Search

Security Intelligence from Network & Security Limited

Securing your Freedom to do Business on the Internet

“Petya” Ransomware Goes Global

“Petya” Ransomware goes Global

There is a new strain of Ransomware from its original called Petya. Some sites out there are calling it completely new, NotPetya, and others see it is a variant and calling it PetWrap.

Whatever the case, the advice is always the same, look at how this is reportedly spreading, and put measures in place to mitigate as much as you possibly can.

According to many reports, the Ukraine has been badly hit, and it has been seen in several high profile UK business organisations.

Its also been confirmed that this Ransomware uses the Eternal Blue exploit, which was originally thought to have been developed by the US NSA as a digital weapon, and then subsequently leaked online by the hacker group known as Shadow Brokers.

Businesses who have not put measures in place such as disabling the SMB version 1 protocol (deprecated) or implemented the MS17-010 Microsoft Patch should do so now or as soon as possible. We believe this wont be the last exploit of this nature, and although simple measures such as black-holing the domain name used for the original Wannacry outbreak, and blocking known C&C servers, wont be effective and you could be fighting a reactive battle.

Businesses need to be robust in their security measures, have a solid response plan and be reactive as they can be to these modern threats otherwise these strains will continue to develop and proliferate. Don’t delay security patching.

What can you do ? Read the full article below – or contact us today.
http://ift.tt/2sQzRJC

Confirmed: Intel patches remote execution hole that’s been hidden in its…

Intel have confirmed that a patch will be released that will fix a remote code execution vulnerability (discovered in March 2017) which has been in its processors since 2009. This vulnerability allows hackers exploiting the flaw to silently snoop on a vulnerable machine’s users, make changes to files and read them, install rootkits and other malware, and so on. This is possible across the network, or with local access. #ITSecurity
http://ift.tt/2qsGqPf

MilkyDoor Infests 200 Android Apps

About 200 unique Android apps have been embedded with the MilkyDoor backdoor, which is built to attack an enterprise’s internal networks, private servers, and ultimately, corporate assets and data. #ITSecurity
http://ift.tt/2oLT6yV

Interpol Spots Thousands of C&C Servers Across Asean

Officers found 8800 C&C servers across eight countries, responsible for financial malware, ransomware, Distributed Denial of Service (DDoS) attacks and spam. #ITSecurity #Ransomware
http://ift.tt/2plccQa

RansomAware

Ransomware cybercriminals took in about $1 billion last year, based on money coming into Ransomware-related Bitcoin wallets. #Ransomware
http://ift.tt/2p3DOZB

http://ift.tt/2q4nXbK…

The Top 5 Resources to Protect your Business Against the threat of Ransomware in 2017 #ITSecurity #Ransomware
http://ift.tt/2q65Jt7

The phishing craze that’s blindsiding users – Health Security Solutions

Phishing for Homographs – fraudsters using Cyrillic characters to direct you to a site that doesn’t redirect – users beware. #ITSecurity – If you get an email from someone you don’t know, not expecting, or you are suspicious – simple answer is to type the URL in, don’t click !
http://ift.tt/2p0Okkh

Webroot antivirus mistakenly flags Windows as malware

Rough day for users running Windows and trying to use Facebook if you use Webroot…. #ITSecurity
http://ift.tt/2q0dj5Z

The Human Factor: Technology Changes Faster Than Humans

Although we all realise it, how technology is advancing more than human nature, its an interesting article on how human nature is responsible for around 95% of Security Incidents #ITSecurity
http://ift.tt/2oqMvyB

Blog at WordPress.com.

Up ↑

%d bloggers like this: