RansomwareSponsored by Webroot

60

Solutions

28

Articles & Videos

161

Contributors

Ransomware is malicious software, designed to block data access in order to extort money. As a form of malware, ransomware is most often used to infiltrate devices through infected emails or links that, in turn, recognize and take advantage of vulnerabilities in the operating system and installed third-party software.

Share tech news, updates, or what's on your mind.

Sign up to Post

Topic Sponsored by Webroot
In this blog we highlight approaches to managed security as a service. We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
0
Is your NGFW recommended by NSS Labs?
Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

Patch Pic
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP, Windows Server 2003 and 2008 - Both 32 and 64 Bit installs.
0
Internet of Ransomware Things ...
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others. This conference is aimed mainly at government agencies. So it addresses the various compliance issues with which they have to deal.
2
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to thoroughly revise their security concepts.
9
 
LVL 55

Author Comment

by:McKnife
Comment Utility
Andrew, thanks for the feedback. I am aware that this article is mainly raising question while not answering many.
Maybe it's rather a starting point for discussions than sharing solutions.

You ask "So what's the solution? Shutting it all down..." which is the same that I ask in the article and I answer with "no" immediately afterwards.
You write "it's not quite fair to point blame on IT administrator's shoulders ...These guys more often than not work with tied hands" - that's exactly what I am saying. If the admin is not comfortable making his concerns heard, then he is not employed at the right place and should not fear to be replaced but leave on his own.

Before you start discussing - let's wait for other comments.
0
 
LVL 55

Author Comment

by:McKnife
Comment Utility
Some news that might be of interest for Americans: https://www.upguard.com/breaches/the-rnc-files
In short: US politicians payed for analysing voter opinions on US election-critical topics. Voter data (1,1 TB!) of 198 million Americans was uploaded to an amazon server but the access rights were incorrectly set - it was open to the public and the data was not encrypted. It leaked.
See what I am talking about?
0
Here's a look at newsworthy articles and community happenings during the last month.
3
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
1
Ready for our next Course of the Month? Here's what's on tap for June.
3
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
1
 
LVL 1

Expert Comment

by:Mihai Corbuleac
Comment Utility
Absolutely true! Backup is mandatory these days. I would recommend multiple backups (different hosts). The most common threat these days is indeed Ransomware and that's because it is very different from other types of viruses. Learn more about it and what you need to do to keep your data safe. Remember to always keep everything patched and updated!
0
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and protection.
1
Update Pic
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me is flawed and borders on irresponsible behavior!
9
 
LVL 1

Expert Comment

by:SpiderlinK
Comment Utility
Sometimes we will get "The update is not applicable to your computer" when updating the patches as well; so Wait a bit :)
0
 
LVL 10

Author Comment

by:Andrew Leniart
Comment Utility
Hi SpiderlinK, thank you for your comment.  I've found that failure to often be a result of being behind in issued Service Packs. A patch will often fail on a Service Pack 1 or 2 installation if a SP3 has been released.

Best..
0
What Is Transaction Monitoring and who needs it?
LVL 1
What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
1
 
LVL 28

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Andy,

I'm impressed with this article.  I like the way you tested it out. Extremely well thought out.  Some things you may woah to address:

1. Don't repeat the summary.  Summary was good, but repeating it (or copying the first paragraph) is not a great practice.
2. Remove the word "not" from the summary.
1
 
LVL 10

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for your comment and suggestions Thomas. Have taken them on board and removed the word "not" from the Summary as suggested.

Best...
0
Ransomware is a malware that is again in the list of security concerns. Not only for companies, but also for Government security and even at personal use. IT departments should be aware and have the right knowledge to how to fight it.
1
How to Avoid Ransomware Like the Plague it is
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
2
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
5
 
LVL 28

Author Comment

by:Thomas Zucker-Scharff
Comment Utility
@McKnife - Thanks I'll include it.  Is it okay if I give attribution to you?
0
Acronis ransomware attack
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
1
 
LVL 64

Expert Comment

by:btan
Comment Utility
1
Acronis laptop
Employees depend heavily on their PCs, and new threats like ransomware make it even more critical to protect their important data.
2
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
0
Acronis ransomware
A new Acronis survey shows people often have conflicting thoughts about data protection.
1
Life Of Pix
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques. This attack comes as a nightmare trifecta for email filtering services; sent from a familiar contact, using authentic tone and verbiage, and appearing to open to a valid Google URL. I
0
Retailers - Is your network secure?
Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Acronis Ransomware Trends
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
2
CC0 License
Some of you might know that emails by design have two types of sending and receiving addresses. Yes, you read that right – it’s not just the one you see on your email.

