Windows CVE-2014-4114 Exploit

A Zero-day Microsoft Windows Exploit CVE-2014-4114 has been found which impacts all versions of Windows. Here’s what you need to know to protect yourself.

The Russian espionage group, known as the “Sandworm team”, are the prime suspects believed to have launched a campaign to exploit a range of Microsoft Windows vulnerabilities.  The exploits are classified as Zero-Day, meaning they are so new that no anti-virus companies have figured out how to detect them yet. The ultimate goal is to inject and execute malicious code into systems and networks to leach data from computers.

Sandworm Team Logo

Their targets have involved NATO, US academic organizations, Western European Union and Ukrainian government agencies, European energy and telecommunication companies.

Systems are infected from files being attached to legitimate looking emails and extended through to social engineering methods. Most versions of Windows are affected – including server 2008 and 20012, but excluding Windows XP.

Sandworm CVE-2014-4114 Vulnerability Timeline

iSight has provided a timeline of the Sandworm infection campaign.

The cyber intelligence firm, ISight, has been monitoring Sandworm’s activities. After alerting Microsoft, a patch was released called MS14-060 which is found in Window’s Automatic Updates. The fix is still an on-going work in progress.

The vulnerability explained

Here is a high level overview of what the CVE-2014-4114 Zero Day exploit entails:

  • The vulnerability allows a computer to have code executed remotely through a file that is initially opened by an unsuspecting user via an email attachment.
  • Within most software installation files, you’ll find a component called OLE (Object linking and Embedding) Package Manager.
  • An OLE package allows applications to share files and functionality.
  • The OLE package manager contains a file which permits it to download and run INF files.
  • This is where a computer is vulnerable since a hacker can run any program, virus or malware on a system.
  • Any acquired arbitrary code can then run from the downloaded INF files, which is presumed by the system to be associated with the application’s package.
  • This package will run from the logged-in user’s credentials, such as an administrator or anyone with admin rights.
  • The danger then rests from specific commands given to the file during the execution of the application.
  • It has been observed that unsuccessful attempts from this exploit can also lead to a denial of service, which can lead to service disruption.
  • As mentioned previously, the usual mode of target is through fake emails with attachments and social engineering, where the user would need to be convinced and tricked into opening the file.

Proactive measures to prevent an infection

Follow these guidelines to protect yourself or to quickly recover from a compromised system.

If you find your system compromised

For more details about the Zero-day Microsoft Windows Vulnerability CVE-2014-4114 issue and other security issues putting your business and private data at risk, contact your local IT professionals.

Read More


Windows 10 Logo

Microsoft has recently announced the preview version of Windows 10 for the general public. Here are our favorite Windows 10 features for businesses.

At a glance, it looks very much like a hybrid of Windows 7 and Windows 8, with some colorful Apple elements thrown in. We’ve decided to discuss here some of our favourite features of Windows 10 which may be of interest to businesses and professionals:

The return of the Start Menu

Windows 10 Start Menu Feature

That’s right, the start menu, which was absent on Windows 8, has been reintroduced into the OS. It’s similar to the former start menu in Windows 7, yet it includes live titles like in Windows 8 and attractive “Apple-esque” looking tiles. You can also resize it!

Extended search functionality

Windows 10 Extended Search

Within the start menu, you will be able to search anything from your current PC or device, such as files or Apps, as well as any search results from the internet.

Windows 10 Universal Apps

Windows 10 Universal Apps

Microsoft is following the Apple App Store trend by unveiling their own Windows Universal Apps, which we guess will be compatible across various devices, including phones. Older Windows Apps should still work on Windows 10.

New multiple Task View and Split Screen features

Windows 10 Multi-Task View

Microsoft have done away with Windows 8 Task switcher and have introduced a brand new Task View, which will allow users to switch between virtual desktops. This makes it a whole lot more user friendly and allows you, for instance, to separate your work desktop from your home desktop. It also splits the screen up into four quadrants to make it easier to segment your work.

Snap Assist feature

Windows_10_Snap_Assist

This is another new feature which allows you to arrange (“snap”) your Apps and windows into tiles or new screens.

Package Manager “OneGet”

Following in the footsteps of the very popular Linux based package managers, Windows 10 will allow you to install programs directly from the command line.  It may not sound exciting but imagine avoiding the 10+ windows of Next-Next-Next to get common software up and running.  Deploying programs on many systems also becomes much more manageable.

Business functionality features

Windows 10 Best Business and Professional Features

On Window’s 10 Technical Preview for Enterprise, there is said to be features that are currently under development which have not all yet been included. Some features will include specific business functionalities such as DirectAccess, AppLocker, BranchCache and Windows To Go. We can only imagine that data security and asset management will be at the top of their list.

Final Thoughts…

Now you have a run-down on some of the popular features for the Windows 10 preview. It’s available for download, but be sure to do this on a test computer or VM.

Since the negative backlash on Windows 8, Microsoft is looking for feedback to improve on their new OS before selling it to the market. In our opinion, this is a great thing as they are listening more to the consumers’ needs and practical solutions. Since most businesses and professionals depend on some Windows operating system, this is an opportunity to provide constructive criticism for an improved OS to be born.

For more information about whether Windows 10 is right for your business or practice, contact your local IT professionals.

Read More


Everyone Needs Guest Wifi

Now that you understand the benefits of having a guest Wi-Fi network. It’s really simple to set one up, so here’s a quick guide on how to setup guest wifi.

1 – Access your router’s admin page.

