Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

How Best SIEM Solutions for Enterprises in 2026 Help Automate Security Operations

The role of a Security Information and Event Management (SIEM) system has shifted from being…

4 days ago

Building a Resilient IT Infrastructure Security Strategy for Your Organization

In an era where digital operations are the lifeblood of every enterprise, the concept of…

56 years ago

7 Best EDR Solutions for Security Operations 2026: How to Improve Endpoint Protection

The digital safety of an organization no longer rests solely on a strong perimeter. With…

1 week ago

Choosing the Right Vulnerability Assessment Services for Your IT Infrastructure

In the current digital climate, maintaining a secure network is no longer a matter of…

1 week ago

The 10 Top MDR Solutions to Enhance Incident Response in Financial Services

In the world of finance, trust is the only currency that truly matters. Yet, as…

56 years ago

Cost vs Benefits of AI SOC Solutions: A Comprehensive Analysis for SMBs

In the boardroom of a typical mid-sized business, the conversation around cybersecurity has shifted. It…

3 weeks ago