Recovering from Ransomware

teslacryptYou have trained your staff and improved your defenses.  In spite of your best efforts, you have an active case of crypto-malware running on a system in your business.  How do you recover?

Here are the steps to recovery:

  • Disconnect the affected system from the network by removing the Ethernet network cable connection or turning off the Wi-Fi connection.
  • Determine if the encryption process has completed.
    • If so, leave the system running, but disconnected from the network. ...
Continue Reading →
0

Detect and Defend Against Ransomware

maktub-lockerEncryption ransomware can be a devastating event if it happens to your or your company.  The three solutions are basically pay the money, restore from backup, or accept your losses and move on.  All are expensive, and some can be severe enough to drive a business out-of-business.Monday we gave you several ways to prevent, or at least prepare a response to a crypto-ransomware exploit.  Today we are going to look at early ...

Continue Reading →
0

Don’t Take The Bait!

baitHaving just discussed phishing on Monday, it makes sense to cover the social engineering practice called “baiting” today.  Typically, this involves an attacker leaving removable media such as a USB flash drive or SD Media card lying around in a public location. The exploit depends entirely on the principle of “finders-keepers.”  People pick these drives up, and plug them into the first computer they ...

Continue Reading →
0

US-CERT Warns Against Phishing and Social Engineering Exploits

US-CERTWe continue to hear from security researchers and professionals that an astonishing 95% of all exploits begin with someone opening an attachment or clicking a link on a phishing email.  I have a client where two different employees opened the attachment on an email from “FedEx” and became infected with crypto-malware.  These incidents happened nearly a week apart, and you think that the second ...

Continue Reading →
0

Fake Tech Support Claims To Be From Your ISP

We have all received a fake tech support call from someone claiming to be a Microsoft employee.  Now there is a new twist on the scam involving a fake screen pop-up and tech support fakers who claim to be from your Internet service provider.  Google has an extensive collection of fake tech support pop-ups, these are all fake.  Take a look.

We have reported on this issue several times in this blog.  Like here and here and ...

Continue Reading →
0

Mac Users Targeted By Cyber-Attackers

applelogoThe Apple OSX platform has long held the cache of being invulnerable to attack.  Cyber-criminals have be crafting more exploits to target Macs, iPhones, and iPads, especially since 2012.  The reason for this, as explored in a recent article on SiliconBeat, is that Apple users tend to have more disposable income.  If you willingly pay more to have “the best” or most ...

Continue Reading →
0

Your Smartphone and Tablet Need Security Too

phone-thiefMobile smart devices have all the capabilities of a laptop or computer.  What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer.  The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing information.

In ...

Continue Reading →
0

Does Your Computer Have A Malware Infection? – Part 2

malwareOn Wednesday we looked at the obvious, visual symptoms of a malware infection.  Today we will explore some changes in performance that can indicate that your computer is infected.

Performance Symptoms

Most malware writers are NOT interested in giving you easy visual clues, but the malware will create additional activity on your system that can tip you off to an infection.

  • Constantly Flashing Hard Drive Light – If the hard drive activity light is constantly ...
Continue Reading →
0

Does Your Computer Have A Malware Infection?

malwareToday we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.

Visual Symptoms

These are signs that you will see on your computer display, and are the most obvious symptoms.

  • Ransomware  – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
  • Fake Security Pop-Up – I haven’t ...
Continue Reading →
0
Page 2 of 5 12345