Information Technology News & Information

Can Antivirus Software Be Trusted?

The Project Zero team at Google looks for defects in various software products. A researcher named Tavis Ormandy takes part in this effort. He recently identified serious security weaknesses in an assortment of Symantec and Norton utilities. The company quickly corrected these vulnerabilities after he reported them. Problems Ormandy has found security flaws in antivirus programs from several developers, such as McAfee and Trend Micro. Nonetheless, he was particularly critical of Symantec. The researcher noted that its utilities allowed links and files to infect PCs even if users didn’t open them. This made computers especially vulnerable to “worm” viruses. He went on to accuse Symantec of failing to adequately examine its software for weaknesses. Ormandy pointed out that the company used open-source code that wasn’t updated for seven years. Back in 2014, a vice president at Symantec termed antivirus utilities “dead” and called them “no longer… a money-maker in any way.” Repairs The above-mentioned quote might explain why some security companies need help from other organizations to secure their software. Google’s researcher developed an exploit that fixed the problems in affected Symantec and Norton products. Ormandy described it as “100 percent reliable.” Users can activate it via the Web or email. The fix patches vulnerabilities in Symantec Endpoint, Norton Antivirus and various other utilities. It works on Windows and Macintosh systems. In some cases, administrators may need to activate updates before the problem is corrected. The good news is that most of these programs install patches automatically. Prevention This situation highlights an important fact: Antivirus software doesn’t always succeed in protecting your PC. When programming flaws exist, it could even create additional risks. Businesses may maximize security by taking steps to completely avoid viruses. They can accomplish this by regularly installing software updates and securing any Wi-Fi networks. Prohibit unnecessary activities Promote virus and phishing awareness Password-protect wireless Internet When employees needlessly use torrents, instant messaging or social media, they put the entire office at risk. Businesses may minimize such problems by configuring firewalls to block unnecessary ports. They can also establish clear policies regarding appropriate use of the Internet. “Phishing” attacks often compromise passwords and other credentials, making it possible for criminals to hack into company systems. Staff members need training to avoid this type of deception. TechTarget notes that numerous phishing attacks may be prevented if employees simply never click on email, blog or chat links. Criminals can more easily gain access to passwords when they learn specific details about important staff members. Hackers might trick these individuals with personalized “spear phishing” campaigns. Companies should discourage key employees from sharing too much information about themselves on public webpages, such as blogs and personal websites. Downloads Malware frequently infects business computers when staff members use software from little-known developers. Companies ought to create policies that only permit employees to download and install vital programs. Such applications should always come from reputable software firms via major websites or professionally manufactured CDs. Employees must know the signs of a malware infection. When all websites load slowly or programs repeatedly malfunction, they should report the problem to IT personnel and avoid entering sensitive data. It’s crucial to inspect a potentially infected computer and take action as soon as possible. Otherwise, malware could steal passwords and inflict much greater harm. It’s not realistic to believe that you can successfully prevent or remove every virus. Regular backups will make it feasible to eliminate any malware by reinstalling the operating system and safely restoring data. Businesses depend on {company} to keep them up-to-date on today’s IT news and tips. Please dial {phone} or contact {email} for further details.

Information Technology News & Information

Is the Government Spying on You?

