Menu

e-bay Security Practices under investigation by US States      

Biggest ever Distributed Denial of Service (DDoS) attack on Cloudfare Networks       

Bitcoin Exchanges continue to suspended withdrawal operations      

Snowden accessed NSA confidential data using web scrapping tools      

Barclays Bank probing the breach of client data sold to rogue City traders      

New Snapchat Flaw Can DoS and Spam iOS and Android       

How Ransomware turns your computer into a bitcoin miner

Published on: 2/10/2014

Linkup is the latest ransomware asking victims for a payment to undo damage to their computers. Security researchers have identified a new type of “ransomware” which blocks internet access and turns users’ computer into a bitcoin miner pending payment of a ransom. The malware, named by researchers at Emsisoft as “Trojan-Ransom.Win32.Linkup”, differs from previous examples of ransomware. “It does not directly lock your computer or encrypt files,” the researchers explain. “Instead, Linkup blocks internet access by modifying your DNS and can also turn your computer into a bitcoin mining robot.”

Linkup is the latest ransomware asking victims for a payment to undo damage to their computers.

Security researchers have identified a new type of “ransomware” which blocks internet access and turns users’ computer into a bitcoin miner pending payment of a ransom.

The malware, named by researchers at Emsisoft as “Trojan-Ransom.Win32.Linkup”, differs from previous examples of ransomware. “It does not directly lock your computer or encrypt files,” the researchers explain. “Instead, Linkup blocks internet access by modifying your DNS and can also turn your computer into a bitcoin mining robot.”

When an infected computer loads up any page, they are taken to a fake website which accuses them of having viewed “child pornography” and demands payment of a €0.01 fine. The “payment” is taken by the user inputting a credit card number, making it extremely unlikely that the malware developers will limit themselves to just one cent; Emsisoft describes it as “most likely a blatant lie”.

Once installed, the malware also attempts to download bitcoin-mining software. When installed, the software uses the computer’s processor to perform the energy-intensive tasks used to mine for bitcoin, which runs the risk of damaging the machine and will certainly run up a large electricity bill.

Source: WSJ



Snowden accessed NSA confidential data using web scrapping tools

A senior intelligence official at NSA disclosed that Mr. Edward J. Snowden used very low cost web crawling tools to scraped data from NSA documents. Note that NSA have top grade security to protect against outside attacks and also responsible for protecting nation's sensitive military and intelligence computer systems from cyberattacks.
Read More

Possible misuse and loss of customer data at Barclays Bank

A whistleblower at Barclays bank raised the issue for possibility of data loss and subsequent misuse of approx. 27,000 files containing detailed personal data of Barclays customers and potential customers. The files may have reached in the hands of 'spank shops.'
Read More

2014 New Year Resolution: Disaster Recovery

Looking back, I can see at least three different New Year’s resolutions that I totally failed, but as CIO of a Tech Support Company, failure really isn’t an option. I am talking about backup and disaster recovery. Our failure means our client’s failure, and we won’t stand for that. In order to avoid failure in the disaster recovery area, it’s always best to plan ahead - and the beginning of a new year is one of the best times to do so. Please tak...
Read More

Q: What are some standard computer industry security best practices?

A: In answering this question we are extremely pleased to pass along technology and security know-how to you in this article. Here are some standard computer industry security best practices for you to consider. Install a Firewall Security Appliance. Security Appliances are special devices at the edge of your network that monitor the activity of external connections, primarily the Internet, to an internal network. Firewalls help to eliminate the...
Read More