The first type of sending address is the envelope sender which is not visible to the user on their mail client or even in the headers. You can co-relate this with a physical letter, which after being put in an envelope has the address on the outside which is used by the courier to deliver the envelope to the intended destination. Similarly, the envelope sender is used for routing purposes on the Internet.

The second type of sending address is the header From address. This is the one you see displayed on your email or in the headers as From: address. In our metaphor, this would be the address you write on the letter itself. In real life, the envelope can be addressed to A and the letter can be addressed to B. Similarly, email does not require the envelope sender to match the header From address.

So the email that you see coming in from friend@yourdomain.com could easily be from hacker@bigbadwolf.com .

This is one of the ways the bad guys send out CEO Fraud emails or as termed by the FBI, ‘Business E-Mail Compromise’. The emails almost always originate from an external source. This means that the envelope sender is from an external domain but the header From address is spoofed to look like it is coming from your domain. There are very simple steps you can follow when using our email filtering to …
1
CC0 License
Choosing an appropriate provider for your company’s email security can be difficult as email security is a key element in the overall security of a business. A company’s email is an open door for malicious hackers who can potentially drive your business into the ground with one rogue email. There are a few options with regards to a solution but it all depends on picking the right fit for your business. This blog post is dedicated to the options businesses face when choosing their email security.


Appliance or Software Solutions - On Premise


Generally, the most popular choice for a company are appliance or software solutions. These appliances are great for focusing on certain aspects of email security such as data privacy and spam and virus protection. This option is also easy to install and not very expensive. However, these software solutions require a lot of  "hands on" updates which do not come with the benefits of realtime threat intelligence or the big data analysis that can be performed across the entire network of a cloud provider and can be quite slow to update. These appliances operate by themselves and require occasional attention from the beholder of the software.


Hosted Email Security - the OEM way


Another option businesses have are hosted email security services where the provider is simply hosting an appliance or application to take some management out of the customer’s hands. This option would be considered appealing as the customer …
0
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that Anti-Virus applications occasionally miss.
0
 
LVL 1

Expert Comment

by:agieryic
Comment Utility
I am an IT consultant and I also support the Malwarebytes premium 3.05 version. I've been testing a few chosen clients Windows 7 installations by upgrading version 2.22 version 3.05. Below are some of my notes that I emailed to Malwarebytes customer support. There are many similarities to the experiences as mentioned above in this post

I performed a full uninstall per directions provided below. Afterward, I used the mentioned Uninstaller tool and rebooted the PC
the PC is running Windows 7 professional

I then reinstalled the Malwarebytes version 3.05
-      updated the database
-      however, the malware protection module will not start. It just shows “starting”. So basically a malware protection is off.
- rebooted the PC again. The malware protection module started this time.
- On this PC and other PCs where I installed the Malwarebytes premium 3.05, it shows successfully installed and up-to-date  (whether it's a clean install or in in-place upgrade from version 2.2) - however,

 when I go to's perform a scan, I get a summary that says the scan was complete but it says zero item scanned in the timestamp is 00
- basically,  it says that it successfully ran a scan and completed - and it all happened in 100th of a second maybe I'm exaggerating)
but my point is, there are zero files scanned and zero for that timeframe

it is New Year's Eve holiday, I hope to get an answer after January 1, 2017
0
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
3

RansomwareSponsored by Webroot

60

Solutions

28

Articles & Videos

161

Contributors

Ransomware is malicious software, designed to block data access in order to extort money. As a form of malware, ransomware is most often used to infiltrate devices through infected emails or links that, in turn, recognize and take advantage of vulnerabilities in the operating system and installed third-party software.