Judge Rules No Warrant Needed for FBI to Hack Private Computers   In taking the epidemic of hacking to a whole new level, a judge for the federal court for the Eastern District of Virginia has ruled that private citizens have no expectation of privacy on their home computer systems. His reason? The simple fact that computers connected to the Internet are not sufficiently immune from invasion by outside forces. In elaborating on his opinion of the matter, the judge declared that users connected to the Internet shouldn’t expect privacy because computer security is ineffective at stopping hackers from gaining access. Talk about a slap in the face, and a veritable compliment for the hacking community at large. The hacker’s underground habit of infiltrating every cybersecurity defense they are confronted with has now afforded a court the basis upon which to refocus these attacks on our own helplessness, and indirectly, our freedom. Hacking has officially become mainstream. Even law enforcement has been working the dark web, it seems. FBI Uses Dark Web to Monitor Alleged Criminal Activity The ruling above came in after one of the many FBI cases involving the infiltration of PlayPen, a hidden child pornography service on the Tor network. The investigation resulted in the prosecution of hundreds of individuals. To uncover suspects’ identities, the FBI hacked into PlayPen for two weeks using NIT, or “network investigative techniques.” The NIT used by the FBI ran on a visitor’s computer and identified the visitor’s IP address, so they looked nothing like law enforcement when they interacted on the platform. It worked, but apparently the warrant was unnecessary. Judge Says Warrant Is Basically Unnecessary for Government to Hack Into User’s Computers This procedure basically amounts to mass hacking on a single warrant, which has obvious privacy implications in an age where the Internet is in everyone’s back pocket. Though digital rights and privacy advocates have protested the practice, the judge upheld the warrant process in this case and stated that the warrant was completely unnecessary, partly because the charges involved child pornography—and because users really shouldn’t have any expectations of privacy when it comes to their home computer activities. The judge went on to clarify in his ruling that even a user who has gone to great lengths to hide his activities on the dark web by way of the Tor network does not mean that he should expect his activities or location to remain private. In these situations, the judge explained, a user’s subjective expectation of privacy in and of itself is “not objectively reasonable.” So, because hacking and cyber attacks are out of control in the current Internet climate, the judge has basically said that a mere expectation of privacy while online is no longer a reasonable one. Law Enforcement May Now Feel It’s “Open Season” On User’s Networks The digital rights group Electronic Frontier Foundation (EFF) has warned that the judge’s ruling is particularly dangerous because potentially unauthorized parties—including law enforcement without a warrant—may now feel that any computer connected to the Internet is fair game and open for exposure and investigation. Though the public has little sympathy for the defendant’s plight (the man allegedly participated in child pornography and downloaded thousands of images from PlayPen), the verdict could set a precedent that affects the general public at large. Attorneys for EFF are concerned that law enforcement, in particular, will interpret the court’s ruling to mean that they no longer need warrants to spy on suspected online criminal behavior. It’s a dangerous precedent, and we only have the relentless persistence—and consistent, nearly unstoppable success—of hackers and other cyber criminals to thank for it. {company} is your trusted IT servicer when it comes to staying at the forefront of the latest IT security issues, news, and innovation. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

A Dangerous Loophole: Lenovo’s Security Mishap

Why Lenovo is telling users to remove an application because of a dangerous loophole. Lenovo has been urging its users to remove one of its applications after the discovery of a serious vulnerability. Let’s look at the definition of the vulnerability and what it does and how it works. Here’s why Lenovo is advising users to remove a certain application. The Security Flaw in Question The Chinese Multinational Technology Company discovered a serious RCE vulnerability in Lenovo, which resulted in a publication of a security advisory covering the flaw. The flaw identified was found in the Lenovo Accelerator Application software, which made it possible to exploit a user with “man-in-the-middle” tactics. The reasons why the Accelerator application is used is because it speeds up Lenovo applications for launch. This application is installed on some desktops and notebooks using the Windows 10 operating system, but it does not affect ThinkStation or ThinkPad devices since it was never installed on these products. Why Man-in-the-Middle Attacks Are an Issue A man-in-the-middle attack can pose a serious threat to anyone who values his personal information. These attacks often occur on vulnerable web browsers with an infected server or a malware variant (on an infected machine) that has surveillance capabilities. Man-in-the-middle attack campaigns are utilized on an individual to steal and intercept personal information, financial data and their login credentials. Sadly, many users don’t even realize that they’re being attacked until it’s too late. How to Avoid a Man-in-the-Middle Attack A good way to avoid a man-in-the-middle attack is to look into the programs pre-installed on your computer after you initially purchased the machine. Many computers (whether desktop or laptop) come with installed “bloatware,” which are programs that claim to add value but actually do little when helping a computer initially boot up. Free software trials, vendor support, applications or vendor hardware — and many more — all add a shortcut that launches your browser to a specific website. The end result is that these shortcuts leave opportunities for hackers, so removing the links may be the best way to prevent an attack. It’s important for a business to understand the applications and programs it works with. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Paying Off Ransomware Is a False Savings

