Malware is well known for infecting systems and causing major problems from the second it’s executed. But certain strains of malware act as an enabler.

Security researchers have recently discovered one of these enablers and dubbed it SystemBC. It’s important to stress that SystemBC isn’t an immediate attack. However, it’s just as dangerous as your everyday malware. If not more dangerous. And this is why understanding how an enabler works is crucial for the security of your organization.

It’s always important, where PC security is concerned, to be proactive. So, to help you enhance your organization’s defenses, we’re going to run over the principles of the SystemBC malware.

What is the SystemBC Malware?

The simplest definition of SystemBC is that it enables other malware to unleash attacks. But how does it do this? The answer lies within SOCKS5 proxies. The average PC user will be unaware of what SOCKS5 proxies are, but this doesn’t mean they are impossible to understand. SOCKS5 is a method of internet communication that takes place between a client and a server. And it’s most commonly used in authorizing access to servers.

SystemBC takes advantage of these SOCKS5 proxies to overcome security systems and exploit vulnerabilities. The main method of exploitation is to illegally access a server and then install a command and control (C&C) server. With this C&C in place, SystemBC has the ability to cloak traffic and activity from other malware which can then spread outwards through the server.

How is SystemBC Distributed?

SystemBC has, at the time of writing, been discovered in both the Fallout and RIG exploit kits. These kits allow hackers to package together several different exploits in one product. These assorted exploits can work in synchronicity with each other or independently. And this makes them very dangerous. The Fallout and RIG exploit kits tend to focus on vulnerabilities in Flash and Internet Explorer, an approach which is exceptionally common when it comes to hacking.

Protecting Your Organization from SystemBC

The key to protecting your server from the threat of SystemBC is by being vigilant. Software patches remain the number one preventative measure when it comes to combating vulnerabilities. Software developers release these on a fairly regular basis, but also in emergencies when major vulnerabilities are discovered. And they need to be installed immediately. An exposed entry point to your network is a major threat to your security and plugging it is crucial.

One of the major problems facing organizations, in terms of IT security, is the use of legacy systems. These are systems which no longer receive support from their developers. If a vulnerability is discovered in such a system then it will remain there. It will not be resolved. Therefore, it’s vital that your organization regularly assesses the suitability of your PC systems for engaging with the internet. If a particular part of your network is no longer supported then it’s time to replace it. Otherwise you could soon find malware such as SystemBC making its home on your server.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


 

We visit websites on a daily basis, but how do we know how safe they are? No matter how genuine they look there’s every risk they’re a malicious website.

It’s estimated that up to 18.5 million websites are infected with malicious content. That’s around 1% of the total number of websites online. It may not sound a huge percentage, but it’s a percentage that could cause your business significant trouble.  And it’s a problem that most organizations aren’t entirely clear on. Malicious emails, for example, are well known due to the scare stories that flood our newsfeeds. But we’re less informed about malicious websites. And that’s what makes them dangerous.

However, if you’re able to understand the basics of a malicious website then you’re going to be in a much better position to avoid falling victim. So, what are malicious websites?

What is a Malicious Website?

A malicious website is like any other website on the internet: you connect to it with a browser. But if you dig a little deeper you’ll soon realize why it’s unlikely to become one of your favorite websites. The main objective of a malicious website is to install malware on to your PC. And, in most cases, it won’t even ask permission. The moment that you land on a malicious website is the moment that the malware starts downloading.

But why is a malicious website so misleading? Well, hackers are incredibly clever and they’re even more deceptive. That’s why they design malicious websites to look as genuine as possible. We, as humans, make quick decisions based on first impressions and, in this busy digital age, this is never truer than when online. Malicious websites take full advantage of this. And the false layer of trust that this engenders can soon lead to us clicking on links that we really shouldn’t.

How Do You Protect Yourself from Malicious Websites?

