{"id":29747,"date":"2020-03-27T13:40:26","date_gmt":"2020-03-27T19:40:26","guid":{"rendered":"https://www.webroot.com/blog/?p=29747"},"modified":"2020-03-27T13:40:27","modified_gmt":"2020-03-27T19:40:27","slug":"cyber-news-rundown-who-under-cyberattack","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/03\/27\/cyber-news-rundown-who-under-cyberattack\/","title":{"rendered":"Cyber News Rundown: WHO Under Cyberattack"},"content":{"rendered":"\n<h2>World Health Organization Sees Rise in Cyberattacks <\/h2>\n\n\n\n<p>Officials for the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hack-attempt-on-the-who\/\">World\nHealth Organization<\/a> (WHO) have announced that many of their sites and\nservers have been under attack by unsuccessful hackers trying to capitalize on\nthe latest health scare. The attack stemmed from the use of several malicious\ndomains that attempted to gain sensitive information and credentials from WHO\nemployees. Thousands of other malicious domains have been created over the last\nfew weeks to exploit the uninformed victims of the Coronavirus outbreak. <\/p>\n\n\n\n<h2>TrickBot Sidesteps 2FA on Mobile Banking Apps<\/h2>\n\n\n\n<p>The creators of TrickBot have developed a new mobile app\ncalled <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trickbot-bypasses-online-banking-2fa-protection-via-mobile-app\/\">TrickMo<\/a>,\nthat can silently circumvent two-factor authentication that is used by various\nmobile banking apps. The malicious app is used mainly to intercept\nauthentication tokens, once it is installed on the victim\u2019s device. Currently,\nthe TrickMo app is targeting German individuals and using the name \u201cSecurity\nControl\u201d to disguise any ulterior motives, and even sets itself as the default\nSMS app, in order to steal additional information. <\/p>\n\n\n\n<h2>Google Play Finds 56 New Malicious Apps<\/h2>\n\n\n\n<p>Over 56 new malicious apps have been spotted on the <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/03\/found-malicious-google-play-apps-with-1-7-million-downloads-many-by-children\/\">Google\nPlay store<\/a>, with a combined 1.7 million installations on devices across the\nglobe. To make matters worse, a large portion of the apps were targeted\nspecifically at children and used native Android functionality to imitate typical\nuser actions to boost ad revenue. Many of the apps took extreme measures to\navoid being uninstalled by the users, though Google itself has since removed\nall of the related apps from the Play Store.<\/p>\n\n\n\n<h2>Fake Coronavirus Vaccine Sites Shutdown<\/h2>\n\n\n\n<p>A website offering <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/us-court-blocks-fake-covid-19\/\">fake\nCoronavirus vaccine kits<\/a> that were claiming to be approved by the WHO has\nbeen shutdown following a ruling by a federal court. The operator of the site\nhas been accused of committing fraud and the hosting service has received a\nrestraining order to stop public access to the site. The site in question,\n\u201ccoronavirusmedicalkit.com\u201d offered the fake kits with users only paying for\nshipping and entering their payment card data. <\/p>\n\n\n\n<h2>Tupperware Website Breached<\/h2>\n\n\n\n<p>The main website for <a href=\"https:\/\/www.zdnet.com\/article\/tupperware-website-hacked-and-infected-with-payment-card-skimmer\/\">Tupperware<\/a>\nwas recently hacked and used to host Magecart code to steal payment card\ninformation. The malicious code was first discovered at the end of last week,\nbut was still active nearly a week later, even after multiple attempts to\ncontact the company. Magecart has been a wide-spread issue for online retailers\nover the last couple years, and still maintains a large presence due to their\nease of use and continuing success. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>World Health Organization Sees Rise in Cyberattacks Officials for the World Health Organization (WHO) have announced that many of their sites and servers have been under attack by unsuccessful hackers trying to capitalize on the latest health scare. The attack stemmed from the use of several malicious domains that attempted to gain sensitive information and [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":29749,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21932,22457],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29747"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29747"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29747\/revisions"}],"predecessor-version":[{"id":29751,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29747\/revisions\/29751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29749"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29747"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29747"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}