Tag Archive: Malware

lockyRansomware, what is it? Defined as “malware for data kidnapping,” it is one of the top security issues in the digital and cloud age, wherein the hacker or attacker encrypts data and asks for ransom (usually a Bitcoin payment) for the decryption key.

Today, another ransomware threatens the online community “Locky” that can hit you if you were ‘unlucky.’ It works similarly like the modus conducted by the banking software Dridex.

How Locky works?

A victim will be sent an email with a Microsoft Word attachment disguising as an INVOICE that requires macro.

[By default, Microsoft disables it due to security reasons. So a user normally will see a warning if an attachment contains it.]

Now if you would enable the macro function, it will run and then download Locky to your PC, according to the Palo Alto Networks.

[It is the same modus operandi used by Dridex, a notorious Trojan that steals banking account details.]

There are suspicions that the distributors of Locky are connected to one of the main men of Dridex because both use the same mode of malware distribution.

If you or your organization happens to be the unlucky target, your files will be unrecoverable unless you have a regular backup or if your data has not been touched yet.

Lately, the Hollywood Presbyterian Medical’s computer system was infected by ransomware in which the hackers ask for 9,000 bitcoins (or approximately US$3.6 million).

Reports indicated that the operators behind Locky may have conducted a large attack. Palo Alto Networks revealed that it had detected 400,000 sessions that used the same downloader “Bartallex,” which is the one that deposits the infection onto a computer system. Over half of the targets were recorded in the United States and the rest included Australia and Canada.

Locky utilizes its command-and-control infrastructure for conducting a memory exchange before encrypting the files.

Kevin Beaumont from Medium said that encrypted files have the ‘.locky’ extension. He wrote guidance on how to figure out who among the people in an organization has been infected and recommended that the active directory account of the victim must be locked and its network access must be shut down. Finally, he said that you are more likely to rebuild the victim’s PC from scratch.

Check out the full story here.

online securityIn the article “Experts bust Android security myths”, a group of experts has offered eight useful tips to IT users and administrators regarding online security. To strengthen security, one useful tip is to never root an android device. Rooting a device is equivalent to an alteration at the administrative level and this will make the device more vulnerable to malware. Another tip is to not focus solely on malware or overlook other security threats. Other threats as dangerous as malware that you also need to be cautious of include data harvesting, data exfiltration, poor encryption, mismanagement of passwords, and many others. Read the rest of the tips on CIO.

Source: CIO

A New Linux Malware Uncovered

computer2Marc Etienne Leveille , an ESET researcher, ‘ has stated in his blog post on Wednesday that the newly discovered the malware “Mumblehard, something that has remained undetected for over five years. In April, it was found out that more or less 3,000 devices or machines were affected by the malware. Mumblehard can be acquired by the unsuspecting user through an application called “DirectMailer”. Downloading this application from unreliable sources will often lead to an installation package infected with the malware. Leveille also wrote that there was a drop in the number of infections. However, the botnet associated with the malware has doubled in number. Read SC Magazine to check out the full story.

Source: SC Magazine

Cyber Security Tips for 2015

globe2Various forms of cybercrime are still going to be a problem on the New Year. Good thing some organizations have taken liberty on providing security tips to maintain safety when using the internet.

It always pays to be more aware of the need to be secure on the internet. Being vigilant on different types of scams, regular changing of passwords, and being careful on what are accessed and downloaded on the internet will definitely help one become less vulnerable against cyber security breach.

Malware, viruses, phishing scams, and other security threats will be a thing of the past if only proper security measures are observed by each internet user.

Source: CSO

globe2No one knows cyber surveillance better than the Feds. Mary Galligan, an ex-FBI agent teaches online users how to be safe from cyber-crimes nowadays. Changing password one a month is the first step to guard your emails and other online accounts from online criminals. Next is to provide incorrect information once checking out from stores, hotels, etc. When required for an ID, do not use your driver’s license and any other IDs with your birthday and address on it. Refrain from using banking applications. Computer malwares can penetrate your bank accounts from shops – including your phone.  Lastly, use an alternative email ad for jumble mails.

Source: Money CNN

security1An online banking malware has been infecting South Korean users by tricking them into applications or tools that look very similar to legal online banking tools revealed a Chinese mobile security company, Cheetah Mobile. This malware is swapping itself in place of legal online banking tools, and as a result, it has infected thousands of SK devices in one week.  It revealed that such malware are cloaking itself as legitimate third party software. Check out the full story from the source.

Source: PC World

Computer-MouseMalware trickery has been a problem for many because it can cloak itself as a fake Java updates or a porn app. It can also exploit the people’s data with coding errors in the programs and applications they use. Eventually, malware would enter such system and steal a user’s personal information.  One application to protect the people from such malware invasion is the Malwarebytes Anti-Exploit, a computer protection company based in California that can monitor the most exploited programs, including browsers like Internet Explorer, Firefox and Google Chrome. Check out more of this story from the source.

Source: Tom’s Guide

Computer-WarningAn evolution of ransomware, Cryptolocker Trojan, was not a significant leap from other criminal attempts that extorted money from PC users, but seniors security advisor for Sophos told in an interview that there is a little of hype because it is the just an incarnation of ransomware. What is a ransomware?  A malware encrypt the files of someone and later on convince the owners of those to pay money so that they can decrypt again.  To know more about the story, check out from the source.

Source: Computer World

Screen-exclamationWhen it comes to how phishing and spy frauds work their way in getting access to your personal information, most of it would simply rely on exploiting ones trust. Most of the time hackers or cybercriminals seem to make a malicious message to appear as if it was from a legitimate source. When that happens, most users on the internet find it easier to work their way into your personal information as well as your bank account. More often than not, a malware would simply get into your system, accessing your personal information and contacts. This allows hackers to send out fraudulent emails on your behalf. The same techniques apply with social networks, instant messaging and SMS text messaging. For more information regarding this post, go to the source.

Source: PCWorld

Whenever you shop online, you must always take necessary precautions to make it secured. You must always seek to protect yourself from hackers online who are looking to steal your payment and credit details as well as your identity. Some of the things that you can do to ensure that your shopping is safe are by not adding items onto your cart. For you to ensure that your shopping is safe, see to it that you have the best security software that you can possibly have. In addition, you must also update your browser settings and your computers firewall settings. Keeping your computers clean with the use of anti-virus and anti-malware programs would also help a lot in achieving this. For more information on this post, go to the source.

Source: Stay Safe Online