Malware Alerts

25/02/2015

☣ PAYPAL EMAIL SCAM ALERT ☣

The subject of the email will be along of the lines of:  There is a problem with your PayPal account.

This email masquerades as an account action notice from paypal. Do not open the email it comes from an unknown sender:  test1@sumotori.ru

Hyperlinks all go to same address: http://cmd.login.paypal.fyd0ur.ppl1ss.com/us/cgi-bin/?e=3JFWIg4tiZXWiZROoA2WCYalrRgKAeyj1T0kdSsdb7Y=  Which will collect your details and give them to the malware author


———————————————————————-
Υοuг ΡауΡаl ассοunt nееdѕ уouг hеlр

Неllо Dеаг сuѕtоmег!

Рlеаѕе hеlρ uѕ tо Ьгіng уоuг ΡауΡаl ассount Ьасk іn oгder.
Untіl thеn, wе hаνе temрогагіlу гeѕtrісted уоur ΡауΡаl ассount ассeѕs.

Whеге іѕ thе ρгοЬlem?

Wе wаnt уоu tо сonfігm ѕomе of уouг ассount іnfoгmаtіon.

Whаt dо I dо now?

http://pауpаl.com/r/ULTWZPD/G96ABG/TU2BYPH/64X9Z4/HQFQW6/VB/h

Lоg іn tо уouг РауРаl ассount аnd gο tο уouг
соnflісt геѕоlutіon раgе. Тhеге уоu саn ѕеe whаt іnfогmаtіon exасtlу
wе nееd fгοm уοu to ѕuЬmіt . Αnd уοu саn ѕее аt а glаnсе,
thаt уοu саn ѕtіll uѕе thе funсtіοns of уouг РауРаl ассount .

Wе wіѕh уοu а lοt of ѕhoρρіng fun wіth ΡауΡаl ρауmеnts !

———————————————————————-
Соρугіght <©> 2014 ΡауΡаl. Аll гіghtѕ геѕегνеd.

———————–WPN———————-

02/12/2014

☣ EMAIL SCAM ALERT ☣

The subject of the email will be along of the lines of:
“Offence report – Penalty Number :xxxxxxx”
It will masquerade as an infringement notice.

There is a link in the email. DO NOT click on the link.
Infringement Notice Departments do not send emails.
Over the past day we have been noticing an increased circulation of a new Cryptlocker type Virus which will infect your computer and encrypt all usable files such as Word Document, Excel, Access, MYOB, executable files, etc.
This virus will infect the local machine then spread to network drives and encrypt files.
The scam involves you paying an amount of money to get a key to unlock the files; and yes, don’t hold your breath that you will get the unlock key.

There is no way to cleanly remove the virus from the machine or de-encrypt the files.

The only way to restore files would be to restore from a recent backup. Please make sure your backups are working!!
The machine we would recommend formatting and reloading from beginning.

The virus is spread by Email. The malware that that encrypts all files on a user’s computer is hidden in a link within the email.

Please delete the email immediately.

Infringement Notice Departments do not send emails.

· Make sure your Backups are working and you have a rotating set of drives or tapes through the week.

· Make sure your Antivirus is up to date.

· Please be aware of any emails that ask you to reply quickly or act fast.

· If the email is from someone you do not know, do not open it.

———————–WPN———————-

12/07/2014

Worried about Heartbleed attacks on your network? Scan now with this free tool from TripWire:

http://www.tripwire.com/securescan/

———————–WPN———————-

29/04/2014

Don’t use IE: U.S. Government issues major warning over Internet Explorer bug and says hackers are ALREADY exploiting it

The U.S. Department of Homeland Security has advised computer users to abandon Microsoft’s Internet Explorer browser.

Full Story:
http://www.dailymail.co.uk/sciencetech/article-2615209/US-Government-issues-major-warning-Internet-Explorer-bug-say-hackers-ALREADY-exploiting-it.html

———————–WPN———————-

11/04/2014

Heartbleed: What is it? What Should You Do?

Heartbleed is a major security vulnerability that may affect nearly two-thirds of websites and could potentially expose login and other sensitive user information.

Here’s what the vulnerability means to you and how you can protect yourself and your organization.

What is Heartbleed?

Heartbleed is not a virus. It is a mistake written into OpenSSL—a security standard encrypting communications between users and the servers provided by a majority of online services. The mistake makes it possible for hackers to extract data from massive databases containing user names, passwords and other sensitive information.

What Should I Do?

First, check to make sure your online services, like Yahoo and PayPal, have updated their servers in order to compensate for the Heartbleed vulnerability. Do not change your passwords until you’ve confirmed that they have done this. Heartbleed primarily affects the server end of communications, which means if the server hasn’t been updated, changing your password will not have the desired outcome.

When changing your password, remember to:
Create unique passwords for every site you use. Every password you use should have a minimum of eight characters containing letters, numbers and symbols.
Try not to duplicate passwords on multiple sites . This prevents hackers from gaining access to other accounts that use the same password.
Use a password manager. Remembering unique passwords for every site is nearly impossible. Password managers can do this for you. Additionally, they can protect you from malicious software that records your keystrokes and, by extension, your password.
Enable two-factor authentication. Two-factor authentication is a security technique that requires you to have something you know, like your password, and something you possess, like your phone. Not all websites have two-factor authentication in place, but if they do, you should enable it.
How Do I Check for Heartbleed?

The website Mashable has a list of popular websites affected, but keep in mind that this list is not comprehensive. If you’re concerned that a website you frequent has been compromised, you can check by using McAfee’s Heartbleed Test Tool. If a website shows up as compromised, that means it has not been updated and you should wait to change your password.

Services or sites you subscribe to online will probably be sending emails to you over the next few days letting you know if they were affected by Heartbleed and that they have updated their servers. When you get these emails, you should go and update your password. But beware: this is a prime time for phishing attacks which impersonate services in order to steal your credentials. Take extra careful when viewing these messages.

– See more at: http://www.mcafee.com/us/microsites/sns-jnl/2014-04-epo-jnl.html?jl=awareness#awareness

———————–WPN———————-