• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Current News   »   This Week in Security News

This Week in Security News

  • Posted on:May 27, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!

 

High-Profile Cyber Theft Against Banks Targeted SWIFT Systems

Much has been reported and discussed about the bank heists that affected Bangladesh, Vietnam, and Ecuador. All three cases involved the Society for Worldwide Interbank Financial Transfers (SWIFT), a system used by financial/banking institutions worldwide for communicating financial messages or instructions, and has more than 10,000 customers from the financial sector: banks, brokerage institutions, foreign exchanges, and investment firms, among others. 

Fake Bank App Ramps Up Defensive Measures

One particular mobile malware caught our attention with its unique combination that makes its attack stealthy, and it has the capability to locks a user’s device. A similar routine was reported previously in our entry on Operation Emmental in terms of locking the victim’s phone. However, this new malware does so as a failsafe and without the use of external commands.

New Ransomware Discovered: BadBlock and DMA Locker 4.0

Latest reports have uncovered a new ransomware strain called BadBlock targeting home users through malicious URLs and email attachments. Security firm Malwarebytes has also reported that DMA Locker has been updated with automated as well as command and control (C&C) protocols, using the Neutrino exploit kit to distribute the malware. 

It’s Time to Shield Your Servers Against a New Breed of Ransomware

 Ransomware is the scourge of the modern IT security team. If allowed to spread through your IT environment it could shut down the organization, denying access to mission critical data for potentially days, or even indefinitely. The result? The disruption of service delivery, lost productivity and a hefty hit to reputation and profits. Some believe the best answer is to block it at the email/web gateway and train staff to better spot suspicious emails. While this is critically important, it’s not the whole story. 

State CIOs Urge Feds to Finalize Cyberattack Response Plan

State chief information officers and cybersecurity officials are calling on the federal government to finalize a plan of action for responding to major cyberattacks, which the U.S. Department of Homeland Security drafted over six years ago. The National Cyber Incident Response Plan, known as N-Chirp, seeks to coordinate efforts between federal, state and local officials, as well as other stakeholders, to mitigate damages and bounce back from cyberattacks aimed at disrupting power grids, or major communications and transportation systems, among other targets. 

‘Digital Batman’ Hacktivist Posts Video of Cyberattack on Calatan Police Site

Just days after transferring $11,000 in stolen bitcoins to an anti-ISIS revolutionary group in Syria, hacktivist Phineas Fisher was at it again — not just defacing the website belonging to Spain’s Catalan police union, but actually posting an online tutorial showing how it was done. Phineas Fisher, aka “Hack Back!” and “GammaGroupPR!,” is the same online agitator credited with hacking Italy-based government surveillance technology provider Hacking Team and posting a how-to guide describing the attack’s methods.

Automation May Hamper Grid Recovery in Outage Caused by Cyberattack

Efforts by some utilities to modernize the aging electrical grid may actually work against their abilities to quickly recover from a cyberattack, experts told lawmakers in Washington, D.C., Wednesday. Digital automation, intended to make the grid run more smoothly, may make it more difficult to get up and running after an outage. 

San Antonio is a National Leader in Cybersecurity

This year, experts say we’ll have a total of 6.8 billion connected devices on the planet, each one a tempting portal for hackers who want to steal your identity, your savings, or even shut down a city.

It’s an increasingly dangerous cyber arms race. The good news? San Antonio is leading the way in cybersecurity and has the largest collection of cybersecurity professionals outside of the nation’s capital.

Report Finds Hillary Clinton Failed to Follow Cybersecurity Guidelines

Hillary Clinton disregarded State Department cyber-security guidelines by using a private email account and server, an internal audit found on Wednesday. Her staff twice brushed aside specific concerns that she was not following federal rules. The inspector general’s review also revealed that hacking attempts forced then-secretary of state Mrs. Clinton off email at one point in 2011, though she insists the personal server she used was never breached.

Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.

Related posts:

  1. This Week in Security News
  2. This Week in Security News
  3. This Week in Security News
  4. This Week in Security News

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.