It started with personal computers and then morphed to attack business data. The “it” is ransomware, and it is the latest way that black hat hackers have caused concern for individuals and businesses alike. Ransomware is when an outsider gains control of your computer from an email you opened or a file you downloaded. The hacker criminal gains control of your computer and locks you out. He or she now has complete control of your computer and offers to unlock it for a fee. In legal terms, the criminal is extorting you for money in exchange for data that is already yours. Ransomware has proven to be very lucrative for hackers; the very existence of ransomware on a computer instills panic and fear into the victims in that the hackers have control of your data. If your system is infected with ransomware, messages you see may include: “Your computer has been infected with a virus. Click here to resolve the issue.” “Your computer was used to visit websites with illegal content. To unlock your computer, you must pay a $100 fine.” “All files on your computer have been encrypted. You must pay this ransom within 72 hours to regain access to your data.” Yet, paying the ransom offers no guarantee that the hacker will release your files. Protecting against ransomware isn’t hard, yet most businesses pay the ransom without protecting themselves from another attack. Steps to Take to Decrease Vulnerability to Ransomware Backup — You may already back up your data to the cloud where it remains secure. But, if your computer is locked, migrating the data from an online source back to your computer system can be a convoluted process. So, in addition to your cloud backup and the backup to your hard drive, make a third backup that you store offsite. You only need to incrementally add to your offsite backup to keep it current. Automatic software available is that marks files for backup as you create them. Don’t open that! — The same people who kidnap your data are hackers who use phishing techniques. Usually, they spam you with email in the hopes you will open an infected file or download. If you don’t know the sender of an email, or if the email looks suspicious to you, DO NOT OPEN IT. This is the most effective and cheapest way to protect yourself and your company from ransomware. Educate users — Chris Doggett, senior vice president at Carbonite, which provides cloud backup services for individuals and small businesses, said: “I see far too many people who don’t know the security 101 basics or simply don’t choose to follow them. So the IT department or security folks have a very significant role to play [to educate users].” Patch when received — This sounds simple, but in reality, company policies and protocols may delay security and maintenance patches from being applied in a timely manner. Have your IT department review patch protocols and policies and recommend changes if they are in the way of applying them within 24 hours of receipt. Additionally, make sure you are running the latest versions of all your software and keeping it updated. Pull the plugs at the first sign of ransomware — If one part of your system is infected with ransomware, isolate it from the rest of your system. You want to do more than disconnect from the corporate network; you should disconnect your Wi-Fi and Bluetooth on all machines to prevent the infection from spreading. You will have little, if any, expense in protecting your data from being victimized by ransomware. Take the needed steps now by contacting us. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Does Facebook Spy on Me?

There’s little doubt that Facebook collects plenty of information about most Internet users. It employs activity logs, cookies and “Like” buttons to monitor both members and non-members. This helps the social network sell highly targeted advertising. Some recent rumors suggest it even uses smartphone microphones to spy on people. Claims Many Facebook members became especially concerned after viewing or hearing about a TV news report from Florida. It showed a communications professor demonstrate how Facebook appears to customize ads based on the words she speaks into the microphone. Nevertheless, she admitted that it may just happen coincidentally. Denial The top social network responded by denying it uses microphones to spy on users. It explained that the company only accesses this equipment when members specifically give it permission. Furthermore, Facebook claims the audio is solely used to automatically identify songs or TV shows for members. It offers an app that performs these tasks. Should we believe this denial? The Washington Post has expressed skepticism about the microphone-based spying theory and noted that little evidence exists. Nonetheless, the newspaper highlighted Facebook’s sophisticated tracking methods and stated, “You should definitely worry about your online privacy.” Hacking While Facebook may not actually spy on your conversations, no one disputes that it’s possible. Numerous hackers have succeeded in gaining access to microphones and cameras on victims’ devices. For example, the media recently reported on a new security exploit called “Metaphor.” It enables hackers to monitor smartphones and track their locations with GPS. As a director at Symantec told NBC News, “A mobile phone is the perfect spying device.” He warned that hackers can read users’ text messages in addition to watching and listening. One way to avoid espionage is to surf the Web and read email cautiously; malicious links help distribute malware that aids criminals. Prevention Many hackers use websites to give away free versions of well-known commercial apps. Such software may look and work the same as the original programs, but it contains hidden spyware that allows criminals to monitor your phone. For better security, only download software from Microsoft, Google or Apple websites. Examine app permissions Check phone bills carefully Avoid unnecessary apps Watch out for wireless networks that don’t require passwords. An unsecured connection makes it easier for hackers to attack your smartphone. When a suspicious app download fee appears on your monthly cell phone bill, it could mean the phone has been compromised. Don’t forget to install anti-virus software on your smartphone and any phones you supply to employees. This doesn’t have to cost a lot of money. Many reputable companies compete to offer inexpensive security apps for Android and iOS. Use caution when you download such programs; some hackers disguise malware as anti-virus utilities. You can also maximize security by keeping your smartphone in a signal-blocking case or pouch when you aren’t using it. This prevents the phone from transmitting your location and live audio or video. However, it also stops incoming calls from reaching you. Keep in mind that anyone who uses your smartphone could easily install spyware on it. A suspicious spouse or malevolent co-worker might even do this. Be sure to choose a hard-to-guess password, avoid leaving the phone unattended and think twice before letting anyone borrow it. Consider storing the device in a compartment or drawer with a lock. Smartphone spying has become a serious concern, regardless of whether it’s committed by Facebook, a distant hacker or someone you know. Remember to make security a high priority. Business owners trust {company} to keep them up-to-date on today’s IT news and tips. Please call {phone} or send messages to {email} for additional information.

