virus

now browsing by tag

 
 

2,000 #computers were #shut down due to #SamSam virus #attack to #Colorado Department of #Transportation

Source: National Cyber Security News

On Wednesday morning the workday in Colorado Department of Transportation (CDOT) was disturbed. The institution went back to good old days when computers were not existing due to SamSam ransomware virus attack.

On February 22, the file-encrypting virus hit CDOT’s computers, encrypted files and demanded to pay the ransom in Bitcoins. More than 2,000 computers were shut down to stop and investigate the attack.

According to the CDOT spokeswoman, the version of SamSam ransomware hit only Windows OS computers even though they were secured by McAfee antivirus. However, CDOT and security software providers are working on virus elimination.

Fortunately, Colorado Department of Transportation has all data backed up. Therefore, they are not going to pay the ransom and crooks attempts to blackmail the institution did not succeed.

Meanwhile, employees are forbidden from accessing the Internet until the problem is solved. Ransomware did not affect any critical services, such as cameras, alerts on traffics or variable message boards.

Authors of SamSam ransomware already received money from victims in 2018
SamSam ransomware is known for a while. Numerous versions of malware hit hospitals and other institutions last year. Colorado Department of Transportation is not the first organization that was in the target eye of the ransomware creators this year too.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Billings cyber security businesses getting busier in the wake of global WannaCry virus

A cyber attack that spread ransomware across the globe managed to disable computer networks and strike panic in private businesses and government agencies. But by one measure, the WannaCry attack was a dud. The perpetrators of the virus — some are pointing fingers at hackers in North Korea — demanded that their victims pay ransom […] View full post on National Cyber Security Ventures

Held hostage by hackers – latest computer virus infecting the valley

Source: National Cyber Security – Produced By Gregory Evans

Held hostage by hackers – latest computer virus infecting the valley

GRAND FORKS, ND (WDAZ-TV) – Held hostage by hackers – local businesses, even some residents, are under attack, but you can protect your home or business from ransomware.
A manager of a business in our area says one of his

The post Held hostage by hackers – latest computer virus infecting the valley appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Computer hackers target Saudi Arabia in series of virus attacks

cyber-security-1

Source: National Cyber Security – Produced By Gregory Evans

Computer hackers target Saudi Arabia in series of virus attacks

Hackers have reportedly conducted a series of attacks on Saudi Arabia, targeting the agency running the country’s airports and hitting five additional targets.
Bloomberg reported on Thursday that the attacks took place over the last two weeks, citing two people

The post Computer hackers target Saudi Arabia in series of virus attacks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

VB2016 – the 26th Virus Bulletin International Conference

VB2016-dates-web

Source: National Cyber Security – Produced By Gregory Evans

VB2016 takes place 5-7 October 2016 at the Hyatt Regency Denver Hotel in Denver, CO, USA. Why you should attend The VB Conference is an annual event at which the brains of IT security from around the world gather to learn, debate, pass on their knowledge and move the industry forward. The event provides three […]

The post VB2016 – the 26th Virus Bulletin International Conference appeared first on National Cyber Security.

View full post on National Cyber Security

Next-gen virus found and This is how it works

images

An unusual strain of virus-like hacker software that exploits computer server vulnerabilities without requiring human interaction is a leading example of a new generation of “ransomware,” according to a new report by Cisco Systems Inc.
Hackers use such software to target large-scale networks and hold data hostage in exchange for bigger payments. Such a strain, known as Samas or samsam, hit the MedStar Health Inc. hospital chain in the US last month.
In such attacks, hackers target backup files and records, encrypting them to make them unreadable. To regain access, users without additional safe backups who don’t want to lose critical files often pay the ransom, typically $10,000 to $15,000 for an entire network or hundreds of dollars for a single computer.
The ability to demand payment in bitcoin, a difficult-to-trace virtual currency not controlled by any country, was “basically the birth of ransomware” and has helped drive its success since the currency’s introduction in 2009, said Craig Williams, a senior technical leader at Cisco’s Talos security research group.
Samas exploits vulnerabilities giving hackers a way into JBoss application servers that are frequently used by some of the largest corporations. Once inside, the hackers sometimes implant a tool that steals credentials, allowing it to spread through the system, and encrypt scores of digital files along the way.
Ransomware has become a new targeted attack, with thousands of variants emerging over the last six months, said Dmitri Alperovitch, co-founder and chief technology officer of Crowdstrike Inc.
Most ransomware still requires a human to click a link or open an infected email attachment, but Cisco’s report warned that “the age of self-propagating ransomware, or cryptoworms, is right around the corner.” Worms are generally virus-like infections that are programmed to spread automatically, without human interaction.
Ransomware has become an increasing threat over the last six months. Last year’s 2,453 reports of ransomware hackings to the FBI totaled a reported loss of $24.1 million, making up nearly one-third of the complaints over the past decade. They also represented 41% of the $57.6 million in reported losses since 2005.
Such losses are significantly higher than any paid ransoms because companies routinely include remediation costs, lost productivity, legal fees and sometimes even the price of lost data in their estimates.
Source:http://timesofindia.indiatimes.com/tech/tech-news/Next-gen-virus-found-Heres-how-it-works/articleshow/51781564.cms

