Showing posts with label IT consulting. Show all posts
Showing posts with label IT consulting. Show all posts

Tuesday, September 22, 2020

Who Is Taking Care of Your Network Security?

managed IT services

Regardless of the business size, whether it’s a big financial firm with more than 500 employees or a small health care office that’s comprised of only 32 personnel, network security is a significant concern, which constantly grows as enterprises start to realize the risks of running unprotected networks. That's why managed IT services are becoming increasingly popular. 

Doug, The Nephew Of The Owner’s Brother-In-Law 

If businesses begin, they usually save money with the help of a person or a small firm offering IT services to create their first network. This person, in some cases a relative or a friend of a friend, takes a Cat-5 Ethernet cable and links it to a wireless router then to a cable modem. He then ensures that the laptops and desktops could connect to one another and whenever the need comes up, goes to the office to key in the network security key right into the new devices. Even if Doug means really well, office management may probably be his side job or he may not have enough time to stay updated about the many different security threats or even update the firmware of the router when required.  

Off-The-Shelf Security Product Maybe your office manager noticed a product on the store shelf in the office and believed it would be a wonderful idea to have it installed on your business network. It may provide features like Trojan horse /virus scanning, threat scan, or a software firewall to protect the specific device where the program has been installed. Maybe an executive assistant told you a story regarding something she can download, install, and protect against various online threats. Individual mobile devices or computers can still get the protection they need from off the shelf solutions. However, they don’t know your network, topology, switches, routers, as well as other connecting devices. Off the shelf solutions work passively, needing somebody to set off the scans and to make the needed updated to the threat signatures as well as software once somebody thinks of it. 

Eastern European Crime Syndicate 

Someone, somewhere, at some point may have already scanned your business network. Curious kids and even malicious actors tend to probe computer networks to look for open ports and anything they can find about private and public networks as well as their discovered vulnerabilities. Cybercriminals will then use this data for targeted attacks. These data breaches may use your business network as the main source for launching DOS or denial of service attacks on a particular target. These later attacks, on the other hand, may breach your business network for billing or client information. Nobody wants this to happen. You surely wouldn’t want some script kid or an Eastern European crime syndicate to be watching your network.

 

Let SpartanTec, Inc. Watch Your Network Security


SpartanTec, Inc., with its reliable managed IT services Wilmington NC has a proven track record when it comes to helping businesses of all sizes when it comes to their IT needs. With our IT outsourcing services, you will be confident with your answer once someone asks you the question, “who is watching your network security?” Our IT consulting services take into account your needs, the nature of your business, and your existing network when building flexible solutions that will monitor for online threats proactively. Our team of IT experts are always updated about the latest products and technologies to provide the most current and the best solutions so you can do your business securely.

 

Call SpartanTec, Inc. now and let us help protect your business from online threats while making sure that your business operations run as smoothly as possible.


SpartanTec, Inc.
Myrtle Beach, SC 29577
(843) 420-9760
https://www.spartantec.com/

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255
http://manageditserviceswilmington.com

Serving: Myrtle Beach, North Myrtle Beach, Columbia, Wilmington, Fayetteville, Florence


Wednesday, September 16, 2020

6 Reasons Why Your Business Should Outsource IT

Listed here are some of the benefits of IT outsourcing. In the past, your IT department may have been confined in your building’s basement or in a back office. There may have been times when your IT team have asked you to restart your computer in order to fix the problem. These brainiacs most likely had the worst pay, worst hours, and worst office.
In worst cases, they may be treated with hostility and that’s why they would rather get their job done as fast as they can so they could go home as quietly as they could. IT appeared to be totally complicated, inaccessible, and remote. But others didn’t know is that they had all these secret knowledge and power – that having your network and computer systems work seamlessly is one of the reasons that could help your company succeed.

