What is BadRabbit Ransomware?

Posted by Gary Fleming on Oct 25, 2017 3:34:07 PM

The latest strain of ransomware “Bad Rabbit” began spreading across Russia and Ukraine yesterday, with 3 Russian websites, a Ukraine airport and underground system been hit. Since then, there have been various reports of “Bad Rabbit” infections in Turkey, Bulgaria, Japan, Germany, Poland, South Korea and the United States.  The U.S. Computer Emergency Readiness Team (US-CERT) which is run by the Department of Homeland Security, issued an alert about the ransomware worm but didn’t say whether any infections had been detected in the U.S or not. They have said it "discourages individuals and organisations from paying the ransom, as this does not guarantee that access will be restored".

How it works?

The Bad Rabbit ransomware enters networks when a user on your network runs a phony Adobe Flash Player installer posted on a hacked website, with the initial infections coming from a Russian news website. Other reports said websites based in Ireland, Denmark and Turkey have also been corrupted with the fake Flash installer and have been spreading the malware.

Once “Bad Rabbit” Ransomware has infected its first machine within a network, it then uses an opensource tool to find any login credentials stored on the machine, so it can spread to other machines. There are also some conflicting reports that BadRabbit uses the NSA’s EternalBlue tool, used by both NotPetya and the WannaCry Ransomware worm that spread in May, to spread through local networks.

Read More

Topics: Phishing, malware, Computer Viruses, Cyber Crime, Cyber Security

“Get Rich or Die Trying”: Lone Ranger Cyber Criminal responsible for over 4,000 attacks.

Posted by Gary Fleming on Aug 21, 2017 5:30:34 PM


A large spree of Cyber-attacks which aims to infect networks, steal information and commit fraud has impacted over 4,000 organisations globally in the past 4 months.  Some of the companies hit include leading international names in the banking, manufacturing, construction and oil and gas industries across Germany, Croatia, Abu Dhabi, Egypt, Kuwait and Dubai.

Attacks of this nature and scale tend to be accredited to cyber-criminal gangs, many of which are state funded with the aim of destabilising economies. However, in this case, this couldn’t be further from the truth. Researchers have discovered that these attacks are the work of a Nigerian man in his 20s who works on his own near the Nigerian capital. Funnily, on his personal Facebook page he uses the phrase, “Get Rich or Die Trying”.

Read More

Topics: Phishing, malware, Computer Viruses, Cyber Crime, Cyber Security

Mobile devices – the highway to email security hell?

Posted by Niall Mackey on Nov 12, 2015 3:16:42 PM

Remote working and BYOD policies have helped businesses develop new, flexible processes that better adjust to the ever-changing needs of their customers. For the CTO, enabling, provisioning and supporting a range of different devices is a huge headache, even if there are tangible benefits.

But have you fully considered all the security ramifications?

Read More

Topics: malware

£20 Million Stolen From UK Financial Institutions Due to IT Security Breach

Posted by Niall Mackey on Oct 15, 2015 1:17:00 PM

The National Crime Agency (NCA) is currently investigating a network of criminal IT activity based in Eastern Europe, who have stolen an estimated £20 million from businesses and individuals from the UK alone. The global figure of corruption is unknown at this time. The scam involved a strain of malware called “Dridex”, which infected computers when people opened documents from apparently legitimate emails, mainly affected Windows users.

Read More

Topics: malware

Ransomware: What It Is & How to Avoid It

Posted by Niall Mackey on Apr 13, 2015 11:30:00 AM

Among the several types of attacks that can be leveraged against your company’s IT framework, ransomware has the potential to be the costliest. Unlike some smaller types of viruses where the only damaging effect is to your peace of mind, ransomware takes internet hacking to a whole different level.

As you may expect, there’s a heavy price a pay for your actions if your computers are infected with ransomware. And the cost of clicking on a malicious link, opening an infected attachment or visiting a social network site can costs you upwards of 600. And that’s if you decide to comply with the hackers’ request.

In 2013, one of the major problems in the hacker world was the popular ransomware called CryptoLocker. The makers made away with about 3 million (USD) and through half a million infections. (You can read more about its effect here.)

However, let’s not get ahead of ourselves. We’ll start from the top.

Read More

Topics: IT Security, Cyber Crime, malware, Email Security, Ransomware

Keep Your Router Hacker-Proof with These Tips

Posted by Niall Mackey on Apr 1, 2015 8:25:29 PM

Running a business that requires much technology can be a pain if you’re not used to the security detail that must be done beforehand. Fortunately, if you have an IT team, this task can be much easier and stress-free. Not only do you have to focus on having the right state-of-the-art technology that suits your company’s needs, but one that also addresses your client’s concerns.

While you establish this infrastructure, it’s equally as important that the safety of your team is fully fortified. From your emails to data storage to passwords to encryption, each area could be a potential hotbed for criminals to compromise the safety of you, your clients and employees.

Read More

Topics: IT Security, Phishing, Cyber Crime, Spam, malware, Computer Viruses

What Is BadUSB? And Should I Be Scared?

Posted by Niall Mackey on Mar 9, 2015 11:30:00 AM

In the past several years, we’ve seen the USB port grow up like a child in his formative years. We’ve seen the progression from being reserved only for mice and keyboards to now being used for everything from charging to storing. However, as security experts, we’re not captivated by its use and growthwe’re concerned with its safety.

Read More

Topics: IT Security, Cyber Crime, malware, Computer Viruses

Malvertising & Your Business: Are You Protected?

Posted by Niall Mackey on Mar 5, 2015 3:00:00 PM

Keeping your employees and clients protected from online breaches shouldn't have to be a problem, but due to the rapidly-changing landscape of the internet, its importance is growing. You're probably familiar with malware and its negative impacts, but not too far behind that concept is malvertising.

Read More

Topics: IT Security, Cyber Crime, malware, Computer Viruses

The Ultimate "Cheat Sheet" on Email Filtering

Posted by Niall Mackey on Jan 26, 2015 9:39:00 PM

Topsec_Image_VIThe approximate number of email communications globally amounts to 144.8 billion per day. Spam and “junk” mail covers anywhere from 65% to 90% of that worldwide email volume. A corporate email system without an email filtering service would be almost impossible to use, especially for urgent, legitimate communications.

Read More

Topics: IT Security, Spam, Blockmail, malware

Five Signs That Malware Has Infected Your Computer

Posted by Niall Mackey on Dec 26, 2014 2:20:00 PM

Red_malware_buttonLike a giant thorn on the stem of a blooming red rose, computer viruses and other forms of malicious software not only annoy but also hurt our ever-increasing computer activity for professional communication, innovation, production, and progress.

Read More

Topics: malware