Ransomware is a highly destructive form of malware, but it turns out that it can also provide the perfect cover for disk wiping malware.

The pitfalls of becoming a victim of ransomware are well documented. And, as such, the term ransomware is one that strikes fear into the heart of any PC user. But, at the very least, ransomware does give you an option of getting your files back. Naturally, you have to pay a ransom fee for the files to be decrypted, but you can get them back. However, a form of malware called Apostle has now been discovered which pretends to be ransomware when, in fact, it simply wipes your disk drive beyond retrieval.

Data is a crucial commodity in any organization, so it’s important you make it as secure as possible. And one of the perfect ways to do this is by understanding how Apostle works.

How Does Apostle Wipe Disks?

The Apostle malware is believed to originate from Iran and is related to a previous wiper malware called Deadwood. Apostle is not brand new as it has been in the digital wild for some time. But these initial versions of Apostle were flawed and failed to deliver their malicious payload. Since then, the designers of Apostle have tweaked its design to make it more effective. This contemporary version of Apostle presents itself as standard ransomware, but this is merely to throw the victims off guard; its true intent is to destroy data and cause disruption.

The hackers behind Apostle are particularly cunning and are also happy to take ransom payments while destroying the data in question. But this is not where the attack ends. There are signs that Apostle is being used in conjunction with a backdoor attack called IPSec Helper. This allows the hackers to download and execute additional malware and move, undetected, within infected networks. Again, the intention here is to cause disruption.

How Do You Stop Your Disk Being Wiped?

The focus of Apostle, so far, has been Israeli targets, but this does not mean it should be considered a low-level threat. The design of this disk wiper malware can easily be engineered into more virulent and dangerous forms. And this could easily strike at the heart of your business’ operations. Therefore, it’s crucial that you maintain the following practices:

  • Evaluate All Attachments Before Opening: It’s likely that you receive numerous email attachments through the day, but how often do you verify them before opening? Trusted email addresses can, very easily, be taken over or even replicated. And this provides the perfect route for infected files to be opened. So, if in doubt over whether an attachment is safe, always check with an IT professional before opening.
  • Keep Your Software Updated: Another sure-fire way for hackers to gain access to your network is through vulnerabilities caused by outdated software. The best way to counter this threat is by implementing software updates as soon as possible. This minimizes the presence of vulnerabilities and keeps hackers out.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


One of IT security’s main aims is to avoid data breaches. However, breaches are inevitable in the modern age. Therefore, you need to know how to recover.

The impact of a data breach can be huge and catastrophic for all involved; organizations and their clients can be equally affected when data is stolen. And, in many cases, the clients are the ones who have the most to lose e.g financial and personal data being leaked and spread by hackers. Accordingly, if your organization finds itself in the unenvious position of experiencing a data breach, there is a lot of work to do.

A data breach is a stressful event and cleaning up afterwards can be a real struggle. But, with our tips on what you need to do after a data breach, you should find it a little easier.

Coping with a Data Breach

Once a data breach is confirmed then it’s crucial that you carry out the following:

  • Identify the Stolen Data: Understanding exactly what has been breached is vital when it comes to evaluating the extent of the attack. As long as you have a suitable set of defenses in place, you should have access to intrusion detection systems. These tools will provide an insight into which files were accessed and what the hackers did with them e.g. deleted or copied them. Putting this picture together will allow you to determine your next steps.
  • Prepare a Fix and Test It: A data breach indicates that there is a hole in your defenses, so you should act quickly to plug this. It may involve installing a security patch or it may require a more in-depth response from your IT team. Whatever the solution, you need to put it in to place as soon as possible. This will protect your data and limit any further damage. But you need to make sure this fix works. Test the solution several times to guarantee that the attacker cannot launch the same attack again.
  • Advise All Your Customers: It’s essential that, once your fix has been established, you inform your customers of what has happened. Naturally, they will be anxious as the phrase “data breach” carry a certain amount of dread. Honesty, therefore, is the best policy. Advise your customers of the data that has been breached and how it could affect them. This may be as simple as asking them to change their passwords, but could also extend to contacting their financial providers if the relevant information has been compromised.
  • Evaluate and Build Stronger Defenses: The one benefit (and we’re using that verb lightly) of a data breach is that it prompts you to strengthen your IT defenses. Your organization will need to carry out a full investigation to understand exactly what happened. Was, for example, the breach able to succeed due to out-of-date software? Or was it down to a lack of staff training on the dangers of social engineering? Regardless of the cause, the solution will need to be determined and put in place to prevent future breaches.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The Internet of Things (IoT) has redefined our concept of connectivity and what IT can achieve. But with these advances comes the need for unique security.

Thanks to the IoT it is now possible for organizations to simplify their connectivity solutions. Traditionally, multiple devices in a business meant one thing: cables, cables and more cables. But the beauty of the IoT is that it is completely cable free. As long as there is an internet connection, you can connect a multitude of devices that communicate in real-time.. However, we all know the potential dangers of transmitting data over the internet. So, what do you do?

