Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Malware (Page 1 of 7)

Auto Added by WPeMatico

Free decryption tool to remove REvil ransomware is available

One of the worst types of malicious software that computer users worldwide are plagued with is ransomware. This type of malware encrypts the contents of the user’s computer in an attempt to force the PC owner to pay a ransom to decrypt their hard drive. Anyone impacted by the REvil ransomware can decrypt their machine for free with a master … Continue reading

Source: https://www.slashgear.com/free-decryption-tool-to-remove-revil-ransomware-is-available-17691271/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Satsuki Then

A Complete Guide to Not Getting Hacked

dc07161d07fda46b61d1e9afd243cc30.jpg

As safe as you might feel sitting at your laptop, happily typing and posting and scrolling, we all know the truth: the internet is actually a giant hellscape full of spies, criminals, ransomware, and all kinds of other dangerous shit.

Read more…

Source: https://gizmodo.com/a-complete-guide-to-not-getting-hacked-1847400695
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Lucas Ropek

Android FlyTrap Trojan malware aims to take over Facebook accounts

Malware is a common problem for computer and mobile device users. Malware can target various assets of the target device, including social media accounts, banking information, and credit card information, among other data. A new Android Trojan malware called FlyTrap has impacted Android users in at least 140 countries since it was first seen in March. According to security research … Continue reading

Source: https://www.slashgear.com/android-flytrap-trojan-malware-aims-to-take-over-facebook-accounts-11686190/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Satsuki Then

Critical Cobalt Strike bug leaves botnet servers vulnerable to takedown

You did a bad bad thing.

Enlarge / You did a bad bad thing. (credit: Getty Images)

Governments, vigilantes, and criminal hackers have a new way to disrupt botnets running the widely used attack software Cobalt Strike, courtesy of research published on Wednesday.

Cobalt Strike is a legitimate security tool used by penetration testers to emulate malicious activity in a network. Over the past few years, malicious hackers—working on behalf of a nation-state or in search of profit—have increasingly embraced the software. For both defender and attacker, Cobalt Strike provides a soup-to-nuts collection of software packages that allow infected computers and attacker servers to interact in highly customizable ways.

The main components of the security tool are the Cobalt Strike client—also known as a Beacon—and the Cobalt Strike team server, which sends commands to infected computers and receives the data they exfiltrate. An attacker starts by spinning up a machine running Team Server that has been configured to use specific “malleability” customizations, such as how often the client is to report to the server or specific data to periodically send.

Read 11 remaining paragraphs | Comments

index?i=aDwsn33khug:JLLa6ZeGIck:V_sGLiPB index?i=aDwsn33khug:JLLa6ZeGIck:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA

Source: https://arstechnica.com/gadgets/2021/08/critical-cobalt-strike-bug-leaves-botnet-servers-vulnerable-to-takedown/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dan Goodin

PSA: Some Windows 11 “Installers” Are Malware, Here’s How to Safely Download the New OS

Windows 11 looking particularly dark and grim.Windows

Those who want early access to Windows 11 may try to find the new OS’ installer through a quick Google search. Yeah, you shouldn’t do that! Antivirus company Kaspersky reports that it’s saved “several hundred” customers from fake Windows 11 installers, which are really just malware. If you really need Windows 11 today, you must download it through official channels—and it’s very easy to do so!

As explained by Kaspersky, fake Windows 11 installers are just .exe files with official-looking license agreements and installation wizards. Microsoft will never distribute this OS (or any OS firmware updates, for that matter) through an executable file. You can only upgrade Windows 10 to Windows 11 through the “Updates & Security” panel in your Settings.

The malicious Windows 11 "installer."Kaspersky

So, how do you safely install Windows 11? I suggest reading our detailed guide at How-To Geek, but here’s the short of it—go to the Windows Insider website and click “Register.” After you breeze through some agreements, open your Windows 10 PC’s Settings and click “Updates & Security,” then select “Windows Insider Program” in the sidebar. Press the “Get Started” button, choose the “Dev Channel” as your Insider Setting, then go back to “Updates & Security” to install Windows 11.

Bear in mind that some computers cannot install Windows 11 due to the OS’ hardware requirements. Unfortunately, Microsoft disabled its compatibility-checking tool, so unless you want to read the requirements the old-fashioned way, your best bet is to go through the installation process listed above and hope that it works. “Updates & Security” will tell you (during the last step) if your computer isn’t up to scuff.

