One set of malware is bad enough for most organizations to deal with, but what should they do when they’re hit with two sets at once?

Hackers are constantly trying to breach the defenses of PC users, but it’s not easy for them to succeed. Defenses are constantly improving and PC users are becoming more technically minded when it comes to hacking. Attacks, therefore, need to be cleverer and more aggressive for hackers to succeed. And one of the newest threats to PC defenses is a combined attack which teams up multiple forms of malware to pack a devastating punch.

In particular, reports are coming in that hackers are combining the data miner Vidar alongside the GandCrab ransomware to maximize their chances of success. And it’s proving to bear fruit for the hackers, so it’s crucial that you understand the risk.

The Double Whammy of Vidar and GandCrab

The combined attack of Vidar and GandCrab was identified by Malwarebytes Labs who observed that the hack first installs Vidar and then proceeds to strengthen the attack with GandCrab. Using malicious advertising software, the hackers expose users to an exploit kit (usually Fallout) which targets vulnerabilities in specific apps. Once this exploit kit has been executed, Vidar is installed on the infected PC and proceeds to mine user data such as communications, digital wallet info and login details.

This attack is bad enough, but the victim things are about to get worse as Vidar is capable of downloading additional malware. Using a command and control center to receive and transmit data, Vidar will, after a minute of its own installation, download and execute the GandCrab ransomware. It’s true that Ransomware has, to a degree, fallen out of favor with hackers over the last year, but it still has the potential to cause severe disruption for organizations. Encrypting files and then demanding a ransom will stifle the productivity of any organization effected, even if backup copies are available.

Protecting Your Organization from Vidar and GandCrab

It’s clear to see that the two headed attack of Vidar and GandCrab is particularly nasty and one to watch out for. In order to understand how to protect your organization from this threat, you need to understand how this attack is able to take place. As ever, that age old favorite of unpatched software is squarely to blame and, on this occasion, it’s Adobe’s Flash Player and Microsoft’s Internet Explorer.

Anti-malware software is now capable of detecting Vidar when it’s found within your PC, but the easiest option for any organization is to avoid allowing it access in the first place. One of the keenest security practices to adhere to is the installation of software patches as soon as they become available. Sadly, this task is often superseded by more immediate, pressing matters and this grants hackers more time to detect and exploit these vulnerabilities. However, with what is usually just a few clicks of a mouse, protection from potential security threats can be implemented by immediately installing patches.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


A new year is here and it’s rich with opportunity, but not just from a business point of view. For hackers, 2019 promises to be a busy and lucrative year.

From enhancements to existing methods of hacking through to completely new approaches, hackers will be doing their best to breach the defenses of organizations all over the world. With methods such as cryptomining rapidly gaining popularity – and generating nice incomes for the hackers – it’s easy to see why hacking is evolving so quickly. If a hacker can design software that gives them just a 1% advantage over their rivals then there’s a good chance they will reap the financial rewards on offer. And that’s why 2019 is going to see significant advances in hacking technology.

However, it’s possible to protect your organization by educating yourself on the five biggest cyber-security threats for 2019.

  1. A Rise in Internet of Things (IoT) Attacks

Despite the headlines regarding IoT device vulnerabilities, little has been done to rectify the flaws. Default passwords are still commonplace across devices and a demand for increased flexibility to work with various operating systems has made IoT devices easy targets. Securing your IoT devices, therefore, is crucial.

  1. An Increase in Biometric Hacking

Biometric passwords such as fingerprint or retina recognition are methods of security which, on the surface, appear to be difficult to beat due to the individual nature of fingerprints and retinas. However, the software behind this technology is much more vulnerable. Flaws in both the software and hardware are likely to be discovered and exploited during 2019, so relying purely on biometric passwords is not a recommended strategy.

  1. Chatbots will Start Phishing

Bots have been present online for decades, but an emerging trend has seen hackers designing chatbots that socially engineer computer users and extract their sensitive data. Computer users are becoming increasingly reliant on chatbots contained within websites for help, so it’s a clever move on the hackers’ part as it allows them to send malicious links direct to users in real time. Educating your staff on the dangers of such interactions will be essential during 2019.

  1. A Major Cloud Hack Will Occur

The amount of data stored within the cloud is immense and it’s surprising that one of the major cloud vendors hasn’t suffered a major hack already. And this is why it’s likely that attacks on cloud vendors will increase in 2019. The cloud, of course, remains a fantastic storage solution, but make sure you’re aware of your vendors security capabilities and retain physical backups of your data.

  1. Botnet Attacks Will Take Down the Internet

Botnets have disabled large sections of the internet before such as the 2016 attack which saw PayPal, Twitter and Amazon taken down. Naturally, this is terrible news for the organizations which have been hacked, but the knock on effect is a decrease in productivity for organizations that rely on these services e.g. accepting PayPal payments. Therefore, identifying the key online services your organization relies on and creating a contingency plan in the event of an attack is vital.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More