Related Post

The post Next-gen virus found and This is how it works appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com

Keeping Your Server Virus & DDOS Free

Source: National Cyber Security – Produced By Gregory Evans

HOW TO KEEP YOUR SERVER VIRUS FREE AND PROTECTED FROM DDOS ATTACKS Keeping your server safe and secure is extremely important in order to preserve the integrity of the data or applications that are running on the system. In addition having a fully secured environment will ensure that the server is always fully functioning and online. Aside from hardware failure the most common type of issue that a server can face is a security breach of some description. This security breech could come in the form of a virus, denial of service attack or simply an intrusion by a malicious third party. Any of these scenarios could be potentially disastrous and could lead to loss or corruption of data as well as system downtime whilst the damages are repaired and the server secured. Having a solid security plan in place can help to minimise the risk of these scenarios from occurring. KEEPING YOUR SERVER VIRUS FREE Keeping your server virus free is relatively easy as long as you are following bets practices when it comes to security. Having an antivirus program installed on your server is the most obvious step and will go a long way towards protecting your system. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Keeping Your Server Virus & DDOS Free appeared first on National Cyber Security.

View full post on National Cyber Security

Crime-scene technology adapted for mosquitoes to predict Ross River Virus outbreak

Source: National Cyber Security – Produced By Gregory Evans

The suspects are bloodthirsty and remorseless, but no more so than the general population. The challenge for investigators is distinguishing from about 300 species of mosquito the dozen or so that present a present danger to humans. Cutting-edge technology developed for investigating crime scenes is now being adapted for mosquitoes, in a bid to contain the health risks posed by those carrying viruses. Last summer was the worst on record for Ross River virus outbreaks, mostly in northern NSW and Queensland, and it took health authorities by surprise. NSW Health Pathology mosquito researcher Cameron Webb is collaborating with interstate colleagues on a process of barcoding the DNA of mosquitoes. Their goal is to identify which species are most likely to cause disease. “We’re trying to learn from what happened last summer, so in the years to come we’re better able to predict when these outbreaks might occur,” Dr Webb said. Thirty councils around the state are sending weekly mosquito samples to NSW Health under the arbovirus surveillance program. They are caught in carbon dioxide traps, which trick mosquitoes into believing a warm-blooded animal is nearby. After identifying the species under a microscope, scientists mash some with a mortar and pestle […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Crime-scene technology adapted for mosquitoes to predict Ross River Virus outbreak appeared first on National Cyber Security.

View full post on National Cyber Security

Hamza Bendelladj NOT Sentenced to Death for SpyEye Virus

Source: National Cyber Security – Produced By Gregory Evans

No, contrary to a sudden flurry of loosely-sourced articles in the hacker and Muslim press, Hamza Bendelladj aka Bx1, spammer and co-creator of the SpyEye virus, has not been sentenced to death by a US jury. In fact, he hasn’t been sentenced at all. And he’ll never stand in front of a jury, having already pled guilty. Here’s an example of the hysterical outcry, from an article calling him a “Muslim HERO!” News of the execution of the Algerian hacker, Hamza Bendeladj [sic], by the US authorities sparked a large controversy on social media, as some activists launched a campaign of support and solidarity “We are all Hamza”, in which they called on the authorities to mediate for saving the life of “Algeria’s genius”, who stunned the world through hacking Israeli websites and banks, and offers their funds to the Palestinian people.   Funds which he and his SpyEye trojan took from victims all over the world. The US ambassador to Algeria has taken to Twitter to beat back the death sentence allegations, stating that none of the crimes with which he’s been charged are punishable by death, and that his sentencing will be later this year. And this one […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hamza Bendelladj NOT Sentenced to Death for SpyEye Virus appeared first on National Cyber Security.

View full post on National Cyber Security