<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">

	<channel>
		<title><![CDATA[ICT Insight | Darwin Blog - Articles - Virus Infection]]></title>
		<link>https://www.itblog.com.au</link>
		<description><![CDATA[Technology blog site for Darwin and Northern Territory based companies to read about technology without all the heavy technical details. We aim to provide useful articles, advice and information to assist in working out where your business needs to be with Information Technology and Communications in the workplace. Topics that we will cover, SPAM, Exploits, Security, CCTV General IT, Cloud, Mobile Devices, Telephony, Communications, Software, Business Process and many more topics that you need to assist in developing your business.]]></description>
		<language>en-us</language>
		<copyright><![CDATA[https://www.itblog.com.au]]></copyright>
		<generator>N/A</generator>
		<webMaster>help@web365.com.au</webMaster>
		<lastBuildDate>Mon, 02 Mar 2020 20:28:18 ACST</lastBuildDate>
		<ttl>20</ttl>
		<item>
			<title><![CDATA[2018 Cyber Attack Trends from Webroot]]></title>
			<link>https://www.itblog.com.au/articles/21/1/2018-Cyber-Attack-Trends-from-Webroot/Page1.html</link>
			<description><![CDATA[<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Cybercriminals&nbsp;are finding new tactics and ways to infiltrate systems on a daily basis. When security professionals figure out one way to prevent a breach, the criminals have already found multiple new ways to circumvent the protocols in place. Staying on top of the latest threats and tactics is essential for any MSP that wants to make sure their clients are protected.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">With those realities in mind,&nbsp;<a href="https://www.webroot.com/us/en" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">Webroot</a>&nbsp;recently released its&nbsp;<a href="https://www-cdn.webroot.com/6515/2168/8585/Webroot_2018_Threat_Report_US.pdf" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">2018 Webroot Threat Report</a>. It presents analysis, findings, and insights from the Webroot Threat Research team on the state of cyber threats. The company claims that the report analyzed more than 27 billion URLs, 600 million domains, 4.3 billion IP addresses, 62 million mobile apps, 15 billion file behavior records, and 52 million connected servers.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">The report definitely shows that attackers are learning just as quickly as security professionals, and are finding new ways to breach networks. Some of the most common attacks were analyzed in the report, including polymorphic attacks, cryptojacking, ransomware, and phishing.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Polymorphic attacks</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">As security programs and professionals continue to learn how to find and detect malware, attackers are finding new ways to hide it. Polymorphic attacks can be especially difficult to combat because the signatures that can be used to identify it are constantly updating and changing. According to the report, more than 94% of all malicious executables are polymorphic. Supporting this claim is the fact that in 2017, 93% of the malware encountered was seen on only one machine, meaning the signature changed enough from machine to machine that each variant was only able to be detected once.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">The report claims that upgrading all business devices to Windows 10, which offers greater security than previous versions, is a great way to combat the spread of polymorphic attacks.&nbsp; According to the report, combined with advanced endpoint protection that uses behavioral analysis and machine learning, adopting Windows<br style="box-sizing: border-box;" />10 can greatly reduce enterprises&rsquo; vulnerability to cyberattacks.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Cyrptojacking</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">As a relatively new threat on the scene, crytpojacking is quickly becoming a very serious threat. Based on early reports, this threat is becoming quite popular because it is highly profitable and easy to implement. Instead of hijacking someone&rsquo;s files in exchange for money, like ransomware attacks, the attacker simply utilizes the victims CPU power to mine crytpocurrency. Since this form of attack is mostly invisible to the end user, the system could be compromised for quite some time before it is found.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Ransomware</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Although<span>&nbsp;</span><a href="https://www.channele2e.com/technology/security/ransomware-should-you-pay-the-ransom/" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">ransomware</a><span>&nbsp;</span>has been around for a while, it is still an extremely popular form of attack. Just last year we witnessed the most widespread ransomware attacks to date. WannaCry and NotPetya were both extremely destructive and together they were able to&nbsp;infect more than 200,000 machines in more than 100 countries, all within just 24 hours.</p>
