Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

The Future of Cybersecurity: Best EDR Solutions with AI Integration in 2025

Endpoint Detection and Response technology has transformed dramatically as artificial intelligence capabilities have matured and…

4 weeks ago

Why SOC Threat Intelligence Is Essential for Preventing Cyber Attacks

Security Operations Centers face an overwhelming challenge: detecting and stopping sophisticated attackers who constantly evolve…

1 month ago

SOC Monitoring Best Practices: How to Strengthen Your Cyber Defense

Security Operations Centers serve as the nerve center of modern cybersecurity programs, providing continuous visibility…

1 month ago

The Best SOC for Small Businesses: Key Factors to Consider Before You Buy

Small businesses face the same sophisticated cyber threats targeting large enterprises, yet they typically operate…

1 month ago

Why Managed Threat Detection and Response Is Essential for Modern Cybersecurity

The cybersecurity challenge facing organizations today extends far beyond installing firewalls and antivirus software. Modern…

1 month ago

Comparing MDR Providers: Key Features and Benefits You Should Know

Cybersecurity threats continue to grow in sophistication, while many organizations struggle to maintain adequate security…

1 month ago