Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

What Apps Are Used in SIEM and How They Enhance Cybersecurity

Security Information and Event Management (SIEM) systems have become essential tools in today’s cybersecurity landscape.…

3 weeks ago

What You Need to Know About SIEM Integration with Your Existing Infrastructure

Today, organizations need a cybersecurity tool that will offer detection and response, among other services,…

3 weeks ago

SIEM Providers for Small Businesses: Affordable and Effective Options

The threat vectors in cybersecurity are increasing, and cyber attackers are targeting small businesses due…

4 weeks ago

What Affects EDR Pricing? Key Factors to Consider When Selecting Endpoint Protection

Sophisticated cyber threats have driven the demand for Endpoint Detection and Response (EDR) software, making…

4 weeks ago

The Benefits of EDR Software: A Deep Dive into Proactive Threat Detection

With cyber threats increasing in sophistication, businesses are under pressure to try and stay ahead…

1 month ago

EPP vs EDR: What You Need to Know About Endpoint Protection in 2025

Cybersecurity has become an ever-critical concern for businesses of all sizes. In 2025, as remote…

1 month ago