Information Technology News & Information

Phishing Attacks Now Have Ransomware Payloads

Do you back up everything each hour when your system is busy, and at least once a day, if it is not? Do you disconnect your backup devices from your system when they are not actually backing up? You may have answered the first question affirmatively. However, if you answered the second, “No, I always keep my backup devices running,” you could be vulnerable to a phishing attack. Yes, your firewalls are secure, and Kaspersky or some other top antivirus software is watching your back. But you have another exposure that can open your front door to attacks. Here’s how phishing works: Your employee (or maybe your own child) receives this friendly looking (albeit bogus) email from someone they know or some organization they consider benign. The email has text to the effect “Wow! We really loved this picture of (insert entertainer’s name) at the last concert. Open the attachment (or click this innocent looking link) and see if you agree!” Whether the email has an attachment or link, two alternative bad things can happen: 1. The disguised .jpg attachment Everyone knows that a .jpg image is harmless, right? Wrong. Say the title of the image attachment is titled concert.jpg. What scammers actually do is bank on the fact that most computers hide extensions. The actual file extension is either .exe or .zip. So the file’s name is concert.jpg.zip. The zip (or .exe) gets hidden, but click on it and it goes to work. The work can be anything from spraying hostile code to inserting bots that take over your computer and also after your contact list to propagate outward. 2. The little link that could do damage Click on that link lure and you’ll be taken to a hostile site. The site is waiting to download the equivalent of digital landmines into your system. Or it could be a connection to the Darknet where this guy with a Russian-sounding name is waiting to kidnap your system through the pernicious ransomware attack. And now, the double ransomware whammy… Ransomware is not a new threat, having been around for several years. But as potential victims have grown wary of malware, and spam email is increasingly shunted to the junk box, crooks have adapted. Email phishing attachments might go beyond the social and look like an authentic invoice or electronic fax. According to the FBI, ransomware attacks “are not only proliferating, they’re becoming more sophisticated.” Where they were once just delivered through spam emails, now unwary web surfers can trip over legitimate websites with malicious programming, which takes advantage of unprotected end-user portals. The ransomware, once introduced, encrypts files on local drives, including anything else hooked up to the system–including backup systems and devices. A semi-final word about backing up If, despite all your precautions, a phishing attack is successful and you see that scary ransomware message on your computer monitor, you’ll have but two options: 1) pay the ransom, or 2) restore your system from an uninfected backup source. Paying the ransom brings no guarantee that whoever is holding your system for ransom will send the decryption code. They might, but they are just as likely to further infect your system with additional malware. However, if you followed the advice to run frequent backups on devices only connected to your system during the backup operation, you can recover. You will only lose data entered or changed after the last backup. Finally, the importance of a business continuity plan Nothing will cripple your business like shutting down access to your financial and other proprietary data. The lost revenues and extra expenses can cut deeply into a business’s bottom line, and business disruption insurance won’t cover the intangibles like loss of customer confidence. So a well-designed backup protocol is just one element of an agile business continuity plan. In the meantime, beware of bogus emails bearing dangerous attachments and links. Even if you know the originator, you can’t be sure they are not sending you a bomb disguised as a smooch. {company} is the trusted choice when it comes to staying ahead of the latest information on security threats, technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