Importance of IT Outsourcing

Slowly, IT services became the focus of the healthcare industry, the government, the free market, the hackers, and the C-suite. IT departments suddenly had an available budget. Not only that, they were also provided with means to turn the usefulness of their department around. They took the spotlight after CEOs realized that their IT department can improve their bottom line.
This implied that you had to look beyond the constraints of the abilities of your IT department and finding useful tools somewhere else. After all, every new software and hardware deployment, including domain and cloud migration, malware protection, may take weeks to implement across your business manually. Plus, it rarely goes smoothly.
The question now is how can a CIO combine the knowledge base possessed by his internal IT guys while remaining abreast of the never ending enhancements in this particular field? Aside from that concern, there’s a need to look for a cost effective method to implement these improvements but continue to maintain the security of their patient data.
Managed IT services is one solution. Over the past few years, IT outsourcing Wilmington NC has finally found much greater acceptance as more and more companies realized the importance of the benefits of IT consulting. Reports show that 74% of companies use some kind of outsourced IT service. IT outsourcing is now more than just web development.


Benefits of IT Outsourcing

Improved Security and Monitoring
Being updated with the technology needed to protect your company is time consuming and expensive. Professional outsourced IT consulting providers work with several clients in different industries and they need to be up to date of the best practices in the industry. A reliable managed IT services provider will be serious when it comes to security against online intrusions like zero day hacks and malware. It is their job to always check and update their cybersecurity measures.
Focus On Core Activities
Regardless of how big your company is, you shouldn’t be dealing with every little IT concern. For firms that depend on inhouse IT consulting, the management team ends up making technical decisions or fixing basic IT issues that may even result into halting business operations. With IT outsourcing, you and your staff can focus on your core tasks.
Stay Updated With New Technologies
No single employee can stay updated with all of the latest technological advancements. Automation and innovation are the pillars of the IT technology. The problem is that no one employee can become an expert on the different IT fields. With IT outsourcing, your company will be able to access a pool resources from your selected vendor like SpartanTec, Inc.
Reducing Cost and Overhead
With everything moving online these days, it’s no surprise that IT spending will increase. This means the amount you will spend on protecting your company and client data will be more than the amount you spent five years ago. But, managed IT services will help drive down other costs. For example, you don’t have to pay high electricity bills because you no longer have to keep the server room cool. Since your IT will be outsourced, you can free up some much needed space, which you can use for other important purposes.
Don’t Forget The Cloud
You’ll also enjoy a lot of benefits if you move your data center to the cloud. It keeps your data secure. It replicates data 24/7, which means you don’t have to worry if an outage happens. Cloud space is also scalable. Plus, using public cloud software and infrastructure can significantly boost the agility of your business and help your company grow.
Continuity
Managed IT services offer a level of continuity to your business will cutting back on the risk that a subpar level of operation will bring to your company. There’s also no need to hire more staff to operate the new services that are added to your IT platform. You just have to get in touch with your managed IT service provider if you want more storage, processors, or memory.

Call SpartanTec, Inc. now if you have finally decided that you want to outsource your IT.


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255
http://manageditserviceswilmington.com

Tuesday, January 21, 2020

New Updates To This Malware Made It More Dangerous


If you haven't yet heard of a malware strain called 'Predator the Thief', it's something that belongs on your radar.

It first emerged as a threat in July of 2018, when it was used in conjunction with an extensive phishing campaign.

In its original incarnation, it proved more than capable of stealing passwords, browser data, user names and the contents of cryptocurrency wallets. In addition, it was able to access the infected victim's webcam and take pictures with it, sending everything to a command and control server.

Unfortunately, the group behind the malware has been busy updating it. It's recently been spotted in the wild with a new set of enhanced capabilities that make it more difficult for antivirus programs to detect its presence.

In addition to that, the hackers have upped their game on the phishing campaign front. This included adding new documents to use as lures to hook the victim into inadvertently installing the malicious code.

The new and improved version of the malware was discovered by Fortiguard Labs, and apparently version 3.3.4 was released on Christmas Eve, 2019.

Although there's no clear indication as to who is behind the code, a forensic analysis reveals it to be Russian in origin. Fortiguard's researchers reached this conclusion based on the fact that the malware is specifically designed not to operate in Armenia, Belarus, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, Turkmenistan, Ukraine or Uzbekistan. Those are countries that Russian hackers tend not to target as a rule.