Protecting Yourself and the IoT

As the IoT is a relatively new phenomenon, it is important that you know the best ways in which to protect your connections and data. And here are five of the best IoT security tips you need to know:

  • Know What’s Connected: It is crucial that you list everything that is authorized to connect to your IoT network. This allows you to monitor each device for any unauthorized activity and any potential maintenance issues. Once you have established your list of authorized devices, it is recommended that you detail the areas of your network they have access to. It may be that you need to restrict access to non-essential areas of your network to minimize the impact of any breaches.
  • Change Default Passwords: The IoT has received negative press thanks to the number of default passwords that come built into IoT devices. This scenario allows hackers quick and easy access into your devices and networks. Therefore, any new IoT device which is installed within your organization needs to have any default passwords changed immediately. With unique passwords protecting your IoT devices, you can rest assured your network is much safer.
  • Check Device Settings: It is important that you always check each IoT’s device settings before letting them go live on your network. In particular, you need to focus on the privacy settings. Many devices will be set up to automatically record data that you may not want logging e.g. voice recordings.  Accordingly, it pays to evaluate each device to establish what it can and can’t have access to.
  • Two-Factor Authentication: Where possible, always take advantage of two-factor authentication. Many IoT devices are adopting this security measure in order to make their hardware more attractive to consumers. And security sells in the 21st century. Two-factor authentication is, essentially, an extra line of defense. It is an additional login procedure which requires unique credentials sent to a secure device such as a cellphone.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


You would like to think that your security software keeps you secure and, on the whole, it will. But there is the chance it could be turned against you.

One of the most trusted anti-malware tools is Microsoft’s Windows Defender app. Originally launched in 2005 – as Microsoft AntiSpyware – Windows Defender is a free tool which offers real-time protection against infected files and websites. It’s a highly effective piece of software and one that all Windows users should ensure is running. But, in an ironic twist, Windows Defender has fallen victim to a vulnerability. And, as you would expect, hackers have been keen to capitalize on it.

The Windows Defender Vulnerability

The basic process of Windows Defender is that it scans files and activity on a PC for any malicious potential. If these files are considered suspicious then they will be quarantined by Windows Defender; the user then has the option to either restore or delete the file. However, a problem has been discovered in Windows Defender in the form of CVE-2021-1647. This code, allocated by Microsoft, indicates that it’s a vulnerability in Windows Defender which allows remote access to the app.

By allowing remote access to Windows Defender, this vulnerability grants hackers the chance to turn the app against its user. Instead of scanning malicious files and quarantining them, remote users will program Windows Defender to execute these files. Therefore, a hacker could send infected files to a user safe in the knowledge that Windows Defender will do the hard work for them. It’s a serious threat and one which could cause major problems for your network in a matter of seconds. The exploit has been recorded as active in the digital wild, so this demonstrates that hackers have been aware of it for some time.

Defending Windows Defender

It may sound a tall order to defend a piece of software there to defend you, but this is the world we live in. Thankfully, putting safety measures in place is relatively simple. The vulnerability in question has been fixed thanks to a patch swiftly released by Microsoft. This will be installed automatically and requires no work on the user’s part. Naturally, this does not mean that Windows Defender is 100% secure, the threat of further exploits being discovered remains a possibility. But, by ensuring that automatic updates are in place, your system will be safer than before.

Final Thoughts

Vulnerabilities in PCs are all too common and even Microsoft are not immune from these flaws in their products. The Windows Defender vulnerability – and others such as Zerologon – underline the importance of installing updates. The simplest way to secure your PC is by making sure it has the best chance to defend itself. Accordingly, updates need to be installed as soon as possible. When it comes to Microsoft updates, these can be set to install automatically. This gives you the best chance of staying ahead of exploits and any hackers using them.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


 

COVID-19 has changed the way we live our lives and, not surprisingly, hackers are trying to take advantage of the fear factor behind the virus.

No aspect of life is off-limits to a hacker; if they can turn a situation to their advantage then they will. And this means that all sense of morals and ethics go out of the window. COVID-19, of course, has caused great fear and panic since it emerged, so it’s a subject people take very seriously. And it’s this investment in fear that hackers are looking to exploit. As with most online scams, if it sounds too good to be true then it usually is. But some people are willing to take a risk when COVID-19 is mentioned.

COVID-19 Scams to Look Out For

You should be aware of the usual online threats to look out for, but here are the specific COVID-19 scams you should be aware of at the moment:

  • COVID-19 Vaccine on the Dark Web: Now that vaccines have been approved in the fight against COVID-19, hackers have decided to exploit this demand. And that’s why it’s now possible to find listings for the vaccine on the dark web. Naturally, you should never buy medicine online unless this has been approved by your healthcare professional and the site is genuine. Very little on the Dark Web – an encrypted form of the internet – is genuine, so any marketplace listings that promise a COVID-19 vaccine should be dismissed. 
  • Fake COVID-19 Mapper: Everyone has been intrigued as to the behavior of COVID-19 and its spread, so the opportunity to monitor its spread is appealing. However, hackers have used this curiosity to help spread their malware. Researchers have discovered a PHP malware dropper which disguises itself as a piece of COVID-19 mapping software. Using a compromised website, hackers encourage visitors to download and install the mapping software. But all that is installed is software which downloads further malware. 

How to Combat COVID-19 Scams

The urge to click on sensational news and promises regarding COVID-19 is strong, but it’s crucial that you think long and hard before clicking. There are numerous COVID-19 scams in the digital wild and they are only going to get more sophisticated. As with all online scams and malware, make sure you practice the following:

  • Install all Updates: Malware often takes advantage of outdated software, so make sure that all your software is up to date. All you need to do is install all updates and upgrades as soon as they become available – your PC should automatically prompt you to install these when available.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More