The original version of Petya had a signature attack that struck the master boot record, restricting access to it until a ransom was paid through a dark web payment portal. Of course, there was no guarantee that paying up would resolve the problem, so it was entirely possible that the ransomware could add insult to injury and not decrypt the files at all. Thankfully, Petya had a weakness, and professionals were able to exploit it and find a fix for the ransomware. Not this time, though. Petya comes with Mischa, which is a more traditional ransomware that can be just as dangerous as its counterpart. Mischa blocks access to files until the user pays a ransom. The ransomware will then link to a Tor payment site that allows the user to pay up and decrypt their files. Mischa encrypts executable files, while leaving the Windows and browser folders untouched, which provides access to files containing payment instructions for the user. Now, here?s the problem with this development. Petya could be prevented by refusing administrator access upon downloading the installer. Now, selecting ?yes? will download Petya, while selecting ?no? will install Mischa. Either way, you get a slap in the face. Mischa?s payment site works in largely the same way as Petya?s. Once you input the authorization code provided by the ransomware, you need to purchase enough Bitcoins to pay for the ransom. The current exchange rate is approximately $875 per Bitcoin, so you might be shelling out some heavy-duty cash for this. Once the user has purchased enough Bitcoins, the malware will then provide the Bitcoin address where it must be sent. Though researchers managed to find a way around Petya, no such workaround has been found for Mischa. This is a recurring theme for ransomware, which is often so difficult to remove, that it forces large enterprises to either restore a backup of their data, or pay the ransom, rather than lose access to their files completely. As with all cases of malware, we urge you to do your research, and contact White Mountain IT Services at (603) 889-0800 before caving into hackers? demands. As with all threats that work, Petya and Mischa have plenty of copycats out there that attempt to replicate their success. Malwarebytes has identified another two-in-one ransomware called Satana that functions in a similar way, locking the master boot record and the complete file record. In comparison to Petya and Mischa, however, Satana will run both types of ransomware, rather than just install one or the other. Malwarebytes reports that Satana is still in development and has flaws that can be exploited, but the thought of malware continuing to develop in this sense is a bit unnerving, especially for business owners that may not devote enough time and resources to security solutions. If your business is unsure of whether you can handle a ransomware infection, reach out to us at (603) 889-0800.
With today?s great technology solutions, working remotely is no longer just a dream. Many businesses have either a partial or a complete remote staff, and it?s all held together by modern technology solutions. However, even with the latest tech, the remote worker still has to invest in their own success. If you work remotely, here are four ways that you can maximize your productivity and keep yourself from getting in the way of your best work. Have a Dedicated OfficeYou might have your own cubicle or office space at your workplace, but when you work remotely, you often have to get creative. You could turn a booth at a restaurant into a workspace, or your living room sofa into your office. However, this is often counterproductive and distracting. Instead of hoping to get work done away from your desk, you should arrange to have a dedicated home office with lots of space and privacy. This should be the place where you go to get good, solid work done; where all of your files and technology solutions are located. Also, it helps to avoid working in busy public places whenever possible, like coffee shops and restaurants. Set Specific Rules for Your Family and VisitorsIf you?re going to work remotely, this will often mean setting up a home office where you can go to get your best work done. If you have a family that?s always at home, it can be distracting. You need to set clear boundaries so that they know when it?s a good time to drop by your office. Furthermore, it?s a good idea to limit what you should be doing during the workday. It?s one thing to take a short break to handle some minor chores, but another entirely to get distracted by multiple large tasks. Working remotely is a privilege, and as such, you need to stay productive in order to retain this flexibility. Keep Working Until the End of Your ShiftWhen you work remotely, you might have the impression that taking an early-out might not be a big issue. However, this can be a slippery slope; one day you?ll start taking more and more time off of the end of the day, and before you know it, your work performance will suffer and you won?t have anyone to blame but yourself. Plus, if you continuously abuse this privilege, you might ruin the opportunity to work remotely for the rest of your coworkers. Use the Right Technology SolutionsRemote workers are only as effective as the tools that they use to get work done. This is why businesses often have to implement proper technology solutions, like virtual private networks and Voice over Internet Protocol communications, to ensure maximum protection for their investments and productivity for their employees. If your organization could use a tech revamp to accommodate remote workers, White Mountain IT Services can help. For more information about how to keep your remote workers productive, contact us at (603) 889-0800.
