and-botnet-malware\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 03 May 2019 14:00:25 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the prevalence and impact of BEC attacks. Also, find out how botnet malware can perform remote code execution, DDoS attacks and cryptocurrency mining. Read on:&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-bec-attacks-and-botnet-malware\/\">This Week in Security News: BEC Attacks and Botnet Malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[21729,11052,10422,21409,3764,714],"class_list":["post-15246","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-bec-attacks","tag-cryptocurrency","tag-current-news","tag-huawei","tag-malware","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15246"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15246\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}