Security
How the RSocks Botnet Was Finally Shut Down

Botnet attacks have been on the rise for years, infecting devices across the globe, exploiting sensitive information, and even being used to launch distributed denial of service (DDoS) attacks. Specifically, botnet attacks are unique in the fact that they are carried out by several compromised IoT devices (ranging from smart speakers to video doorbells) to create an "army" of sorts. In 2017, the FBI identified a Russian botnet known as RSocks. Since then, the United States Department of Justice has been working diligently alongside law enforcement in Germany, the Netherlands, and the United Kingdom to take this botnet down. In June of 2022, they were finally successful. More About the RSocks Botnet The RSocks botnet was first discovered in 2017 when approximately 325,000 compromised IoT devices were found to have carried out many brute force attacks. These attacks involved guessing the passwords of users through numerous attempts. Once devices were

Read more
How to Avoid Fake Windows 11 Upgrade Malware

Are you looking to upgrade your PC to Windows 11? If so, be careful about where you get your download. While Windows 11 has promised some significant (and much-needed) security improvements, some unexpected risks have also been accompanied. One of these risks that have been disguised is a major malware attack as a Windows 11 upgrade. With a better understanding of this fake Windows update virus and how to protect yourself, you can avoid falling victim to malware. More About the Fake Windows Update This supposed Windows 11 update appears to come from a legitimate Microsoft website, though if you look closely at the URL, the first "red flag" is that the web address is not a direct Windows URL. From there, unsuspecting users who have not noticed the faulty web address may click on the "download now" button and end up with a 1.5MB ZIP file that contains a

Read more
Signs of Hope During Ransomware Chaos: Life is Getting More Difficult for Malware Gangs

Ransomware attacks are a very real threat across the web. Individuals, small businesses, and large corporations alike have all fallen victim to these attacks – with ransom payouts often reaching six figures or more. However, even though instances of ransomware may be on the rise, experts are hopeful that we've collectively made it through the worst phase of these attacks. Government Bodies Stepping in to Make a Difference One of the biggest problems with ransomware attacks is that victims often see no other option besides paying the ransom to get their information back. Unfortunately, doing this only perpetuates the problem because attackers see these victims as easy targets that can be taken advantage of time and time again. Likewise, the decryption codes provided by hackers upon the payment of a ransom cannot always be trusted. Fortunately, government bodies such as the National Cyber Security Centre (NCSC) and the United States

Read more
How to Conduct a Password Audit

As much as you'd like to believe that your passwords are totally reliable, the reality is that passwords are less secure now than ever before. Across the web, hackers are using tools to crack passwords in a matter of seconds. From there, personal data, financial information, and other sensitive data are being compromised. If you're looking for a way to increase password security, one of the best things you can do is to conduct a password audit. This is something you can do on your own or as a company-wide practice to protect your data. Not sure where to start? We've got you covered. The Importance of Password Audits For starters, it's important to understand what a password audit is, what it entails, and why this practice is so important. Specifically, a password audit refers to a practice where specialized software is used to "test" your passwords against a variety

Read more
Phishing and Higher Education: What You Need to Know

Across the field of higher education, security threats run rampant. This is especially true as more schools than ever are relying on virtual/online platforms. Within the last couple of years especially, attacks on schools and other educational institutions have significantly increased. This is especially true regarding phishing attacks carried out against school faculty, administration, and students. University Phishing Attacks on the Rise The Federal Trade Commission (FTC) issued a consumer alert in April of 2021 after an increase in phishing attacks aimed at college students was discovered. Specifically, scammers have been emailing students and claiming to have important information about their tax refunds. These emails contain a link that, when clicked, asks for personal information that includes full names, Social Security numbers, birthdates, and even driver's license numbers. This information, if provided, is then used by hackers to steal identities. In some cases, personal information from students is being sold

Read more
Middleboxes for DDoS Attacks – How Do They Work?

Distributed denial of service (DDoS) attacks have been a well-known security threat for years – but in recent years, the size and scope of these attacks have increased many times over. Today, DDoS attacks are one of the most widespread threats on the Internet. And unfortunately, the effects of these attacks are becoming even more devastating as hackers begin utilizing a new strategy to maximize their impact. Specifically, hackers use middleboxes to amplify their attacks. By understanding this growing threat and what it entails, you can take the steps needed to avoid becoming a victim. What Are Middleboxes for DDoS Attacks? With a "traditional" DDoS attack, hackers flood a packet with traffic from multiple sources, with the ultimate goal being of overwhelming a server. Now, however, hackers realize that they can maximize the impact of their attacks by using an amplification strategy known as a middlebox. So, what are middleboxes?

Read more
Zero-Day Attacks – What Are They & Why Are They So Dangerous?

These days, it seems that it's more complicated than ever to keep your information safe on the web. Threats ranging from spyware and ransomware to phishing attacks and DDoS attacks keep web users on their toes. And when attacks are successful, the aftermath can be devastating for individuals and organizations alike. One type of concerning attack that we're beginning to see more of across the web is a zero-day attack. With a better understanding of these attacks, why they're so dangerous, and what mitigation options are available, you can take steps to keep your data safer. What is a Zero-Day Attack? Specifically, a zero-day attack refers to an attack that is carried out by hackers who are aware of a security vulnerability before the software's developers do. As a result, hackers can do a lot of damage before developers get a chance to pinpoint the vulnerability and come up with

Read more
How Firewall Appliances can be Targeted by Hackers

If you're like most computer users, you consider a firewall to be among your best lines of defense against online attacks. And up until recently, you would probably be right.  Unfortunately, recent events have revealed that firewall appliances, including wireless routers and other devices, can be just as vulnerable to malware attacks as any other Internet-connected device in your home or business. How Are Firewall Appliances Susceptible to Malware? In late February of 2022, it was announced that the notorious hacker group Sandworm had utilized malware (now known as Cyclops Blink) to infiltrate firewall devices sold by networking hardware company Watchguard. While the malware was just recently discovered, it has been tied back to firewall devices dating back to at least June of 2019. As of March 2022, it is suspected that the malware has infected devices across a wide range of countries, including: The United States Russia India Italy

Read more
Signature-Based Versus Behavior-Based Ransomware Detection

For years now, instances of ransomware have been on the rise. Specifically, ransomware refers to an online attack where a user's files are encrypted and/or corrupted by hackers. From there, the hackers demand payment of a ransom (often in the form of cryptocurrency) in order to regain access to their files. Despite the fact that ransomware is a greater threat than ever before, there are also more security tools available to keep you and your data safe. Two of the most common types of ransomware detection include signature-based and behavior-based. So, how do these two detection methods work, how do they differ, and which method is best for your needs? We have the answers, as well as some additional tips for protecting yourself from ransomware, below. Signature-Based vs. Behavior-Based: What's the Difference? Both signature-based and behavior-based ransomware detection can be extremely effective at pinpointing the source of ransomware attacks and

Read more
Double Extortion Causing Devastation

These days, it can seem difficult to keep up with all the latest security threats around the web. Unfortunately, it's important to stay on top of the latest in cybersecurity threats so that you can take the mitigation steps needed to keep your information safe. You've probably heard about ransomware, but now two forms of these attacks are seen more commonly - double encryption and double extortion. With some preparation you won't be caught off guard when it happens. Double Extortion vs. Double Encryption What is the difference between double extortion and double encryption attacks? Both are ransomware attacks that involve using multiple layers of attacks to maximize devastation and payouts. With a double encryption attack, a victim's data is compromised in two layers. You might be told right away that there are two encryption keys or alternatively, it might be a surprise after you already paid the first time.

Read more