That?s right, the act of sharing your Netflix password (or your password for other online services like HBO Go, Hulu, etc.) can potentially land you in the hot seat with the Federal Bureau of Investigation. How Did This Happen?Oddly enough, this ruling wasn?t handed down as a result of users illegally sharing their Netflix passwords. Instead, this crackdown on all online password sharing activity was the side effect of a case involving a former Korn Ferry employee seeking legal action against his former work colleagues who still possessed valid user credentials that could be used to steal Korn Ferry data for use in his new firm. Unfortunately, Netflix password sharing became collateral damage as a result of this case. The specifics of this case have to do with a hacking charge under the Computer Fraud and Abuse Act, which effectively empowers the Justice Department to go after and prosecute anyone who violates an online Terms of Service agreement. You know, the pages of gibberish you scroll quickly through so you can get to the bottom and select, ?I understand and have read the Terms of Service.? Many computer users, including one of the three judges on the Ninth Circuit Court, believe that using CFAA in a situation like this is overreaching. In fact, this dissenting judge, Judge Stephen Reinhardt, said this about the ruling: ?This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (?CFAA?) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.? What?s This Mean For Fans of Password Sharing?This ruling effectively gives companies like Netflix legal precedent to go after users who violate the Terms of Service agreement by sharing their passwords, an arguably harmless action that many are guilty of. Under the Terms of Service agreement, if you?d like to share a password with a friend, you must first ask Netflix for permission; a time-consuming process that few people will actually do. Theoretically, companies like Netflix could crack down on violators of this law and prosecute the guilty as federal criminals, so you?ll want to be careful not to get on Netflix?s bad side. However, it?s unlikely that a Netflix-like company will go through with such legal action, seeing as the public outrage from a move like this would be a PR nightmare. Also, with everything the FBI has on their plate, it?s highly unlikely that they will dispatch agents to lock you up if you share your Netflix password with grandma… but they could. Thinking beyond password sharing, it?s concerning how this interpretation of the CFAA essentially makes anyone who violates a Terms of Service agreement (which, honestly, hardly anybody actually reads) a federal criminal. Therefore, moving forward, you may want to be more careful about what you agree to by clicking that little box. Also, in general, one shouldn?t share their password in the first place, especially when it comes to passwords that grant access to sensitive company information. Are you guilty of sharing passwords? If so, how do you feel about committing a federal crime? Share your thoughts with us in the comments.
While security experts tend to focus the brunt of their discussions on desktop OS vulnerabilities, there are plenty of mobile malware threats that fly under the radar. One such malware is called Hummer; a trojan that installs unwanted apps and malware on a device, and can be found on over a million phones worldwide. About HummerThe Hummer malware family has increased over the past year. At its peak activity, Hummer infected nearly 1.4 million devices every day. It?s thought that Hummer originated in China, and it has been known to infect over 63,000 devices daily in China alone. Granted, the spread of infections has dramatically decreased, but this hasn?t stopped Hummer from infecting about 1,190,000 devices. As reported by TechRepublic, here are the top five countries and the number of devices that are infected by the Hummer malware: India: 154,248 Indonesia: 92,889 Turkey: 63,906 China: 63,285 Mexico: 59,192 What It DoesHummer roots devices that it infects, which can unlock the operating system and allow for administrator privileges. Once it has infiltrated the device and unlocked it, Hummer will install malware, unwanted applications, games, pornographic applications, and other malicious and annoying programs. Since Hummer roots the device, your traditional antivirus and anti-malware programs aren?t going to be enough to get rid of it. Yet, perhaps the most dangerous part of this malware is that you can?t uninstall the unwanted apps. Well? you can, but the trojan will just reinstall the apps, which is both frustrating and a terrible use of your mobile data. Cheetah Mobile ran a test on the Hummer trojan and came to some shocking results: “In several hours, the trojan accessed the network over 10,000 times and downloaded over 200 APKs, consuming 2 GB of network traffic.” It?s clear that you don?t want this malware installed on your device, as it could jack up your phone bill and become an immense annoyance. How to Fix ItTo make matters worse, wiping your device won?t even be enough to get rid of the trojan. Cheetah Mobile claims that the factory reset won?t remove it. Users could also flash their device, but this can get complicated, and we don?t recommend doing so if you have no clue what you?re doing. Hummer isn?t the first mobile malware, and it certainly won?t be the last. Users of smartphones have to be just as cautious and vigilant as desktop users. To learn more about mobile malware and other threats, reach out to us at (603) 889-0800.
This year, for the month of June, the total number of gamers using Windows 10 for Steam, in both 32-bit and 64-bit format, reached 44.6 percent. This presents an increase of 3.41 percent from the previous month, and a 1.54 percent increase from the month before that. It?s safe to say that Windows 10 is ?picking up steam,? so to speak, but it seems that the free* upgrade is likely playing into these gamers? decisions to make the upgrade to Microsoft?s latest operating system. And, well, why wouldn?t it? Gamers want to take advantage of this opportunity to improve their experience while they still can. *FREE WINDOWS UPGRADE EXPIRES THIS FRIDAY! Of course, not all Steam users utilize Windows 10. 36.97 percent of Steam users have Windows 7 installed on their PCs, which is down 2 percent from last month. Windows 8 and 8.1, however, make up about 12 percent of Steam users. Altogether, Windows users account for about 95.5 percent of gamers on Steam, while OS X retains about 3.6 percent, and Linux snags a paltry 0.8 percent. Whether you?re a gamer or not, there?s no denying that there?s at least one lesson to be learned from these statistics, and it?s that the latest operating system for your Windows computer is needed if you want to get the most out of it. Gamers are often known for their meticulous attention to PC performance and specifications, so it?s no surprise that we see such a huge increase in Windows 10 statistics concerning PC gamers. If anything, this should be a testament to how valuable the latest software solutions can be for your business?s workstations. Gamers take their hobby seriously, and they want only the best and brightest way to experience their entertainment. Why shouldn?t you try your hand at experiencing greater productivity and efficiency with Microsoft?s latest operating system? If you haven?t yet upgraded to Windows 10, the fact remains that it?s a great operating system that can keep your business running throughout the near and not-so-distant future. White Mountain IT Services?s technicians can help your organization implement it in the best way possible. It?s important that you assess your current needs and ensure that Windows 10 is compatible with your legacy applications and software solutions. In this scenario, it?s best to have the expertise of a professional to lean on. To get started, reach out to us at (603) 889-0800. And who knows? Maybe Windows 10 will help your business achieve its next high score.