<div dir="ltr"><div><div dir="ltr" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr">

  
 

  
  
  

<table bgcolor="#ffffff" cellpadding="0" cellspacing="0" width="100%">

  <tbody>
    <tr>
      <td align="left" valign="top">
      <table cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="border-top:0px solid rgb(0,0,0);border-bottom:1px solid rgb(255,255,255);background-color:rgb(255,255,255);text-align:center" align="center"><span style="font-size:10px;color:rgb(96,96,96);line-height:200%;font-family:verdana;text-decoration:none">Email
not displaying correctly? <a href="http://www.oplin.org/4cast/" style="font-size:10px;color:rgb(0,0,255);line-height:200%;font-family:verdana;text-decoration:none" target="_blank">View
it in your browser.</a></span></td>
          </tr>
          <tr>
            <td style="border-top:0px solid rgb(51,51,51);border-bottom:0px solid rgb(255,255,255);background-color:rgb(255,255,255)">
            <center><a><img id="m_7368041559282334671editableImg1" src="http://www.oplin.org/4cast/wp-content/themes/unlimited/assets/images/4cast_email_header.png" title="OPLIN" alt="OPLIN 4Cast" align="middle" border="0"></a></center>
            </td>
          </tr>
        </tbody>
      </table>
      <table style="width:763px;height:877px" bgcolor="#ffffff" cellpadding="20" cellspacing="0">
        <tbody>
          <tr>
            <td style="font-size:12px;color:rgb(0,0,0);line-height:150%;font-family:'Gothic Sans',sans-serif" bgcolor="#ffffff" valign="top">
            <p>
            <span style="font-size:20px;font-weight:bold;color:rgb(0,0,0);font-family:arial;line-height:110%">OPLIN 4Cast #690: Can Trickbot be shattered before the election?</span><br>
 <span style="font-size:11px;font-weight:normal;color:rgb(102,102,102);font-style:italic;font-family:arial">October 14th, 2020</span></p>

            <p style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><img align="left" src="https://4cast.oplin.org/wp-content/uploads/2020/10/fist-1148029_1920.jpg" alt="Fist punching through glass" width="130" height="94" style="padding-right:14px;padding-top:4px;padding-bottom:4px">

Last week, Brian Krebs broke the story that <a href="https://krebsonsecurity.com/2020/10/attacks-aimed-at-disrupting-the-trickbot-botnet/" target="_blank">some unknown actor was trying to disrupt Trickbot</a>, an enormous collection of two million infected computers which provides one of the most active Malware-as-a-Service platforms. It turns out these disruptions were coming from multiple directions: the Department of Homeland Security and separately from a coalition of tech companies. The botnet was not permanently damaged—in fact, there are reports that ransomware operations are "<a href="https://www.engadget.com/us-cyber-command-trickbot-botnet-154548592.html" target="_blank">pretty much back in full-swing</a>"—but this is one way to keep the cybercriminals busy.

</p><ul>
<li style="list-style-type:none">
              </li><li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="https://www.washingtonpost.com/national-security/cyber-command-trickbot-disrupt/2020/10/09/19587aae-0a32-11eb-a166-dc429b380d10_story.html" target="_blank">Cyber Command has sought to disrupt the world’s largest botnet, hoping to reduce its potential impact on the election</a> [<em>Washington Post</em>] "Department of Homeland Security Officials fear that a ransomware attack on state or local voter registration offices and related systems could disrupt preparations for Nov. 3 or cause confusion or long lines on Election Day."</li>
              <li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="https://www.zdnet.com/article/microsoft-and-other-tech-companies-orchestrate-takedown-of-trickbot-botnet/" target="_blank">Microsoft and others orchestrate takedown of TrickBot botnet</a> [<em>ZDNet</em>] "According to the coalition's members, the TrickBot botnet had infected more than one million computers at the time of its takedown. Some of these infected systems also included Internet of Things (IoT) devices."</li>
              <li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="https://www.nytimes.com/2020/10/12/us/politics/election-hacking-microsoft.html?campaign_id=158&emc=edit_ot_20201012&instance_id=23062&nl=on-tech-with-shira-ovide%C2%AEi_id=84399001&segment_id=40702&te=1&user_id=57a70bcb4201ae850b1b3c76a2f893b3" target="_blank">Microsoft Takes Down a Risk to the Election, and Finds the U.S. Doing the Same</a> [<em>New York Times</em>] "The one-two punch painted a picture of the accelerating cyberconflict underway in the final weeks before the elections. Cyber Command, following a model it created in the 2018 midterm elections, kicked off a series of covert pre-emptive strikes on the Russian-speaking hackers it believes could aid President Vladimir V. Putin in disrupting the casting, counting and certifying of ballots this November. Meanwhile, Microsoft, Symantec and other American companies are doing the same."</li>
              <li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="https://krebsonsecurity.com/2020/10/microsoft-uses-copyright-law-to-disrupt-trickbot-botnet/" target="_blank">Microsoft Uses Trademark Law to Disrupt Trickbot Botnet</a> [<em>Krebs on Security</em>] "A court in Virginia granted Microsoft control over many Internet servers Trickbot uses to plunder infected systems, based on novel claims that the crime machine abused the software giant’s trademarks. However, it appears the operation has not completely disabled the botnet."</li>
            </ul>

