{"id":16221,"date":"2019-09-03T11:00:16","date_gmt":"2019-09-03T19:00:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/03\/news-9963\/"},"modified":"2019-09-03T11:00:16","modified_gmt":"2019-09-03T19:00:16","slug":"news-9963","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/09\/03\/news-9963\/","title":{"rendered":"This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 03 Sep 2019 17:36:02 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six months of this year, according to Trend Micro\u2019s 2019 Mid-Year security report. Also, read on about how Trend Micro was once again named a Leader in Gartner\u2019s 2019 Magic Quadrant.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/newsroom.trendmicro.com\/press-release\/commercial\/trend-micro-positioned-leader-again-gartner-magic-quadrant-endpoint-protect\"><strong>Trend Micro Named a Leader in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms<\/strong><\/a><\/p>\n<p><em>Trend was named a Leader in Gartner, Inc.\u2019s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution. Trend has been named a Leader in every Gartner Magic Quadrant for this category since 2002.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/three-common-email-security-mistakes-that-msps-make\/\"><strong>Three Common Email Security Mistakes that MSPs Make<\/strong><\/a><\/p>\n<p><em>MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them\u2014if they avoid three common mistakes: failing to educate customers, placing too much faith on end-user training and leaving service revenue on the table.<\/em><\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/endpoint\/wannacry-remains-no-1-ransomware-weapon\/d\/d-id\/1335659\"><strong>WannaCry Remains No. 1 Ransomware Weapon<\/strong><\/a><\/p>\n<p><em>According to Trend Micro\u2019s 2019 mid-year security report, <\/em><em>WannaCry remains the most commonly detected ransomware by far: about 10 times as many machines were found targeted by WannaCry in the first half of this year than all other ransomware variants combined. Bill Malik, vice president of infrastructure strategies at Trend Micro, discusses the prevalence of this ransomware and how it works. <\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/ta505-at-it-again-variety-is-the-spice-of-servhelper-and-flawedammyy\/\"><strong>TA505 at it Again: Variety is the Spice of ServHelper and FlawedAmmyy<\/strong><\/a><\/p>\n<p><em>TA505 continues to show that they intend to wreak as much havoc while maximizing potential profits. Just like in previous operations, this cybercriminal group continues to make small changes for each campaign such as targeting other countries, entities, or the combination of techniques used for deployment.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/heatstroke-campaign-uses-multistage-phishing-attack-to-steal-paypal-and-credit-card-information\/\"><strong>\u2018Heatstroke\u2019 Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information<\/strong><\/a><\/p>\n<p><em>Heatstroke\u00a0demonstrates\u00a0how far phishing techniques have evolved \u2014\u00a0from merely mimicking legitimate websites and using\u00a0diversified\u00a0social engineering tactics \u2014 with its use of more sophisticated techniques such as steganography.<strong>\u00a0<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/techcrunch.com\/2019\/08\/28\/facebook-portal-stress-test-pwn2own\/\"><strong>Hackers to Stress-Test Facebook Portal at Hacking Contest<\/strong><\/a><\/p>\n<p><em>Hackers will soon be able to stress-test the\u00a0Facebook<strong>\u00a0<\/strong>Portal at the annual Pwn2Own hacking contest, following the introduction of\u00a0the social media giant\u2019s debut hardware device\u00a0last year. Introducing the Facebook Portal is part of a push by\u00a0Trend Micro\u2019s<strong>\u00a0<\/strong>Zero Day Initiative, which runs the contest, to expand the range of home automation devices available to researchers in attendance<\/em>.