Categories: Newsletter

Network Monitoring News – Aug 2016

Windows 20 Year Patch

Microsoft has finally patched MS16-087. Simply put, Windows does not check/validate the driver it installs when it connects to a new printer. Since printer drivers are installed with full system rights you can see why this could be a problem. If an attacker takes control of or emulates a network/internet printer they can push just about any malicious code they like to the end-users machine and gain full administrator access.

This vulnerability has been around for the better part of 20 years and affects all versions of Windows going back to Windows 95! This requires all Windows systems be patched. While your IT staff is patching, have them also update Flash Player. Adobe has released 52 fixes for this piece of software.

Game Of Thrones

A new phishing attack is out that is a false violation notice from your ISP. The email message looks like a message from IP-Echelon.

This is the company that enforces copyright claims for companies like HBO.

The message states that IP-Echelon has determined that the person receiving this email has illegally downloaded “Game of Thrones” or other copyright-protected material and that unless they pay a fine within 72 hours, the incident will be turned over to their legal department.

The victim is directed to a website where they can pay. People who fall for this scam end up giving their hard-earned money to a criminal.

Ransomware

After a low in the spam distribution of ransomware during June, spam campaigns distributing ransomware have returned more aggressive than ever. 200 times the normal volume in the last month. The recent spam campaigns are sending out zip file attachments with a Javascript file inside that will download and execute the ransomware on the victims machine if the user opens it. The attachments are named in a way that tries to lure your users into opening them.

Once again, we see a need for user education. If users know what to look out for, they are more likely to question the validity of messages such as these.

Many users inherit permission sets that are far too broad for their normal job functions. By limiting user access across network resources, the damage incurred by the compromise of a single user can be more easily contained.

Ron Samson

Share
Published by
Ron Samson

Recent Posts

7 Best SOC Services for Cybersecurity in Financial Services: What You Need to Know

Financial institutions face more cyber threats than almost any other industry. Banks, credit unions, investment…

2 weeks ago

What’s the Best SIEM Software for Security Management in Healthcare: Top Solutions

Healthcare organizations face unique cybersecurity challenges that make choosing the right Security Information and Event…

56 years ago

5 Top Cybersecurity Trends 2025: How Automation and AI Will Enhance Incident Response

The cybersecurity industry continues to transform as threats become more sophisticated and attack surfaces expand.…

3 weeks ago

Why the Best SIEM for Security Operations Is Crucial for Cloud-Based Environments

Cloud computing has transformed how businesses operate, but it's also created new security challenges that…

3 weeks ago

Top 10 SIEM Tools for Integrating with Existing Security Systems

Security Information and Event Management (SIEM) platforms have become central to modern cybersecurity strategies. These…

4 weeks ago

Best EDR Software: Key Features to Ensure Maximum Protection

Cybersecurity threats are getting more sophisticated every day. Traditional antivirus programs can't keep up with…

4 weeks ago