            <div style="text-align:left"> </div>
            <p style="text-align:left;font-size:20px;font-family:arial;line-height:110%"><small><strong><em>From the <a href="http://ohioweblibrary.org" target="_blank">Ohio Web Library</a>:</em></strong></small><br>
            </p>
            <div style="text-align:justify;font-size:16px;font-family:arial;line-height:110%">
<ul>
<li>Kerner, Sean Michael. “<a href="https://search-ebscohost-com.proxy.oplin.org/login.aspx?direct=true&db=cph&AN=135822318&site=ehost-live" target="_blank">TrickBot Malware Targets Tax Filing Deadline, IBM Warns</a>.” <em>EWeek</em>, Apr. 2019, p. N.PAG. </li>
<li>D’Souza, Vijay A., and Rebecca Gambler. “<a href="https://search-ebscohost-com.proxy.oplin.org/login.aspx?direct=true&db=ulh&AN=141588220&site=ehost-live" target="_blank">ELECTION SECURITY: DHS Plans Are Urgently Needed to Address Identified Challenges Before the 2020 Elections</a>.” <em>GAO Reports</em>, Feb. 2020, p. i-41. </li>
<li>Kroll, Andy. “<a href="https://search-ebscohost-com.proxy.oplin.org/login.aspx?direct=true&db=ulh&AN=141393625&site=ehost-live" target="_blank">The Hack Next Time</a>.” <em>Rolling Stone</em>, no. 1336, Feb. 2020, pp. 37–92.</li>
</ul>

</div>
            <div style="text-align:left"> </div>
 </td>
          </tr>
          <tr>
            <td valign="top" width="760"><span style="font-size:10px;color:rgb(96,96,96);line-height:100%;font-family:verdana">
            <hr>
            <div style="text-align:justify">The <strong><em>OPLIN
4cast</em></strong>

is a weekly compilation of
recent headlines, topics, and trends that could impact public
libraries. You can subscribe to it in a variety of ways, such as: <br>
            </div>
            <div style="text-align:left"> </div>
            <ul>
              <li style="text-align:justify"><strong>RSS feed.</strong>
You
can receive the OPLIN 4cast
via RSS feed by subscribing to the following URL:
<a href="http://www.oplin.org/4cast/index.php/?feed=rss2" target="_blank">http://www.oplin.org/4cast/index.php/?feed=rss2</a>. </li>
              <li style="text-align:justify"><strong>E-mail.</strong>
You
can have the OPLIN 4cast
delivered via e-mail (a'la OPLINlist and OPLINtech) by subscribing to
the 4cast mailing list at
<a href="http://lists.oplin.org/mailman/listinfo/OPLIN4cast" target="_blank">http://lists.oplin.org/mailman/listinfo/OPLIN4cast</a>. </li>
            </ul>
            </span> </td>
          </tr>
          <tr>
            <td style="text-align:center;font-family:'Century Gothic',sans-serif;border-top:0px solid rgb(255,255,255);background-color:#2c4587;color:#fff" valign="top" width="760">© 2020 Ohio Public Library Information Network<br>
                <a href="http://www.slideshare.net/oplin" title="Find us on Slideshare" target="_blank"><img src="http://www.oplin.org/4cast/wp-content/themes/unlimited/assets/images/slideshare3.png" alt="Find us on Slideshare"></a> 
                <a href="http://www.facebook.com/oplin.org" title="Find us on Facebook" target="_blank"><img src="http://www.oplin.org/4cast/wp-content/themes/unlimited/assets/images/facebook_0.png" alt="Find us on Facebook"></a> 
                <a href="https://plus.google.com/107751358238995507967" title="Find us on Google+" target="_blank"><img src="http://www.oplin.org/4cast/wp-content/themes/unlimited/assets/images/google+.png" alt="Find us on Google+"></a> 
                <a href="http://www.twitter.com/oplin" title="Find us on Twitter" target="_blank"><img src="http://www.oplin.org/4cast/wp-content/themes/unlimited/assets/images/twitter_0.png" alt="Find us on Twitter"></a> 
            </td>
          </tr>
        </tbody>
      </table>
      </td>
    </tr>
  </tbody>
</table>


</div></div></div></div></div></div></div></div>