Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

CrowdStrike EDR vs Traditional EDR Solutions: A Comprehensive Comparison

Not all EDR platforms are built the same, and the gap between CrowdStrike EDR and…

56 years ago

What to Expect from Leading EDR Solution Providers in 2026

The expectations organizations bring to EDR solution providers have shifted considerably. A few years ago,…

56 years ago

SIEM Solutions Comparison: Key Features and Benefits of Leading Platforms

Any meaningful SIEM solutions comparison has to go beyond spec sheets. Feature parity across major…

3 weeks ago

Exploring SIEM Options for Top Security Operations: Which One Is Right for You?

Finding the right SIEM options for top security operations has never involved more variables. Cloud-native…

3 weeks ago

Comparing the Top SIEM Platforms: Features, Benefits, and Pricing

Choosing a SIEM platform has never been more complicated — or more consequential. The market…

4 weeks ago

The Future of Network Security Monitoring: Trends and Innovations for 2026

The way organizations monitor their networks has changed more in the past three years than…

56 years ago