dSupportSuite, our White-Label Automated Maintenance app / Business Card with a Purpose (both the stand-alone and d7x bundled versions) as well as dSupportSuite Mgmt Console have been updated to include two new exciting features which are designed to make it easier to recover user files in the event of a ransomware infection: ShadowGuard has been incorporated. ShadowGuard prevents malicious software/ransomware from deleting your volume shadow copies, and can be configured to guard against VSSAdmin commands,...
ShadowGuard is a new app designed to detect when malware or ransomware is attempting to delete File Shadow Copies and take action. Typically ransomware will attempt to delete Shadow Copies of your files prior to encrypting, so you can’t restore them, but ShadowGuard can step in at this stage to stop it completely. Upon detection ShadowGuard will: Prevent the command from execution (Preserving your Shadow Copies) Terminate the application that initiated the command (This would be the...
Kraken 2.0 Ransomware decrypter… https://t.co/r10PJbDajFBased on the creator's logs the ransomware has hit around 500 victims. So if anyone is affected, please use the link above to restore your files.@demonslay335 @malwrhunterteam @BleepinComputer — Leo (@leotpsc) April 30, 2018
Sept 26th, 2017 Update: Yesterday this appeared on Bleeping Computer: Avast Publishes Full List of Companies Affected by CCleaner Second-Stage Malware https://www.bleepingcomputer.com/news/security/avast-publishes-full-list-of-companies-affected-by-ccleaner-second-stage-malware/ Bleeping also put out a nice article from the 22nd, containing a nice summary if you’re just catching up on the news (because of course more has emerged since our last update, and we shouldn’t just assume you read it elsewhere): Info on CCleaner Infections Lost Due To Malware Server Running Out of Disk Space...
NW.js, previously known as Node-WebKit, is a combination of WebKit and Node.js. Node.js allows JavaScript to access the underlying operating system in much the same way as traditional languages, like C. Unlike traditional WebKit browser implementations that prevent web applications from accessing the underlying OS, NW.js has no such limitations. NW.js is able to run on OS X, Windows, and Linux, making it comparable to other multi-OS frameworks, like .NET and Java. Normally, having a framework requirement...
Ho, Ho, Ho! d7 Premium is now was FREE, get yours NOW before we come to our senses! [Sorry, we did! OFFER HAS EXPIRED] www.d7xtech.com/getd7 < – – – – TELL YOUR FRIENDS! Merry Christmas to EVERYONE! Also, just in case you already have d7 Premium and didn’t know about our upgrade offer, we started promoting earlier this year that d7 Premium users who also have the old “dCloud” subscription, even the lifetime ones,...
For clarification on our previous post regarding the red X button: The article was about the red X because that’s what most people know, but it also applies to closing an application in any standard method not involving any actual force-terminate means. This includes the red X in the top right of the ‘window’ or form, the ALT+F4 keyboard combination, and also even by using the standard “End Task” option within Windows Task Manager!! See the...
This pic describes exactly why I recommend people NEVER use the form’s X button in the event of suspected adware, spyware, MALWARE, or any other random POP-UP… DO NOT DO IT. EDIT TO CLARIFY: This article is about the red X in the top right of the ‘window’ or form, but also includes other methods such as the ALT+F4 keyboard combination, and also even by using the standard “End Task” option within Windows Task Manager!! See the update at...
Lenovo rootkit binaries persisting via BIOS/Windows Platform Binary Table (WPBT) will make your systems vulnerable to any 3rd parties capable of intercepting your web traffic! Affected models with “patch” linked below – but I would investigate before using. I’ll be looking more into this soon. https://support.lenovo.com/us/en/product_security/lse_bios_notebook https://support.lenovo.com/us/en/product_security/lse_bios_desktop More Info: WPBT info (Microsoft, PDF download) Other Sources: http://firmwaresecurity.com/2015/08/11/lenovo-lse-wpbt-and-wpbbin-exe/
How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline backups; test backups to ensure that they can be restored from reliably. Use web and email protection to block access...