{"id":19267,"date":"2016-05-20T14:17:51","date_gmt":"2016-05-20T20:17:51","guid":{"rendered":"https://www.webroot.com/blog/?p=19267"},"modified":"2018-01-30T09:38:33","modified_gmt":"2018-01-30T16:38:33","slug":"threat-recap-week-may-16th","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/05\/20\/threat-recap-week-may-16th\/","title":{"rendered":"Threat Recap: Week of May 16th"},"content":{"rendered":"<p>A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week.<\/p>\n<p><strong>TeslaCrypt Closing It&#8217;s Doors<\/strong><\/p>\n<p>Here&#8217;s a bit of good ransomware news, for once. This week, it was brought to the attention of the security world that TeslaCrypt, one of the largest ransomware creators\/distributors, was shutting down their operation for good. Researchers from ESET contacted TeslaCrypt via their support chat function and requested the master decryption key, which was provided freely, along with an instruction guide on how to use it.<\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2016\/05\/19\/end-of-teslacrypt\/?utm_source=dlvr.it&amp;utm_medium=twitter\">https:\/\/www.helpnetsecurity.com\/2016\/05\/19\/end-of-teslacrypt\/<\/a><\/p>\n<p><strong>New World Hackers Group\u00a0Continues With University Hack<\/strong><\/p>\n<p>The New World Hackers (NWH), a hacktivist group\u00a0participating in the OpAfrica Anonymous campaign, have targeted Limpopo University in South Africa in response to the ongoing human rights violations that are occurring in the country. Along with replacing the university&#8217;s main webpage, the group was able to gain access to both alumni and faculty personal information, which was then released publicly online.<\/p>\n<p><a href=\"http:\/\/news.softpedia.com\/news\/anonymous-leaks-data-from-south-african-university-504081.shtml\">http:\/\/news.softpedia.com\/news\/anonymous-leaks-data-from-south-african-university-504081.shtml<\/a><\/p>\n<p><strong>LinkedIn User Data On Sale <\/strong><\/p>\n<p>Recently, it was reported\u00a0that the user account information of\u00a0nearly 167 million LinkedIn users was available on the dark web 5 bitcoins, a small price. The leaked data likely comes from the 2012 hack of LinkedIn, in which\u00a0over 6 million user accounts were made available, and resulting in\u00a0hackers working to successfully crack a majority of the hashed passwords. While this breach doesn&#8217;t affect\u00a0all of LinkedIn&#8217;s customers, it is advisable that all users change their passwords to avoid any potential future\u00a0attacks on personal accounts.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3071916\/security\/a-hacker-is-selling-167-million-linkedin-user-records.html?utm_content=bufferee0be&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer\">http:\/\/www.computerworld.com\/article\/3071916\/security\/a-hacker-is-selling-167-million-linkedin-user-records.html?<\/a><\/p>\n<p><strong>Apple Pushes Out High Volume of Security Updates<\/strong><\/p>\n<p>This week, Apple started sending out security updates for all platform versions of its operating systems, with iOS alone receiving 39 different patches. These updates come just months after Apple participated in Pwn2Own, a hacking event focused on finding security vulnerabilities in the products of several industry leaders. Many of the patches are around the ways Apple product users view web content, with the goal being to keep them safe from any malicious attachments or redirects that may be lurking around.<\/p>\n<p><a href=\"http:\/\/www.eweek.com\/security\/apple-makes-security-improvements-to-ios-and-os-x.html\">http:\/\/www.eweek.com\/security\/apple-makes-security-improvements-to-ios-and-os-x.html<\/a><\/p>\n<p><strong>Germany Blames Russia for Cyber Attacks<\/strong><\/p>\n<p>German intelligence officials are pointing their fingers at Russia in regards to attacks\u00a0dating back to\u00a0\u00a02015 on the German parliament, as well as the the more recent attacks on Chancellor Angela Merkel. In the past year, attacks originating in Russia have become increasingly common and have a wide spread of targets, including Ukraine&#8217;s power grid, TV stations in France, and computer system in the Netherlands. While it&#8217;s impossible to know for sure, many of the victims believe it to be the work of the Russian government rather than individual hackers.<\/p>\n<p><a href=\"http:\/\/www.securityweek.com\/evidence-russia-behind-cyber-attacks-germany-secret-service?utm_content=buffer91681&amp;utm_medium=social&amp;utm_source=facebook.com&amp;utm_campaign=buffer\">http:\/\/www.securityweek.com\/evidence-russia-behind-cyber-attacks-germany-secret-service?<\/a><\/p>\n<p><strong>Hacker Selling Pornhub Shell Access was a False Claim<\/strong><\/p>\n<p>In the past week, a hacker claimed to be selling shell access to Pornhub&#8217;s site, though this information later proved to be false. When contacted by Pornhub in regards to the vulnerability, the hacker was unable to provide any evidence of his capability to gain access or execute any injected code on the site. Pornhub has an ongoing bug bounty program, which will pay out up to $25,000 USD for the discovery of vulnerabilities on their sites.<\/p>\n<p><a href=\"http:\/\/www.csoonline.com\/article\/3070420\/security\/pornhub-said-to-be-compromised-shell-access-available-for-1-000.html\">http:\/\/www.csoonline.com\/article\/3070420\/security\/pornhub-said-to-be-compromised-shell-access-available-for-1-000.html<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. TeslaCrypt Closing It&#8217;s Doors Here&#8217;s a bit of good ransomware news, for once. This week, [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":18177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3959,11169,3565,19697,6281,4463,3557,10341,19701,19691,3479,5751,19693,19699,5205,4611,3529,3471,4461,19695],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19267"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19267"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19267\/revisions"}],"predecessor-version":[{"id":19271,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19267\/revisions\/19271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/18177"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19267"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19267"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}