<h3 style="box-sizing: border-box; font-family: sofia-pro, sans-serif; font-weight: bold; line-height: 1.1em; color: #555555; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">Phishing</h3>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">One of the<span>&nbsp;</span><a href="https://www.msspalert.com/cybersecurity-breaches-and-attacks/phishing/google-docs-gmail-phishing-attack-need-know/" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">most successful</a><span>&nbsp;</span>phishing attacks occurred&nbsp;during 2017. The email that claimed to be a Google Doc from a trusted contact claimed a lot of victims. The main reason it was so successful was that it was highly targeted, and used social engineering to convince the user the email was from a legitimate source. The report from Webroot also found that almost 25% of phishing sites used IP masking, which makes it more difficult to discern the actual IP address of the domain. Another common tactic is to use benign domain names and replace a single web page with phishing content. When inserted as a disconnected, isolated page (i.e. no pages on the site point to the phishing page, nor does the phishing page point to any other pages on the site), it is nearly impossible for crawlers to detect the phishing threat.</p>
<p style="box-sizing: border-box; line-height: 1.5em; margin: 0px 0px 1.5em; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;">There are several more insights into the latest threats and how to combat them within the report. You can<span>&nbsp;</span><a href="https://www-cdn.webroot.com/6515/2168/8585/Webroot_2018_Threat_Report_US.pdf" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">view the report</a>from Webroot on<span>&nbsp;</span><a href="https://www-cdn.webroot.com/6515/2168/8585/Webroot_2018_Threat_Report_US.pdf" style="box-sizing: border-box; background-color: transparent; color: #008d4a;">their website</a>. However, they recommend, not only making sure operating systems are completely up to date, but organizations should also be using automated, real-time decisionmaking based on continuously-updated threat intelligence, contextual analysis and advanced endpoint and network protection. When coupled with strong user security training, any organization can materially reduce its exposure to unacceptable risk, according to Webroot.</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sat, 14 Apr 2018 05:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/21/1/2018-Cyber-Attack-Trends-from-Webroot/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[Cryptolocker &amp; Ransomware]]></title>
			<link>https://www.itblog.com.au/articles/9/1/Cryptolocker-amp-Ransomware/Page1.html</link>
			<description><![CDATA[<p>Australians are paying thousands of dollars to overseas hackers to rid their computers of an unbreakable virus known as Cryptolocker.<br /><br />There has been a rise in the number of people falling victim to the latest version of an encryption virus which hijacks computer files and demands a ransom to restore them.<br /><br />The "ransomware" infects computers through programs and credible-looking emails, taking computer files and photographs hostage.<br /><br />Cryptolocker comes in a number of versions with the common delivery method being via Email.<br /><br />It can arrive in an email disguised as a speeding fine, Power &amp; Water Bill, Bank Statmetment and many more versions.&nbsp; Look for spelling &amp; grammar issues and if you are not sure of the validity delete the email and call the company purporting to be sending the details.</p>
<p>Once the application is launched it silently encrypts all the data and presents you with a Ransom Note demanding money typically in BitCoin.<br /><br />If it's on Bitcoin they can use it to purchase anything online from gold bullion, to shares, to property even and it's virtually untraceable and you have to buy it with cash.<br /><br />Many people have opted to pay rather than worry about trying to fix it as this is where you realise that your backups do not work.</p>
<p>The advice is to delete it unsure, contact the sender to verify but NEVER follow or click on the links.</p>
<p>Here&rsquo;s how to protect your data;<br /><br />Use an up-to-date antivirus with internet protection that helps you avoid fake emails and spam <br />Don&rsquo;t open suspicious emails or attachments from unverified sources.&nbsp; - Remember that banks, companies and agencies don&rsquo;t ask for personal information via email<br />Back important files up, either online or on external drives (and disconnect them when not backing up)<br />Make sure your operating system is updated and patched</p>
<p></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Fri, 09 Dec 2016 11:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/9/1/Cryptolocker-amp-Ransomware/Page1.html</guid>
		</item>
	</channel>
</rss>