A massive new global cyber-attack has struck with a similar reach to the WannaCry ransomware attack that infected more than 300,000 computers worldwide last month. The latest attack was initially thought to be a strain of the Petya Ransomware virus which hit last year, however it has now emerged that it is in fact a totally different strain which borrows some of the same code from Petya Ransomware. Therefor the latest ransomware attack is now being referred to as Not Petya, SortaPetya or Petna. It also includes code known as “Eternal Blue”, which is widely believed to have been stolen from the US National Security Agency (NSA) and was also used in last month’s WannaCry ransomware attack.
WannaCry is a crypto-ransomware that is also called WannaCrypt, it encrypts data files by appending .WCRY to the end of the file name and asks users to pay a US$300 ransom in bitcoins. According to the ransom note the payment amount will be doubled if the ransom isn’t paid within 3 days and the files will be deleted after 7 days if the payment is not made. WannaCry is not just a ransomware program, it is also a worm that gets into your computer and looks for other computers to try and spread itself as far and wide as possible. This variant of ransomware first emerged on Friday May 12th and affected over 200,000 users across 150 countries including many large organisations such as the NHS, Nissan, Hitachi, Renault, Telefonica, FedEx and Germany's rail network Deutsche Bahn.
According to a new report on the rise of ransomware, many SMEs are aware of the threat of ransomware, in fact 66% of respondents surveyed said that they believe the threat of ransomware is very serious and a further 68% admitted that their company was vulnerable to ransomware attacks. More worryingly, the awareness of the threat of ransomware is not transpiring into action as half of the organisations surveyed think that they are too small to be targeted.
Microsoft have altered the behaviour of the Exchange Frontend Transport service on Exchange 2013 and 2016 so that it no longer rejects invalid recipients after they are specified. Instead the rejection is performed after the DATA command has been issued. This breaks Dynamic Recipient Verification in some 3rd party systems. To work around this, access must be given to the Default Hub Transport connector which is still SMTP compliant, and rejects invalid recipients after they are specified using the RCPT TO command. By default, the Default Hub Transport connector is accessed on port 2525
See below our 7 steps on how to enable Mail Box Recipient Verification to ensure your Exchange environment in not accepting emails to mail boxes that do not exist.
Every now and then you will find that a legitimate business mail is flagged as spam and placed into quarantine, well out of harm’s way. Almost inevitably the missing message will be something extremely important – the sign off on a new contract, an important bill, crucial project details etc.
And for many users, having a legitimate email blocked is more frustrating than having to weed out genuine spam from their inboxes.
Although you realise spam presents a large financial burden to your business, it is often difficult to convince other stakeholders of just how big a problem it is. Many will assume that it is simply a personal irritation, or one of the less enjoyable aspects of network management.
Why? Because often the only common language between business units is finance. If you cannot put a euro value on the effect of spam, other executives will not grasp why investment in anti-spam technologies is so important.
So how do you go about calculating the annual cost of spam to your business?
When talking about email security, most businesses only consider how to protect against malware and spam entering their network. But the reality is that responsible businesses also need to consider scanning their outgoing messages too.
Running a business that requires much technology can be a pain if you’re not used to the security detail that must be done beforehand. Fortunately, if you have an IT team, this task can be much easier and stress-free. Not only do you have to focus on having the right state-of-the-art technology that suits your company’s needs, but one that also addresses your client’s concerns.
While you establish this infrastructure, it’s equally as important that the safety of your team is fully fortified. From your emails to data storage to passwords to encryption, each area could be a potential hotbed for criminals to compromise the safety of you, your clients and employees.
A team of cyber scammers recently took their game to a whole new level. They no longer mainly target individuals in their phishing and cyber extortion schemes. In the last fourteen months, cyber thieves stole about $215 million from large and small companies through a sophisticated Business E-mail Compromise (BEC) scam.
The approximate number of email communications globally amounts to 144.8 billion per day. Spam and “junk” mail covers anywhere from 65% to 90% of that worldwide email volume. A corporate email system without an email filtering service would be almost impossible to use, especially for urgent, legitimate communications.