{"id":23263,"date":"2017-12-29T01:00:48","date_gmt":"2017-12-29T08:00:48","guid":{"rendered":"https://www.webroot.com/blog/?p=23263"},"modified":"2018-01-15T19:44:08","modified_gmt":"2018-01-16T02:44:08","slug":"cyber-news-rundown-edition-12-29-17","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/12\/29\/cyber-news-rundown-edition-12-29-17\/","title":{"rendered":"Cyber News Rundown: Edition 12\/29\/17"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any questions? Just ask.<\/p>\n<h3>WordPress Backdoor Found on Over 300,000 Machines<\/h3>\n<p>Recently, researchers found a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoor-found-in-wordpress-plugin-with-more-than-300-000-installations\/\">WordPress plugin containing a backdoor<\/a> that could allow criminals to easily access any device on which the plugin is installed (at least 300,000 machines, in this case). Even more worrisome: the backdoor wasn\u2019t discovered until the plugin\u2019s author was cited in a copyright claim over the use of the \u201cWordPress\u201d brand. The WordPress security team quickly updated the plugin and began force-installing it on all compromised sites.<\/p>\n<h3>Billions of Credentials Found on Dark Web<\/h3>\n<p>In a recent data dump on the Dark Web, researchers have <a href=\"http:\/\/www.theregister.co.uk\/2017\/12\/12\/1_point_4_billion_credentials_in_clear_text_in_dark_web_archive\/\">discovered a trove of credentials for at least 1.4 billion users<\/a>, all of which was stored in plain text and was easily searchable. While some of the data had already been released in a previous data dump, it appears most of the credentials were new and verified as authentic. Unsurprisingly, the dump has also revealed that the majority of users still have incredibly weak passwords. The most common is still \u201c123456\u201d.<\/p>\n<h3>Data on Millions of Americans Left Unattended Online<\/h3>\n<p>Earlier this year, researchers <a href=\"https:\/\/www.cnet.com\/news\/massive-leak-exposes-data-on-123m-us-households\/\">discovered yet another AWS S3 database left misconfigured and freely available<\/a> to anyone with AWS credentials. The database belongs to Alteryx, a marketing analytics company, and revealed financial information for at least 123 <em>million<\/em> Americans. Although, fortunately, the database didn\u2019t contain full names or social security numbers, the 248 available data fields could easily be used to identify specific individuals.<\/p>\n<h3>Thousands of Lexmark Printers Left Unsecured<\/h3>\n<p>Over <a href=\"https:\/\/threatpost.com\/user-gross-negligence-leaves-hundreds-of-lexmark-printers-open-to-attack\/129187\/\">1,000 internet-connected Lexmark printers have been found to have zero security measures<\/a>; most lacked even a simple password. Additionally, many of these printers have been traced back to prominent companies and even government organizations. And while sensitive information isn\u2019t directly available, hackers could cause major disruptions to the devices\u2019 functions, and could even install malware to remotely capture any print jobs that might contain valuable data.<\/p>\n<h3>Android Mobile Game Silently Leaking Data<\/h3>\n<p>A relatively <a href=\"http:\/\/blog.pradeo.com\/google-play-app-leaks-data\">new mobile game on the Google Play Store appears to leak sensitive data<\/a> from both the device\u2019s user and the device itself almost constantly. Dune!, the app, has been downloaded at least 5 million times, and has been known to connect to up to 32 different servers to silently transmit stolen data and access a device\u2019s geolocation data. Along with its true functionality, Dune! carries at least 11 known vulnerabilities that make it prone to additional attacks and further data leakage.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any questions? Just ask. WordPress Backdoor Found on Over 300,000 Machines Recently, researchers found a WordPress plugin containing a backdoor that [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":21943,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[21681,7799,6665,4971,4959,19733,3769,21257,4969,18763,21687,4469,6433,21683,21685,4281,21689,7771,3479,17061],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23263"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=23263"}],"version-history":[{"count":5,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23263\/revisions"}],"predecessor-version":[{"id":23356,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23263\/revisions\/23356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/21943"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=23263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=23263"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=23263"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=23263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}