In terms of minimizing the threat that Predator the Thief poses, Fortiguard's researchers recommend ensuring that macros are disabled by default and that all software (including OS software) is fully patched and up to date. These are, of course, sensible precautions to take when protecting against any threat, so it makes for good advice in general. Stay on your guard. It's dangerous out there.


Call SpartanTec, Inc. in Wilmington if you need the expertise of IT professionals in making sure that your network is protected against malware and other possible online threats. 


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255


Cities Served:
Wilmington, Silver Lake, Sea Breeze, Carolina Beach, Eagle Island, Leland, Wrightsboro



Thursday, January 2, 2020

New Ransomware Threatens To Release Stolen Data To Public

The leaders of the ransomware known as Sodinokibi (REvil Ransomware) have announced a nasty new tactic to get their victims to pay up when their files get encrypted.

The hackers are now threatening that they'll begin releasing stolen data to the general public or to competitors unless the ransom is paid.

While hackers have made this threat in the past, this year was the first time in history that anyone has followed through with it. At the end of November of this year, when Allied Universal was successfully attacked, they were given the ultimatum to pay up or see their files released. The company didn't pay, and the hackers promptly released more than 700MB of data on a hacking forum on the Dark Web.

Given this new reality, it raises some thorny questions. Should IT professionals begin treating ransomware attacks as data breaches? Possibly so, but doing so complicates matters. Right now, ransomware attacks are treated as a purely internal problem. Customers and vendors aren't necessarily contacted and formal disclosures don't have to be made as to the scope and scale of the data impacted.

If hackers start regularly releasing the files they encrypt, it puts a lot of information at risk. Information that includes sensitive data, personal information, salary information, termination letters, details on relationships with third parties, trade secrets, and a host of other sensitive, proprietary data. It is all at risk of public exposure. It will not only increase public concern but could easily lead to lawsuits. That is especially if the company falling victim to a ransomware attack fails to report it as a breach and the data is subsequently leaked.

It's too soon to say whether or not this is or will become the new normal, but before it happens to you, it bears thinking about how your company will handle the issue.

Don't put your client's information and your business data at risk. Call SpartanTec, Inc. in Wilmington now.


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255



Cities Served:
Wilmington, Silver Lake, Sea Breeze, Carolina Beach, Eagle Island, Leland, Wrightsboro

Tuesday, November 19, 2019

Racoon Stealer Malware Is New One To Watch For

There is a new form of malware that you and your staff need to be aware of. That's because it's gaining in popularity among cyber criminals around the world.  Known as 'Racoon Stealer,' it is noteworthy not for its complexity but rather, for its extreme ease of use.  Worse, the malware's designers have been marketing it aggressively both inside and out of the Dark Web, which is driving rampant adoption rates.

Racoon Stealer was first spotted in the wild in April of 2019.  It's a Trojan virus that's relatively simple in its construction, but quite adept at collecting password information and sending it back to whomever launched it.

The Senior Director of Threat Hunting at Cybereason, Assaf Dahan, had this to say about the emerging threat:

"Raccoon, like other information stealers, poses significant risks to individuals and organizations alike.  Any malware that is designed to steal passwords and personal information from browsers and mail clients could potentially inflict great damage to its victims.

The stolen data is being sold to the highest bidder in the underground community and can be used in many ways--from identity theft, financial theft or even as an entry vector to penetrate an organization and in order to carry out a larger attack."

In addition to the general hype created by the marketing campaign, the group behind Raccoon provides its criminal user base with more tools. These include an easy-to-use backend, hosting, and dedicated 'round the clock support, all for $200 a month.  The data that this little piece of code can obtain can easily generate high amounts of income for the hacker. That makes it a fantastic investment for the criminal underground, which explains the malware's explosive growth and spread.

In any case, be sure your IT staff is aware, and be on your guard.  It looks like Raccoon is here to stay.

Keep your passwords, personal and company information secure from all kinds of online threats. Call SpartanTec, Inc. in Wilmington and let our team help set up the most effective strategy to improve your cybersecurity. 



SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Monday, November 11, 2019

Discord Users Be Careful Of Malware And Information Theft

Do you use the Discord chat service?

If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it as a command and control server.

