{"id":19643,"date":"2016-08-26T13:02:47","date_gmt":"2016-08-26T19:02:47","guid":{"rendered":"https://www.webroot.com/blog/?p=19643"},"modified":"2018-01-30T13:16:04","modified_gmt":"2018-01-30T20:16:04","slug":"webroot-threat-recap-week-august-22nd","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/08\/26\/webroot-threat-recap-week-august-22nd\/","title":{"rendered":"Threat Recap: Week of August 22nd"},"content":{"rendered":"<h1 class=\"entry-title\"><\/h1>\n<p>&nbsp;<\/p>\n<p>This week&#8217;s Threat Recap covers everything from,\u00a0&#8216;Fantom&#8217;, the new ransomware that disguises itself as a Windows update, to hackers using Facebook photos to trick facial-recognition logins.<\/p>\n<h5><strong><br \/>\nDecryption Keys Released for Wildfire Ransomware<\/strong><\/h5>\n<p>Recently, researchers have announced the <a href=\"http:\/\/www.infosecurity-magazine.com\/news\/researchers-douse-wildfire\/#.V73Da4dLoEI.twitter\">public availability of decryption keys for users<\/a> affected by the Wildfire ransomware variant. This particular variant did focused on mainly Dutch email domains and infected over 5,300 systems in the last month alone. Infected users were demanded a ransom of 1.5 bitcoins after opening a fake delivery form via email attachment.<\/p>\n<h5><strong>Android Botnet Receiving Commands from Twitter<\/strong><\/h5>\n<p>A new Android app called <a href=\"http:\/\/www.csoonline.com\/article\/3112607\/security\/this-android-botnet-relies-on-twitter-for-its-commands.html\">Android\/Twitoor has been used as a backdoor<\/a> to spread malware onto smartphones. By having the malware check several Twitter accounts periodically, the app is able to receive updates without the malware authors having a need to maintain their own command and control servers. Windows-based Twitter botnets have been in use for several years now, but Android-based version is a much newer practice, as many users rely more and more on mobile devices for everyday banking, communication, etc.<\/p>\n<h5><strong>Fantom &#8211; New Ransomware Disguised as Windows Update<\/strong><\/h5>\n<p>A new ransomware variant has been discovered in the wild called <a href=\"http:\/\/www.bleepingcomputer.com\/news\/security\/fantom-ransomware-encrypts-your-files-while-pretending-to-be-windows-update\/\">Fantom<\/a>. The ransomware disguises itself as an important windows update while it begins encrypting the victim&#8217;s files. Once executed, the malware runs a file called WindowsUpdate.exe and displays a locked splash screen showing the update currently in progress. Once encryption is complete, the user is left with an ominous wallpaper and their files showing the added &#8216;.fantom&#8217; extension.<\/p>\n<h5><strong>iOS Vulnerabilities Used to Target Foreign Activist<\/strong><\/h5>\n<p>It has been discovered that three previously unknown <a href=\"http:\/\/www.csoonline.com\/article\/3112767\/security\/apple-patches-ios-security-flaws-found-in-spyware-targeting-activist.html\">vulnerabilities in Apple&#8217;s iOS<\/a> were used to spy on human rights activist, Ahmed Mansoor. It is believed Ahmed received an SMS message that contained a malicious link that was used to infect the smartphone with data-stealing software. Apple has since patched the vulnerabilities that were exploited, though it is still unknown how the attackers gained access to the vulnerabilities, as they would be highly valuable.<\/p>\n<h5><strong>Hackers Use Facebook Photos to Fool Facial-Recognition Logins<\/strong><\/h5>\n<p>Biometrics becoming a more implemented form of security, and it was only a matter of time before <a href=\"https:\/\/www.wired.com\/2016\/08\/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck\/\">criminals found a workaround<\/a>. Using some simple Internet searching and software that creates a 3D facial model, researchers were able to bypass 80% of facial-recognition authenticators they tested. Even more worrisome, by using the 3D rendering software, they were able to simulate movement of certain facial features, in order to pass some of the &#8220;liveness&#8221; checks that were made.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; This week&#8217;s Threat Recap covers everything from,\u00a0&#8216;Fantom&#8217;, the new ransomware that disguises itself as a Windows update, to hackers using Facebook photos to trick facial-recognition logins. Decryption Keys Released for Wildfire Ransomware Recently, researchers have announced the public availability of decryption keys for users affected by the Wildfire ransomware variant. This particular variant did [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":18303,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3485,19937,19933,19943,19935,3477,19941,3937,16437,19327,3467,4721,4981,3529,3471,5439,9065,19939,3951,7297],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19643"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19643"}],"version-history":[{"count":7,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19643\/revisions"}],"predecessor-version":[{"id":19897,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19643\/revisions\/19897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/18303"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19643"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19643"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}