Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

XDR vs SIEM: Pros and Cons of Each for Endpoint Protection

Security teams face constant pressure to detect and respond to threats faster while managing increasingly…

3 weeks ago

SIEM as a Service Price in 2025: What Businesses Should Expect

Security Information and Event Management systems remain fundamental to modern cybersecurity strategies, but the financial…

4 weeks ago

The Role of Cybersecurity Consulting in Enhancing Your Risk Management Strategy

Organizations face mounting pressure to protect sensitive data, maintain operational continuity, and comply with increasingly…

4 weeks ago

Cybersecurity Solutions for Small Businesses: What Every Owner Should Know

Small business owners face an uncomfortable reality: cybercriminals view them as ideal targets. While major…

1 month ago

The Future of Industrial Cybersecurity: Trends and Technologies to Watch

Manufacturing plants, power grids, water treatment facilities, and chemical refineries once operated in isolated networks…

1 month ago

SIEM Implementation: Mistakes to Avoid When Setting Up Your System

Security Information and Event Management platforms promise comprehensive threat detection, centralized log management, and improved…

1 month ago