In addition, they are abusing the chat client to force it to perform a variety of malicious behavior.
Unfortunately, this is not a new problem.  Anyone familiar with the chat service knows that it has a long history of being abused.  Although designed primarily as a chat service, Discord also allows its members to use a chat channel where other users can download them.

Users can even right click on a hosted file to get a sharable download link. This is, in practice, one of the ways that hackers are abusing the system.  Of significance, these sharable links work even for non-Discord users, which gives malicious actors a convenient place to stash harmful files to be spread far and wide via email campaigns.

Even more interesting is the fact that the uploader can delete the file inside Discord itself, but the URL can still be used to download it.  This means that although the chat service gives the outward appearance of deleting the file, it still exists on the server. That gives malware developers an incredibly convenient, completely anonymous method of hosting their files.

In addition to that, Discord contains a feature called 'Webhooks' that allow third-party applications or websites to send messages to a Discord channel.  When a user creases a Webhook, the server owner will be given a special URL that is used with the Discord API to send messages to a specified channel.  In this case though, if a user has been previously infected by a hacker's malware, this service can be used to exfil collected data directly to the attacker.

All this to say, if you use Discord, beware.  To say that the chat service has problems is an
understatement.

Call SpartanTec, Inc. in Wilmington and let our team set up layers of protection for your computers and networks. 


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Tuesday, October 29, 2019

RobbinHood Ransomware Another Reason To Back Up Your Systems


The creators of the dreaded 'Robbinhood' ransomware strain are putting their reputation to work for them.  The hackers have recently modified their ransom note in a couple of important ways.

First and foremost, they stress that there's no public decryption tool currently available to recover files encrypted by RobbinHood and that they are monitoring the situation to make sure that the company impacted by the malware does not contact law enforcement.  Any attempt to do so "will damage your files," the warning reads.

Those two recent additions are bad enough on their own, but the hackers took an additional step. They are now directing victims to a web search highlighting an incident that occurred in Greenville North Carolina and another that impacted servers in the city of Baltimore.

Robbinhood was used in both attacks, and while the ransoms demanded in both cases weren't excessive (less than $100,000 initially demanded), the aftershocks arising from those attacks wound up costing the city millions.  In fact, according to CBS Baltimore, the city "put more than $18 million into the attack."

Clearly, the recent changes to the ransom note used by the attackers is aimed at convincing those impacted by their malware to pay up and keep quiet.  How well that will ultimately work remains to be seen, but at this point, the hackers are correct.  There is no public decryption tool.

What they don't mention, of course, is the fact paying the ransom isn't the only way to recover encrypted files.  If your company is in the habit of making good, complete backups at regular intervals, then a ransomware attack doesn't have to be devastating.  With a proper, timely response, it could be little more than an inconvenience.  Naturally, the hackers don't want to draw attention to this, but it is something you and your IT staff should keep very much in mind.

Call SpartanTec Inc. in Wilmington now and let our team set up a business continuity strategy that's suitable for your business needs. We offer reliable data backup and computer hard drive backup services, which can help lessen the effects of ransomware attacks like RobbinHood on your business. 


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Sunday, October 20, 2019

Ransomware Sets Sights On Healthcare Organizations

A string of hospitals in both the US and Australia have come under attack by hackers in recent weeks. They have been targeted by ransomware attacks that have effectively shut a number of them down.  As of the time this article was written, the Northport Medical center, Fayette Medical Center, and DCH Regional Medical Center in Alabama have only limited access to their computing systems.

A spokesman for the hospitals had this to say about the attack:

"The three hospitals of the DCH Health System have experienced a ransomware attack.  A criminal is limiting our ability to use our computer systems in exchange for an as-yet-unknown payment. That said, we feel it is in the best interest of patient safety that DCH Regional Medical Center, Northport Medical Center and Fayette Medical center are closed to all but the most critical new patients.  Our staff is caring for the patients who are currently in the hospital and we have no plans to transfer current patients. Unfortunately, the damage to our computer system was such that we are unable to recover the data stored there and, with our backup system encrypted as well, we cannot rebuild our medical records."

