Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

Microsoft Endpoint Detection and Response vs Other EDR Solutions

Organizations heavily invested in the Microsoft ecosystem face an interesting decision when selecting endpoint protection.…

2 weeks ago

Endpoint Detection and Response Vendors: What to Look for in a Trusted Provider

Choosing the right endpoint security solution can make the difference between stopping a breach early…

3 weeks ago

The Role of Security Information and Event Management Tools in Threat Detection

Cyber threats have become so sophisticated that detecting them requires more than just installing antivirus…

3 weeks ago

Cyber Security Operations Center: Key Features for Stronger Cyber Defense

Modern organizations face relentless cyber threats from multiple directions—ransomware gangs, nation-state actors, insider threats, and…

56 years ago

Integrating MDR Software into Your Existing Security Infrastructure

You've invested significantly in security tools over the years. Firewalls, endpoint protection, email security, network…

4 weeks ago

How a Security Information and Event Management System Enhances Threat Detection

Cybersecurity teams face an overwhelming challenge: how do you spot a genuine threat when your…

56 years ago