PCI Requirement 12.4: What It’s About & What It Means for You

What the PCI Requirement 12.4 means for you and your business. Changes to the PCI Requirement 12.4 were released in April 2016 and raised an endless amount of questions. Thankfully, we’re going to explain some of the changes and what they mean for third party service providers and merchants. With this being said, here’s a look at what the PCI Requirement 12.4 means for you and your business. Why Updates Were Made Updates to the PCI Requirement were made simply because of the consistently rising rates of data breaches. In 2015 alone, there was 3,930 breaches that exposed over 736 million records (according to a report by Cyber Risk Analytics). With 288 breaches being incidents involving third parties and 64.6% of the breaches from hacking, updates had to be made to protect customers and ownership of their private information. Although the security market has dramatically changed over the past decade, the collateral damage associated with a data breach has only gotten worse. PCI has been very forceful in regards to the needs of contractual language between service providers, vendors, and third parties so that data is protected within their guidelines. PCI Requirement 12.4: What’s New? Such new requirements added to the PCI Requirement 12.4 are: For your information security policy, define the executive’s role and how it is related to the data security as a whole. For assessors, a requirement of the audit cycle is see how well Executive Leadership is disseminated and ingrained into everyday operations. If a customer can reach customer service and receive a consistent/concise response, the requirement has been met. For merchants, third parties, and service providers, each party needs to state their role and what they’re doing to ensure data security on their end. This means that each party needs to state specific responsibilities, service lines, groups, and divisions within their organization to meet the new requirements of PCI Requirement 12.4. Lastly, assessors are searching for organizations that effectively communicate how important security is for their organization and make it part of the company’s culture. Explaining how the organization is held accountable, designed, and structured in regards to client data is needed as part of the requirements (which is in addition to previous PCI requirements). So in consideration of the information above, it’s important to see where your business stands in regards to the PCI Requirement 12.4. Thankfully, {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

The Current State of Ransomware

Where ransomware currently stands in the world of technology. Ransomware has been running rampant throughout 2016, leaving victims stuck paying the cybercriminals’ demands or losing all their data. It has even gotten to the point that the FBI is warning individuals, businesses, police departments, government agencies, schools and hospitals of the increase in ransomware attacks. We will explain what ransomware is, how it has evolved, and how to protect yourself from these types of attacks. Find out about ransomware and where it stands in the world of technology. Early Ransomware Attacks Early ransomware attacks simply locked a person’s computer with an error message that stated: “Your Computer Is Infected” and provided a phone number for you to call. Calling the number directed you to a cybercriminal who would use social engineering, intimidation and threats to convince you into paying a fine. At the time, this wasn’t a practical approach since it required an individual to be available to answer the calls. Later versions utilized online payment features that removed the need for the cybercriminal to pick up the phone. CryptoLocker: Evil Evolved CryptoLocker was written by someone with a strict plan and an agenda to extort without compromise. When a computer was served with a CryptoLocker, it didn’t just send a block and a contact number. It encrypted files, photos and documents from the computer (without their knowledge) and made them inaccessible to the computer user. Word quickly spread as to the devastation CryptoLocker caused, which inspired copycat ransomware versions such as CryptoDefense and Cryptowall. Ransomware & The Future Ransonware encryption has evolved, and today, it can spread to an entire network of devices (instead of targeting one individual). This means that if one person clicks on a malicious link through an email, their entire network can be affected. Ransomware’s longevity is due to organizations not keeping backups and the willingness of users to pay ransoms for their own information. A few solutions, however, can render a malicious attack completely useless. Ransomware Prevention The most important factor to remember about ransomware and cybercriminals: A backup system can restore a system to what it was before the infection took place. Therefore, the Ransomware can be removed without making a payment to the cybercriminals. When cybercriminals can’t receive the ransom in question, their business model inevitably collapses. So when you’re trying to prevent cybercriminals from accessing your computer, it’s important to: Install layered security on all fronts (emails, etc.). Educate your staff about phishing campaigns. Keep your systems and software updated. Back up your information. In consideration of this information, it’s important to protect yourself from ransomware. Thankfully, {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Apple iOS 10 Features Miss the Mark: Dark Mode, Keyboard and Other Issues Leave Users Wanting More