If you’re still having trouble with the Windows 11 Insider preview, just wait a few months for the OS’ official launch. Most of Windows 11’s most interesting features are still missing from the Insider preview, so it’s not worth fussing about. Plus, when Windows 11 comes out, Microsoft will nag you literally every day until you install it.

Source: Kaspersky via Windows Central

Source: https://www.reviewgeek.com/93184/psa-some-windows-11-installers-are-malware-heres-how-to-safely-download-the-new-os/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Andrew Heinzman

An explosive spyware report shows limits of iOS, Android security

A report this week indicates that the problem of high-caliber spyware is far more widespread than previously feared.

Enlarge / A report this week indicates that the problem of high-caliber spyware is far more widespread than previously feared. (credit: Pau Barrena | Getty Images)

The shadowy world of private spyware has long caused alarm in cybersecurity circles, as authoritarian governments have repeatedly been caught targeting the smartphones of activists, journalists, and political rivals with malware purchased from unscrupulous brokers. The surveillance tools these companies provide frequently target iOS and Android, which have seemingly been unable to keep up with the threat. But a new report suggests the scale of the problem is far greater than feared—and has placed added pressure on mobile tech makers, particularly Apple, from security researchers seeking remedies.

This week, an international group of researchers and journalists from Amnesty International, Forbidden Stories, and more than a dozen other organizations published forensic evidence that a number of governments worldwide—including Hungary, India, Mexico, Morocco, Saudi Arabia, and the United Arab Emirates—may be customers of the notorious Israeli spyware vendor NSO Group. The researchers studied a leaked list of 50,000 phone numbers associated with activists, journalists, executives, and politicians who were all potential surveillance targets. They also looked specifically at 37 devices infected with, or targeted by, NSO’s invasive Pegasus spyware. They even created a tool so you can check whether your iPhone has been compromised.

Read 23 remaining paragraphs | Comments

index?i=YaYpvQqnVUA:HvaL4tc4yaY:V_sGLiPB index?i=YaYpvQqnVUA:HvaL4tc4yaY:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA

Source: https://arstechnica.com/information-technology/2021/07/an-explosive-spyware-report-shows-limits-of-ios-android-security/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: WIRED

One of the Most Prolific Ransomware Viruses Can Now Be Unlocked Easily

625ff54d.png
Kaseya, an IT management software firm, says that it’s obtained the REvil universal decryption key through a “trusted third party.” This should help Kaseya recover data from a July 4th REvil ransomware attack that affected over 1,500 businesses.

Read This Article on Review Geek ›

Source: https://www.reviewgeek.com/93021/one-of-the-most-prolific-ransomware-viruses-can-now-be-unlocked-easily/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Andrew Heinzman

Military-grade spyware found on journalists and activists’ phones: report

ca_camousingsmartphone_istock.jpg

Military-grade spyware licensed by an Israeli firm was used in attempts to hack into smartphones belonging to journalists and activists, according to a new …

Source: https://thehill.com/policy/technology/563600-military-grade-spyware-found-on-journalists-and-activists-phones-report
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Mychael Schnell

How to Update Windows Right Now to Fix PrintNightmare | Digital Trends

Run Windows Update and Reboot to make sure the latest patches are installed.

No matter what version of Windows you are running, you need to update NOW. If you are truly paranoid, shutdown your Print Spooler service, and set it to Manual start. You’ll need to start it to print to a network printer, but you will protect your system and network from this serious threat. Check out the article from Digital Trends below.

To Our Customers: If your servers are managed by Proactive Computing, they are already protected from the PrintNightmare threat. But please follow the instructions below to update your Windows PCs and Laptops today.

How to Update Windows Right Now to Fix PrintNightmare | Digital Trends https://www.digitaltrends.com/computing/how-to-fix-print-nightmare-on-windows-right-now/

Microsoft Is Rolling Out an Emergency Windows Patch For a Critical Vulnerability

red-windows-10-logo.png?width=600&height
There’s a new vulnerability in Windows 10 called “PrintNightmare.” It was revealed in early July 2021, and Microsoft is already rolling out an emergency security update to fix the problem. You should update as soon as you can.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/739829/microsoft-is-rolling-out-an-emergency-windows-patch-for-a-critical-vulnerability/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Joe Fedewa

« Older posts