No one wants to fall victim to a malicious website. But, without a prior knowledge of how to protect yourself, this is difficult. Thankfully we’re here to make things easier. That’s why we’ve put together this amazing set of safety tips:

  • Always keep your software updated and install the latest patches as soon as possible. Malicious websites are often used to distribute malware that targets software vulnerabilities. With this updated protection in place you can minimize one of the main threats of malicious websites.
  • It’s vital that you never install any software you’re unfamiliar with. Malicious websites are sometimes courteous enough to ask permission before installing their malicious content. And it’s easy to click the Yes button just to clear the screen of yet another pop-up window. But it can spell disaster for your PC. Therefore, always read pop-up windows carefully and, if you don’t trust it, leave that website immediately.
  • If you’re sent a link to a website that’s unfamiliar then you shouldn’t click it. But you should do some research first. The best way to verify a mystery link is to type that link into the search box of a search engine. The results should soon highlight whether that web address is trustworthy or dangerous.
  • Install internet security software that can identify malicious websites before they’re loaded up. Knowledge of malicious websites can spread quickly and this has led to massive databases being created to help alert users to those that contain a threat.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Cyber-attacks are on the rise, so protecting your business has never been more important. But what exactly are the benefits of cyber security?

We all know about the need for firewalls and anti-virus software. They provide us with a layer of defense from the legions of hackers itching to access our data. Those who are new to the world of IT, however, are unlikely to know why they need cyber security. What can it deliver? Well, let’s run through six reasons why you should invest in cyber security:

  1. Protects Your Data: Businesses work with huge amounts of data in the 21st And, whether its employee or customer data, it’s going to be sensitive. This needs to be protected to prevent identity theft or financial damage. A professional approach to cyber security will reduce this threat and protect the integrity of you data. 
  1. Maintains Productivity: While the headlines regarding cyber-attacks always focus on data and costs, they fail to look at the impact on productivity. If, for example, a ransomware attack hits your network then critical files are going to be out of action. This means that your employees will be unable to work. And the impact that this can have on your organization’s productivity can be devastating. 
  1. Financial Damage: Cyber-attacks can hit a company where it hurts: the bank balance. Ransomware demands are, naturally, the most obvious cause of financial distress, but there are others. A drop in productivity can soon lead to a drop in sales which can significantly impact your revenue streams. And there’s also the chance that irreparable damage could be caused to your hardware resulting in the need for new purchases. 
  1. Protects Your Website: One of the cornerstones of a successful marketing strategy in the 21st century is a website. Whether it’s being used to promote your services or sell them it needs to be running 24/7. It’s a crucial communication channel, but it’s also one that’s regularly targeted by hackers. With the correct level of investment in cyber security you can limit the risk of it being compromised. This keeps your website running and ensures that your marketing strategies can run smoothly. 

  1. Keeps Malware Out: Malicious software, better known as malware, is the bane of all security professionals. Capable of causing massive damage to IT infrastructures, malware is a form of hacking which embraces subterfuge and results in untold problems for the victims. It can steal data, it can slow down systems and even set up attacks on other businesses. But if you invest in cyber security then then the chances of malware activating its payload is reduced. 
  1. Provides Customer Confidence: Consumers are wary of data security more than ever in the digital age. Therefore, inspiring trust in your IT systems is essential. If you can demonstrate that you’re working with professionals to protect your customers’ data then you can inspire this trust. Not only will you be able to protect your customer’s data, but you will enhance their loyalty to your brand.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


A hacked network is a disaster for any organization, so keeping things secure is vital. However, sometimes things go wrong and you need to know what to do.

Your IT operations are supported by your IT network, so, if it gets hacked, there’s every chance that all those PCs you have lined up in your offices will be unable to operate. Naturally, this means that productivity will drop off almost immediately and affect not just you, but also your customers. With good IT practices in place, you significantly reduce the risk of this happening. Mistakes, be they caused by hardware or human error, are inevitable, though, and it’s rare that a business can claim to have defenses which are 100% secure.

