BlackByte ransomware picks up where Conti and Sodinokibi left off

Exbyte is the latest tool developed by ransomware attackers to expedite data theft from victims.

Exbyte is the latest tool developed by ransomware attackers to expedite data theft from victims.

Symantec’s Threat Hunter Team has discovered that at least one affiliate of the BlackByte ransomware (Ransom.Blackbyte) operation has begun using a custom data exfiltration tool during their attacks. The malware (Infostealer.Exbyte) is designed to expedite the theft of data from the victim’s network and upload it to an external server.

BlackByte is a ransomware-as-a-service operation that is run by a cyber-crime group Symantec calls Hecamede. The group sprang to public attention in February 2022 when the U.S. Federal Bureau of Investigation (FBI) issued an alert stating that BlackByte had been used to attack multiple entities in the U.S., including organizations in at least three critical infrastructure sectors. In recent months, BlackByte has become one of the most frequently used payloads in ransomware attacks.

Inside Exbyte

The Exbyte exfiltration tool is written in Go and designed to upload stolen files to the Mega.co.nz cloud storage service.

On execution, Exbyte performs a series of checks for indicators that it may be running in a sandboxed environment. This is intended to make it more difficult for security researchers to … Learn more: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware

Contact us today: https://wehealcomputers.com;  We ensure your systems are secure, running
optimally & that you have help when needed!  Includes Document Backups!

#ITservices
#TechSupport #ComputerHelp #CyberSecurity

Beyond ransomware: A look at other malware threats

There continues to be a lot of focus on ransomware and how it continues to infiltrate companies and institutions. But ignoring “good old-fashioned malware” – a catch-all term for a huge grab-bag of nasty stuff, including DDoS, credential swiping, bank account scraping, and more – can come at a price.

There continues to be a lot of focus on ransomware and how it continues to infiltrate companies and institutions. But ignoring “good old-fashioned malware” – a catch-all term for a huge grab-bag of nasty stuff, including DDoS, credential swiping, bank account scraping, and more – can come at a price.

“With IT staffs being thin on company rosters and at MSPs, sometimes the resources get deployed to fend off ransomware or insider threats when there are still other threats that need to be monitored,” says Cecil Craig, a cybersecurity analyst in Phoenix.

Among those “other threats” are a variety of payloads. “And anecdotally, it seems like hackers are ramping up their efforts to breach systems using a variety of different techniques,” Craig says.

A round-up of recent headline-grabbing, non-ransomware malware incidents include:

Nullmixer: A new malware dropper that is infecting Windows devices with a dozen different malware families simultaneously through fake software cracks promoted on malicious sites in Google Search results. NullMixer acts as an infection funnel, using a single Windows executable to launch a dozen different malware families, leading to over two dozen infections running a single device.

“Malware like Nullmixer gives hackers a one-stop shop of sorts to deploy which can include password-stealing, and spyware,” Craig says. It can also drop trojans, backdoors, spyware, bankers, fake Windows system cleaners, clipboard hijackers, and cryptocurrency miners according to published reports.

Chaos: An IoT malware that is making the rounds and targeting certain verticals, including the financial services industry. Cybercriminals are using Google’s Go programming language to zero in on certain IoT devices.

According to ZDNet, Chaos exploits known but unpatched vulnerabilities in firewall devices to gain a foothold in a network. These include critical remote code execution flaws affecting Huawei’s HG532 wireless routers for homes and small businesses (CVE-2017-17215) and a newer flaw in Zyxel’s routers (CVE-2022-30525).

“And this just an illustration of the IoT ecosystem as a whole. It represents a real weak spot in so many systems. MSPs need to remain vigilant in protecting and securing IoT entry points,” Craig says.

Erbium: “A serious threat” is what one analyst calls this new malware.

Laptop Magazine describes Erbium as “a data and information-stealing tool that targets your passwords, credit cards, cookies, cryptocurrency wallets, and possibly more. Due to its rapid spread and availability, it could be adapted in the future to infect users in new ways.”

PowerPoint Malware: Bleeping Computer has reported that hackers thought to be working for Russia have started using PowerPoint as a means of distributing malware.

“Like the hackers hiding malware in the Microsoft logo, this is another example of hackers trading in on the good name of a brand. Most people trust Power Point and wouldn’t think of it as a vehicle for delivering malware and that is where hackers leverage their skills,” Craig says.

The malware distribution comes from the movement of the mouse in the Microsoft PowerPoint presentations to trigger a malicious PowerShell script.

Government Jobs: TechRadar reports that cybercriminals are preying on job seekers in the United States and New Zealand to distribute Cobalt Strike beacons, but also other viruses and malware as well. Per Tech Radar:

Researchers from Cisco Talos claim an unknown threat actor is sending out multiple phishing lures via email, assuming the identity of the US Office of Personnel Management (OPM), as well as the New Zealand Public Service Association (PSA).

The email invites the victim to download and run an attached Word document, claiming it holds more details about the job opportunity.

“While not everyone who is searching for a job is desperate, a job-seeker might be focused on other things and be more easily fooled by something they might not be at another time,” Craig says. He says MSPs need to be holistic in their security approach, cast a wide net, and be on the look-out for all vulnerabilities.

“You may have successfully fended off a ransomware attack, but other attacks can be just as devastating and if you aren’t looking for them all, you are undermining your own effectiveness,” Craig says.