The situation is hardly better in Australia, where a total of seven hospitals were impacted.

A spokesman for the hospitals in Australia had this to say:

"The cyber incident, which was uncovered on Monday, has blocked access to several systems by the infiltration of ransomware, including financial management...Hospitals have isolated and disconnected a number of systems such as internet to quarantine the infection."

Like the American hospitals, the infected Australian hospitals have lost access to their patient records, booking and management systems and have fallen back to keeping manual records to maintain some level of functionality.

This is a serious, coordinated attack and is no doubt a harbinger of things to come.  Lives are very definitely at risk and unfortunately, as the hackers refine their approach, their attacks are only going to get more devastating.  Dark times.

Hackers are becoming more clever and strategic when it comes to infiltrating the devices and networks of their victims. Don't fall prey to them. Protect your devices and your personal or business information. Call SpartanTec, Inc. in Wilmington and let our IT consulting team help you.

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Monday, October 14, 2019

Browser Update Warnings May Actually Be Malicious Hackers

Researchers at FireEye have recently unearthed a particularly nasty new campaign that is both multi-faceted and dangerous. At the heart of the attack are hacked websites which display seemingly innocuous popup message informing the site visitor that their browser is out of date. It will helpfully provide a one-touch solution to the non-existen21t problem via a button that promises to download the latest version of the browser in question.

Naturally, it does no such thing.  Instead, it uses a series of JavaScripts to gather information about the target computer and send the details back to the command and control server.

The server then responds to the findings reported by the initial script by uploading the initial payload.  This varies based on the details gleaned, but generally includes some type of banking trojan malware and a backdoor such as Dridex, NetSupport Manager RAT, or similar.  If the initial scan reveals that the target computer is part of a corporate network, then an additional payload is also injected onto the target machine, but we'll get to that in a moment.

The first part of the payload will busily ferret out login credentials and other sensitive information, exfiltrating any files of value back to the command and control server.

Only when this operation has been completed and if the computer is part of a corporate network will the second stage we referenced earlier trigger, which is a strain of ransomware, normally BitPaymer or DoppelPaymer. The ransomware spreads through the network as far as it is able, encrypting files network wide.

These two ransomware strains are known for their hefty ransom demands, which often run into the hundreds of thousands, or even millions of dollars.

This multi-stage approach is dreadfully effective.  It not only allows the hackers to squeeze a wide range of sensitive data from infected systems, but then, locks them down hard and demands a hefty payment.  Be sure your staff is aware.  This one's about as dangerous as they come.

Hackers are becoming more clever these days. They have found several other ways to get into the computers of their victims. Fortunately, there are ways to keep your computer and network safe. Call SpartanTec, Inc. in Wilmington and let our team set up security protocols to keep your personal or business information safe and protected against various kinds of online threats. 

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Friday, October 11, 2019

The Importance Of Cybersecurity

Why did cybersecurity become so important all of a sudden? Before, it was just something that tech savvy people worry about. In the corporate world, it was a task that was left to the IT department. Other believed that as long as their firewalls, anti-virus software, and encryption tools were set up and working, they could simply hand over their IT security to professionals and  concentrate on running their business.

Now, you are most likely aware that cybersecurity is not something that you can ignore. Unless you totally conceal yourself from the world’s media, you should know that hacks as well as data breaches always affect firms of different sizes. Usually, these incidents are massive enough to make the news, which causes irreparable damage to the firms involved. 

What Has Changed?

Basically, we are living in a much more technically advanced world than a decade ago. In case you need more convincing, think about the fact that the iPad has just been around since 2010 and the iPhone came out a few years before that. Meanwhile, the broadband speeds increased five times over the last decade, which made it possible for individuals and businesses to do much more online.

One good example of the change that this has facilitated is the emergence of document sharing, email that is available on each device, as well as databases accessible from almost everywhere. As the years go by, enterprises have boosted their deployment of business critical applications in the cloud, given that Amazon’s Elastic Compute Cloud was only introduced in 2006.

Improve Your Cybersecurity

Given all these, you should now know the importance of cyber security. What can you do to stand up against this growing threat? Here are a few ideas you need to consider.