In June, 2016, Apple introduced iOS 10, complete with upgrades to iOS 9, as well as a few fantastic secret features that the industry was expecting any minute. However, as with any great product, there are usually a few downfalls — and Apple products are no different. Several flaws and detractors exist in this latest relatively moderate upgrade to iOS 9: 1. Still No Sign of Dark Mode — Unless You’re Looking for tvOS Like Android, dark mode has been a high-demand, high-request feature for a while — and once again, Apple didn’t come through. It’s all the more glaring that Apple didn’t bring dark mode on board for iOS 10, since they used the same launch event to announce a new dark mode for the tvOS, which has only been around since late 2015. 2. Location of Widgets Leaves Much to Be Desired One of the biggest changes made in iOS 10 is Apple’s addition of widget support to the lock screen and certain app icons for 3D Touch capable devices, such as iPhone 6S and iPhone 6S Plus. But since they weren’t added to the home screen, they aren’t as easily accessible as they could be. Android’s flexibility with respect to widgets far outweighs Apples in this regard. Undoubtedly, users are getting a bit tired of the timeworn checkerboard design of the icons, and a change in this area would have been welcome and refreshing. 3. Basic Keyboard Omissions Mean Unnecessary Annoyance While Apple has made some huge gains in the design of stock iOS 10 keyboards, the original long-term plan was to make them more intelligent with respect to anticipating words and key strike analysis. Unfortunately, Apple has a long way to go on this development — its keyboard offering simply doesn’t keep pace with third-party keyboards such as Swiftkey and Google. More importantly, the Apple keyboard misses the mark on an even more important feature: One-handed and swipe-type mode are still not part of the picture. Rival keyboards have had this functionality for years. Even iPads got split keyboard typing a few years back, but for some reason, keyboard improvements just don’t seem in the cards anytime soon for dedicated iPhone users. A Few More Points of Contention With iOS 10: iMessage is still exclusive. Apple had the opportunity to integrate iMessage with Android, but it chose not to. File manager is nowhere to be found, but it should be part of the functionality since iPad is trying to take the place of laptops among users dedicated to the platform. Industry experts think this feature is a must-have for the iPhone to remain competitive as a file accessibility tool. Notifications remain a bit behind the times. While notifications have improved in the lock screen, this area remains a weak link in terms of Android functionality. Industry experts expect that this area won’t see any improvement this time around, or at least in the next year or so. Even though iOS 10 was officially unveiled, the platform remains in beta — and Apple has plenty of time to tweak and improve these shortcomings. The iPhone 7 and iPhone 7 Plus/Pro are not due out for at least three months, so Apple devotees can hang on to a bit of hope for some new, improved developments — at least for a little while. If you’re looking for an IT servicer that specializes in the latest Mac technology, {company} can help. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Shut Down: How Security Thwarted a 5-Year-Long $25 Million Heist

For a prime example of why companies need high-end security, take a look at how a bank thwarted a 5-year-long $25 million heist. If your business happens to work with highly sensitive data, it’s incredibly important that you have the best security systems available on the market. An excellent example of the type of protection a security system can provide occurred when a gang tried to hack $25 million from a bank, and the bank solved the problem. Here’s a look at how this heist was stopped in its tracks. How They Did It Since 2011, a group of financial hackers were allegedly stealing from bank accounts using a trojan called Lurk. Lurk operates via a form of steganography; whereas, a file is hidden away on a computer as something completely different. For example, a Lurk could pose as a video, audio or image file stored on a computer. In the bank heist, one of the victims found the Lurk in a pizza order. The cybercrime gang utilized Lurk and created a botnet of infected computers so they could launch attacks against media companies, businesses and Russian banks. They attacked large Russian organizations, such as Regnum, Metropol, Russian International Bank and Metallinvestbank. In Metallinvestbank’s case, the hackers gained remote access to their systems and transferred funds to accounts under their control. In total, the hackers seized $10.2 million from Metallinvestbank. How They Got Caught Sberbank (another one of the victimized banks) worked with the Federal Security Service and the Russian Interior Ministry on a mission to catch the hackers. This resulted in the Russian police getting involved to stop more fake money transactions that were running up to an estimated $30 million, which led to 50 people being detained in what was regarded as the country’s biggest bust of financial hackers. It was discovered that simply visiting a hacker’s rigged/copied site was all that was necessary for the cybercrime gang’s Lurk to infect the system. From there, the Lurk downloaded additional modules to steal passwords and login names for bank accounts. Therefore, it’s very important to stay one step ahead of hackers by implementing top-tier security. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.