Therefore, it’s important that you know what to do when your network is hacked. Rather than have you learn the hard way, through experience, we’re going to save you some of the pain with a quick guide on how to cope.

Steps to Take When You’re Hacked

Most importantly, you need to take the following steps when you discover your network has been hacked:

  • Put Everything On Lock Down: The stealthy nature of hackers means that it’s difficult and time consuming to determine exactly how much of your network the hackers have breached. So, in order to preserve as much as your network as possible, you have to assume the worst: they’ve gained access to everything. And that’s why you need to lock down and change passwords on everything be it folders on a shared drive or your social media accounts. This is the only way to minimize damage. 
  • Learn from the Experience: As we’ve stated, it’s likely that your network will, at some point, experience a security disaster. However, while in the short term this may feel like nothing but non-stop chaos, there’s an important set of learning to be absorbed for the long term. Mistakes are what allow us to evolve and make better decisions in the future, so make sure you take the opportunity to analyze exactly what went wrong and the steps you can take to prevent it happening again. 

Final Thoughts

A hacked network represents every IT professional’s worst nightmare, but it’s important that you understand the best steps to take in this situation. Not only does it prevent network hacks from escalating into more devastating hacks, but there’s also the chance to learn and strengthen for the next time hacker aims an attack at your network.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We’re all aware of the dangers of opening suspicious files, but what happens when hackers develop the skills to unleash malware without infected files?

Due to the popularity of file-based attacks, most security software concentrates on combating this particular avenue of hacking. And it’s certainly an effective method of shutting down most malware attacks before they’re able to steal or, in the case of ransomware, encrypt your data. Due to the success of blocking these attacks, hackers have had to go back to the drawing board and evolve their methods of attack in order to become less detectable.

The end result of this evolution has seen a rise in sophisticated hacking methods and, in particular, fileless malware is now beginning to grab headlines. And, due to the lack of knowledge of this development in hacking, attacks have increased in frequency and their success rate has also flourished. As fileless malware could easily hit your organization at any given time, it’s a good idea to educate yourself on the threat.

What is Fileless Malware?

You don’t have to be a security expert to understand that fileless malware is a malware variant which forgoes the use of infected files. Instead, fileless malware takes advantage of trusted Windows components such as PowerShell that are rarely checked for infections. PowerShell is hardly ever used by the average PC user, but it’s an important component that can be used to execute system administration tasks and, therefore, taking control of this is a hacker’s dream.

As mentioned, fileless malware does not involve the use of any files to infect a PC. The most common technique to launch an attack is through spam email which contains a link to an infected website. If that link is clicked then the user is transported to a spoof website where Flash player loads and, at the same time, activates a malicious script that accesses PowerShell on the victim’s PC. Infected PowerShell scripts are then downloaded which allow the hackers to collect sensitive data and transmit it back to a remote location.

How Do You Combat Fileless Malware?

Data leaks can be highly damaging not just for your staff and customers, but also your organization’s reputation. Therefore, with the advent of fileless malware, it’s essential that you understand how to protect your business from its malicious activity. To help you keep one step ahead of fileless malware, make sure you action the following:

  • If you don’t use PowerShell in your IT operations then disable it. This nullifies the threat of any PowerShell exploit. Additionally, the same applies to Windows Management Instrumentation which has also been discovered to be vulnerable to fileless malware.
  • Monitor the amount of data leaving your network. If there’s a spike in data leaving your network then it’s possible that this is the result of malware transmitting sensitive data to a remote hacker.
  • Don’t rely on antivirus software alone as this is less effective when it comes to fileless malware. Instead, practice vigilance and monitor any unusual emails.
  • Disable macros at all costs, unless they’re company approved, as macros are another tool employed by hackers as part of a fileless malware attack.
  • As ever, regularly update your software to reduce the chance of known software vulnerabilities being exploited.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More