Stay Informed

It is no longer fair or realistic enough to expect your IT department to eradicate every IT security risk. Several contemporary cyber security threats come from social engineering, exploits to the browsers, user mistakes, as well as other things that the tech teams could only do so much to protect you from.
Cybersecurity is something that everybody needs to pay attention to, and a large number of incidents are because of people disregarding mainstream advice not to click on suspicious links and securing their passwords.

Do More Than Just Install Anti-Virus

Anti-virus software is an integral part of the IT security methods that you need to have. But relying on that alone is not enough to protect you from today’s online threats. Technical teams require several other tools, solutions, and resources, and a few of them are quite costly. But, they are less likely to be as expensive as the price of clearing up after an online breach.

Get Insured

The sector that offers cyber insurance has boomed over the years and it is now something that firms of all sizes need to consider. Cybersecurity insurance is not just about protecting against the financial risk. In case your company gets hit by a breach, there will be a lot of damage that needs to be contained, and you might need the help of a team of IT experts as well as damage limitation specialists that your insurer could provide.

Don't wait for a security breach to happen. Find yourself a reliable team of IT experts who can help you set up safety protocols to improve your cybersecurity. 



SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Monday, October 7, 2019

DoorDash Leaks Personal Data Of Users And Drivers

Another week, another high-profile data breach.

This time, DoorDash confirmed on a recent blog post that data on nearly five million of its users had been accessed by an unauthorized (and at this point unknown) third party. According to information released by the company, the breach occurred on May the 4th, 2019.

The unknown parties accessed information on the company's drivers, merchants and customers who joined DoorDash on or before April 5th, 2018.

The data taken by the unknown attackers includes:  names, email addresses, delivery addresses, order history, phone numbers, and hashed passwords.  The only silver lining in that is the last item. It will require significant effort on the part of the hackers to decrypt the passwords and make use of them.  Even so, with so much personal information, including physical addresses, the hackers have more than enough data to steal identities.

Part of the company's formal statement into the matter reads as follows:

"We deeply regret the frustration and inconvenience that this may cause you.  Every member of the DoorDash community is important to us and we want to assure you that we value your security and privacy."

While the response isn't a bad one, and the company didn't make any major missteps in the immediate aftermath of the breach, it's all starting to feel very canned at this point.  Most companies say the same thing, and yet, these kinds of events keep happening.

Sooner or later, the platitudes aren't going to be enough to assuage the very real concerns of consumers who are becoming increasingly fed up with seeing companies they trust lose control of their data.  Once a certain threshold has been reached, there's bound to be a backlash.  We're not there, but the frustration and anger are growing, and rightly so.

Call SpartanTec, Inc. in Wilmington now. We will help protect your business from potential online breach that would not only put your company information at risk but that of your clients' as well. Our IT experts will set in place the appropriate and effective online security measures to keep your company safe from online attacks.

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Tuesday, September 24, 2019

New Ransomware Called TFlower Hacks Into Company Networks

Over the last two years, ransomware attacks have become increasingly common against businesses of all shapes and sizes.

While the attack vector saw a dip in popularity last year, this year it has come roaring back to the fore with several new strains of ransomware being developed and enjoying widespread use by hackers around the world.

One of the most recent entrants into the ransomware family is a new strain called "TFlower", which made its first appearance in August of this year (2019).  Since that time, it has begun seeing increasingly widespread use, so if this is the first time you're hearing about it, know that it likely won't be the last.

TFlower is introduced into company networks when hackers take advantage of exposed Remote Desktop services.  Once the hackers have a toehold inside a company's network, they'll use that machine to connect to and infect as many other machines on the network as possible. Like many similar forms of malware, TFlower attempts to distract infected users while it's encrypting their files.  In this case, it will display a PowerShell Window that makes it appear that some harmless software is being deployed.

While it's encrypting a victim's files, it connects to its Command and Control Server to keep the software owners apprised of its activities. Then it attempts to clear the Shadow Volume Copies and attempt to disable the Windows 10 repair environment. This makes it difficult, if not impossible to recover files via conventional means.  Note that it also attempts to terminate the Outlook.exe process so its data files can be encrypted.