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/fortnite-players-targeted-by-ransomware-via-fake-cheat-tool\"><strong>Fortnite Players Targeted by Ransomware via Fake Cheat Tool<\/strong><\/a><\/p>\n<p><em>An open-source ransomware variant called \u201cSyrk,\u201d based on the source code of the Hidden-Cry ransomware, was found pretending to be a cheat tool that improves the accuracy of a player&#8217;s aim and provides visibility over other players\u2019 location on the map. Upon infection, a ransom note will demand payment from victims in exchange for a decryption password. <\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminalgroupsilence-hasreportedlystolenus-4-2million-frombanks-sofar\"><strong>Cybercriminal Group Silence Has Reportedly Stolen US$4.2 Million from Banks So Far<\/strong><\/a><\/p>\n<p><em>Contrary to their moniker, the Silence cybercriminal group has been reported to be actively targeting banks and financial institutions in more than 30 countries. Silence reportedly stole US$4.2 million from June 2016 to August 2019.\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.cnet.com\/news\/us-cyberattack-damaged-irans-ability-to-target-oil-tankers-report-says\/\"><strong>US Cyberattack Damaged Iran&#8217;s Ability to Target Oil Tankers, Report Says<\/strong><\/a><\/p>\n<p><em>A database used by Iran&#8217;s paramilitary arm to devise attacks against oil tankers was wiped out by a US cyberattack in June, temporarily reducing Tehran&#8217;s means of targeting Persian Gulf shipping traffic.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/nemty-ransomware-possibly-spreads-through-exposed-remote-desktop-connections\"><strong>Nemty Ransomware Possibly Spreads through Exposed Remote Desktop Connections<\/strong><\/a><\/p>\n<p><em>A new\u00a0<\/em><em>ransomware\u00a0family dubbed \u201cNemty\u201d for the extension it adds to encrypted files has recently surfaced. According to a report from\u00a0<\/em><em>Bleeping Computer, New York-based reverse engineer\u00a0<\/em><em>Vitali Kremez\u00a0posits that Nemty is possibly delivered through exposed remote desktop connections.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/abuse-of-ws-discovery-protocol-can-lead-to-large-scale-ddos-attacks\"><strong>Abuse of WS-Discovery Protocol Can Lead to Large-Scale DDoS Attacks<\/strong><\/a><\/p>\n<p><em>Security researchers have discovered that attackers can abuse the Web Services Dynamic Discovery (WS-Discovery) protocol to launch massive distributed denial of service (DDoS) campaigns. These researchers have issued a warning after seeing cybercriminals abuse the WS-Discovery protocol in different DDoS campaigns over the past few months.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/phishing-attack-tricks-instagram-users-via-fake-2-factor-authentication\"><strong>Phishing Attack Tricks Instagram Users via Fake 2-Factor Authentication<\/strong><\/a><\/p>\n<p><em>Although 2FA remains a valid and highly useful tool, Instagram users should not be complacent and rely on it alone, especially when fake 2FA notifications can be used for malicious purposes. In this blog, Trend Micro recommends some best practices users can combine with their existing security tools to help\u00a0protect against phishing.<\/em><\/p>\n<p><a href=\"http:\/\/www.digitaljournal.com\/tech-and-science\/technology\/q-a-in-a-cloud-connected-world-cybersecurity-is-key\/article\/556793\"><strong>Q&amp;A: In a Cloud-Connected World, Cybersecurity is Key<\/strong><\/a><\/p>\n<p><em>Cloud computing is becoming a critical tool for business, in terms of storing an assessing data. With the increases use of the cloud comes greater security risks. Mark Nunnikhoven, vice president of cloud research at Trend Micro, assesses the solutions.<\/em><\/p>\n<p><em><br \/> <\/em>Will you be following Trend\u2019s best protection practices when playing Fortnite or using Instagram? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ransomware-campaigns-persist-with-wannacry-as-most-common\/\">This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ransomware-campaigns-persist-with-wannacry-as-most-common\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 03 Sep 2019 17:36:02 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-ransomware-campaigns-persist-with-wannacry-as-most-common\/\">This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,4503,10419,666],"class_list":["post-16221","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-cybercrime","tag-industry-news","tag-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16221"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16221\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}