This is so that you can access your router’s settings and configure it to add a guest Wi-Fi network. Simply enter your router’s LAN IP address into the web browser which should start with http:// followed by the IP address. If you didn’t already know, an IP address is a set of four numbers separated by periods. It should look something like:

http://192.168.1.1

Where can you find your router’s LAN IP address?

Some routers may already be labelled with a sticker at the bottom or to the side of it. Alternatively, you can find out by:

On Windows: Run a command prompt box, type the command “ipconfig” which should display some output. Take note if the IP address that displays “default gateway”

Get the IP address of your router

On a Mac: Enter network preferences, and then go to the “Advanced “ button, followed by the TCP/IP tab. Find “Router”, which will display the router’s IP address.

Mac_Network_Preferences

Apple device: head over to settings, go to Wi-Fi, then look for the “i” button to the right of your network name and click it. You should see the IP address under “router”.

Android device: This needs a separate App to view you router’s IP address. We suggest on to use called Fing.

Once you have your router’s IP address, type it into your web browser and access the login page. Simply enter your default admin ID and password (this should be labelled on your router). If unsure, you can contact your ISP (Internet Service Provider) to find out.

2 – Guest Network.

Belkin Router Guest Wifi Settings

Once you’ve successfully logged into you router, you’ll see that you can configure its settings. Look out for a setting or tab worded as “Guest Network” or something similar to it. This can vary from one router to another.  Note: that newer routers support guest networks, but some may not have this feature at all.  Check your router’s packaging or manual to confirm if it has the ability to provide a guest network.

3 – Configure and save. 

Enable your guest network by clicking on “enable”, along with any other preferred settings of your choice, save it, and you’re done!

It’s simple to do, right?

Now you know to set up a guest network so you can overcome the potential pitfalls mentioned in our previous article. Not only is this setup a win-win situation for all, you’ll also have peace of mind with having a secured LAN where nobody can see your private files, data or internet traffic, whilst maintaining a trustworthy relationship with your guests or customers.

For more ways to secure your home or office networks, contact your local IT professionals.

Read More


Everyone Needs Guest Wifi

Providing wifi has become so popular that you’ll find it in just about every establishment. Having a guest wifi is a necessary safeguard for your data. 

You can see this for yourself by simply looking at the available Wi-Fi networks broadcasted and picked up by any device like your smart-phone, tablet or laptop. As Wi-Fi can be easily accessed in many businesses, from coffee shops, to fast foods chains, to airports and public transport, why shouldn’t your business or home offer it too? 

Practical reasons why setting up a guest network is important

Accommodating business needs.

Providing guest wifi for customers or visitors

After all, it’d be very inhospitable to turn down Wi-Fi requests from associates, guests or customers who need access to the Internet. By setting up a guest Wi-Fi network, you can grant them the right to stay productive on their projects, allowing them to access their emails or their files on the cloud, without them having to resort to doing it all on their smart-phone. How many times have you had, or will you be having temporary staff, contractors and visitors on-site, needing Wi-Fi access or at least an internet connection of some sort? After all, it’s impolite to say no to them, right?

Keeping the LAN (Local Area Network) private.

OnsitePCSolution_Update_Security

It’s wise to separate the business’ or home LAN from unauthorized public access. Your LAN will typically hold internal files, folders, display device names and access to the intranet. As the saying goes, it’s best to be safe than sorry. This will tighten up any vulnerability from both accidental and intended malicious activities which could otherwise compromise any part of your business.

Providing a different password.

Password for your wifi

You wouldn’t want to give the same password to just anyone who will be able to note and potentially store it for later use, especially if it’s for any of your own personal business accounts. Besides, some passwords can have a simple format which can make it easy for anyone to guess. It’s time to close that vulnerability!

Setting up a Guest Wi-Fi Network

Now you understand the reasons and the benefits of having a guest Wi-Fi network. It’s really simple to set one up.  Our next guide will walk you through the general steps on how to do it.

For more ways you can protect your privacy, data and business from breaches, contact your local IT professionals.

Read More


Manage Software Licenses

Every business needs to be prepared for audits or system failures. Here are five solutions to help you manage software licenses.

In our previous article, we covered the importance of tracking software licenses.  There’s no straightforward solution. Ultimately, it’s more about being organized and finding a method to manage licenses effectively. There are both free and paid tools available to help manage and track software licensing more efficiently.

Options

X-Formation- A software tracking solution https://www.x-formation.com/

XFormation

You can track, audit and plan your software budgeting. There are three different options to choose from depending on your business needs. You can also test out a trial version before deciding.

License Tracker– Open source Tracking Software http://ltrack.sourceforge.net/

License_Tracker

It is a web based tacker designed to monitor software package usage which is open source.

Kace (Dell) – Hardware Appliance solution http://www.kace.com

KACE

They offer different appliances to fit in with the size of your business. Covers both physical assets and license tracking. It can tell you the number of endpoints out of compliance that may have not updated to a given software baseline.

SysAid- Manages Software Inventory http://www.sysaid.com/asset-management.htm

SysAid

It can assist with keeping track and complying with user agreements. An agent is deployed to help automatically update the software inventory.

White Source- Web browser based solution http://www.whitesourcesoftware.com/

WhiteSource

You can manage your OS libraries thanks to its tracking utilities. The open source version is free.

Final Thoughts

You will need to consider the size of your business in terms of the amount of equipment used that needs software licensing. In some cases, more licenses are used for individual user accounts that may access the same desktop.

Auditing licenses centrally and frequently, especially for any growing businesses, is the way to go to stay organized!

For more ways your business can stay compliant with licenses and software management, contact your local IT professionals.

Read More