When the software has done as much damage as it can do, it will litter the infected computer with a file named "!_Notice_!.txt" which explains that the computer's files have been encrypted and in order to get them back, you'll need to contact the malware owners at the email address provided for additional details.

Be sure your IT staff is aware, and given how this one is spread, check the security of your Remote Desktop services.

Call SpartanTec Inc. in Wilmington and let our team of IT experts help in making sure that your business is protected against potentially damaging online threats. 

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Monday, August 19, 2019

Update Your iPhone To Avoid Latest iMessage Security Vulnerability

If you own an iPhone, be aware that a new iMessage vulnerability has been recently found and patched by Apple. This was part of the iOS 12.4 update.

The flaw allowed hackers to access and read the contents of files stored on iOS devices remotely. They could access files the same way as the device owner with no sandbox, and with no user interaction needed.

The issue was discovered by Natalie Silvanovich, who is a security research with Google's Project Zero.  As a proof of concept, she created a demo that only works on devices running iOS 12 or later. She describes it as "a simple example to demonstrate the reach-ability of the class in Springboard. The actual consequences of the bug are likely more serious."

In describing the issue itself, Silvanovich had this to say:

"First, it could potentially allow undesired access to local files if the code deserializing the buffer ever shares it (this is more likely to cause problems in components that use serialized objects to communicate locally than in iMessage).  Second, it allows an NSData object to be created with a length that is different than the length of its byte array.  This violates a very basic property that should always be true of NSData objects.  This can allow out of bounds reads, and could also potentially lead to out-of-bounds writes, as it is now possible to create NSData objects with very large sizes that would not be possible if the buffer was backed."

As mentioned, this bug has already been patched, along with two other iMessage vulnerabilities that Silvanovich recently discovered. All of them were addressed in Apple's most recent (12.4) update. If you're not in the habit of installing security updates automatically, then you'll need to grab this one and install it manually at your earliest convenience.

Smart gadgets and devices are everywhere. Regardless of the brand, a prudent owner will find ways to make sure that all their smartphones, computers, laptops, and network in general is safe against potential vulnerabilities that could put their pertinent information at risk. Call SpartanTec, Inc. in Wilmington NC to make sure that efficient security measures are in place to protect your personal information, business, and clients from the many different online threats today. 


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Sunday, May 26, 2019

Scammers Now Use Google Ads To Steal Information

There's a new scam afoot that involves using Google Ads.

We're frankly surprised that it's working, but apparently, it's drawing some unsuspecting customers in. It appears to be an organized campaign.

The unknown scam artists are creating ads with phrases like:
  • "Amazon.com - Best place to get dream products. Best deals - Best support - Best price."
  • "Paypal.com - Discover how easy and safe it is to pay for goods and shop. Free Return Shipping.  180-day Refund Windows.  No funds needed."
  • "Ebay.com - Find the best selling Cell Phone Cases, Covers and Skins. Get the best deals for cell phones and smartphones.  Dream Garage Spring Event..."
These ads contain phone numbers with an invitation given to ad viewers to call them.  Of course, the numbers displayed in the ads aren't the real support numbers for those companies. If a user should call one, he'll be greeted by someone claiming to work for the support department of the company displayed in the ad.

Early on in the conversation, the scammer will announce some type of problem with the user's account, and inform them that they can fix the issue, but to do so, they'll need a code found on the back of a Google Play Store gift card.

Why this doesn't raise an immediate red flag to users is a mystery. Apparently some users are handing over the information if they have a gift card, which the scammers promptly make use of. For Google's part, they are working to remove the ads but it's a bit like playing Whack-A-Mole.  For every one they identify and take down, a new one seems to appear.

In any case, the company did issue an official statement which reads as follows:

"We have strict policies that govern the kinds of ads we allow on our platform, and ads that conceal or misstate information about their business are prohibited on our platform.  When we find ads that violate our policies, we remove them." You also have the option to seek out IT consulting services to help you secure your company information and computer network.

Call SpartanTec, Inc. if you need reliable IT services to keep your network safe and secure from potential online breach.


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255
https://spartantecwilmington.business.site