Learn more: https://smartermsp.com/beyond-ransomware-a-look-at-other-malware-threats/

Contact us today: https://wehealcomputers.com; We ensure your systems are secure, running optimally & that you have help when needed! Includes Document Backups!
#ITservices #TechSupport #ComputerHelp #CyberSecurity

How to apply simple table formatting in Microsoft PowerPoint

In Microsoft PowerPoint, you don’t need to create a table style from scratch; instead, learn how to apply a style and tweak it to get quick, professional results.

In Microsoft PowerPoint, you don’t need to create a table style from scratch; instead, learn how to apply a style and tweak it to get quick, professional results.

Tables are common elements in Microsoft PowerPoint presentations, and the more succinct and clearer, the better. You can build tables from scratch or copy the table from another program and applying a built-in table style makes this route quick and easy. As a bonus, all PowerPoint table styles are based on Office themes so maintaining consistency is almost effortless.

In this tutorial, I’ll show you how to quickly style table data copied from a Microsoft Excel Table using built-in table styles in PowerPoint. The easiest way to get a clean simple design is to start with a PowerPoint table style and remove the formats you don’t want or add the ones you do. Starting with a ready-to-go style is faster than starting from scratch and offers opportunities to explore. Learn more: https://www.techrepublic.com/article/table-formatting-microsoft-powerpoint/

Contact us today: https://wehealcomputers.com;  We ensure your systems are secure, running
optimally & that you have help when needed!  Includes Document Backups!
#ITservices #TechSupport #ComputerHelp #CyberSecurity

Phishing attack spoofs Zoom to steal Microsoft user credentials

Targeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox.

Targeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox.

Phishing attacks work by impersonating a familiar or trusted brand, product or company, often with the goal of tricking recipients into divulging sensitive account credentials. That’s exactly the case with a recent phishing campaign analyzed by security firm Armorblox in which the attacker spoofed Zoom in an attempt to compromise Microsoft user credentials.

How the attack worked

Aimed at more than 21,000 users at a national healthcare company, the phishing email included a subject line of “For [name of recipient] on Today, 2022” with each user’s actual name listed as the recipient. Displaying the Zoom name and logo, the email itself claimed that the person had two messages waiting for their response. To read the alleged messages, the recipient had to click on a main button in the body of the message.

The main button would have taken users to a phony landing page spoofing a Microsoft login site. At the site, the victims were instructed to enter their Microsoft account password supposedly to verify their identity before they could access the messages. The landing page already populated the username field with the person’s actual email address to further lull them into a sense of security. Naturally, any Microsoft passwords entered at the page would then be captured by the attackers.

Sent from a valid domain, the initial phishing email evaded Microsoft Exchange email security controls as it was able to pass the usual email authentication checks, including DomainKeys Identified Mail, Sender Policy Framework, and Domain-based Message Authentication Reporting and Conformance. Learn more: https://assets.armorblox.com/f/52352/x/d893e1fdc6/armorblox-2022-email-security-threat-report.pdf

Contact us today: https://wehealcomputers.com;  We ensure your systems are secure, running
optimally & that you have help when needed!  Includes Document Backups!

#ITservices #TechSupport #ComputerHelp #CyberSecurity

How to use Microsoft Outlook’s Quick Steps to quickly respond to emails

If you respond the same way to lots of emails, use Microsoft Outlook’s Quick Steps feature to respond with a quick click.

If you respond the same way to lots of emails, use Microsoft Outlook’s Quick Steps feature to respond with a quick click.

If you’re on your organization’s email front line, you probably receive a lot of messages that go nowhere. For instance, you might receive frequent emails asking about employment opportunities. If your company isn’t hiring, answering each request manually can quickly become a nuisance for you.

Wouldn’t it be great if you could just click a button and have Outlook respond with a generic response and then delete the message?

In this tutorial, I’ll show you how to use the Outlook Quick Steps feature to send an automated reply and then delete the message you’re replying to. I’m using Microsoft 365 on a Windows 10 64-bit system, but you can use earlier versions down to Outlook 2013. Outlook Mail (online) doesn’t support Quick Steps.

What is a quick step in Outlook?

The Quick Steps feature lets you set up actions that Outlook executes when called. You can apply multiple actions to the same quick step. You can choose a template or … Learn more: https://www.techrepublic.com/article/use-microsoft-outlook-quick-steps-respond-emails/

Contact us today: https://wehealcomputers.com;  We ensure your systems are secure, running optimally & that you have help when needed!  Includes Document Backups!

#ITservices #TechSupport #ComputerHelp #CyberSecurity

How to work with long documents in Google Docs

Prudent use of styles, stars, @ file mentions and more make Google Docs and Drive a powerful tool for longer and larger writing projects.

Prudent use of styles, stars, @ file mentions and more make Google Docs and Drive a powerful tool for longer and larger writing projects.

Navigation techniques, writing time, and the need for related content and collaboration may all differ when you work with long Google Docs. With a file of a few hundred words, it takes little time to scroll from beginning to end. With a long Google Doc, however, scrolling may not be the best way to navigate.

Many short files are short term projects, started and completed within minutes, hours or days rather than the weeks, months or years that you might labor on a long Google Doc.

Often, short Google Docs are self-contained, with no need for other files, while some long Google Docs rely on folders full of relevant reference and source material. Additionally, you might want to collaborate with people for a particular portion of content for a long Google Doc, rather than sharing access to your main file as you might with a short Google Doc.

The sections below cover how to … Learn more: https://www.techrepublic.com/article/work-with-long-documents-google/

Contact us today: https://wehealcomputers.com;  We ensure your systems are secure, running
optimally & that you have help when needed!  Includes Document Backups!

#ITservices #TechSupport #ComputerHelp #CyberSecurity