Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

Focused in Russia and Ukraine but also spotted in Bulgaria, Germany, and Turkey, Bad Rabbit shut down Russia’s Interfax Agency--a major news outlet--as well as Ukraine’s Kiev Metro, the Odessa International Airport, and both the Ministry of Infrastructure and the Ministry of Finance. The attack on Kiev Metro was found to leverage Diskcoder.D, yet another variant of the infamous Petya ransomware.

Fortunately, there is a considerably lesser chance of Bad Rabbit repeating what WannaCry managed to accomplish during its spread across Europe and, to a lesser extent, North America. This is because, instead of relying on a worm as WannaCry did, Bad Rabbit uses a server message block vulnerability called EternalRomance to spread, after being downloaded while disguised as an Adobe Flash installer on legitimate websites. It would also appear that Bad Rabbit and NotPetya (another significant ransomware attack) were deployed by the same threat actor, as 67 percent of their codebases are the same.

There is also evidence that this threat actor is a Game of Thrones fan, as the code strings used in Bad Rabbit include character names from the novels and television series.

Unfortunately, Bad Rabbit should not have been able to spread as far as it has, as Microsoft released a patch for EternalRomance in March, when the EternalBlue vulnerability was also patched. This makes this attack yet another example of why it is crucial to install patches and updates when they are released--if the organizations affected by Bad Rabbit had done so, they would not be in the position they are now.

Computerware can help you make sure that your systems are not left vulnerable to attacks like this by managing your patches and updates for you. Reach out by calling (703) 821-8200 for more information.

Tip of the Week: It’s Easy to Color-Code Your Goog...
Security Should Come In Two Parts


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 20 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Workplace Tips Business Computing Hackers Productivity Backup Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Small Business Gadgets Smartphones Business Continuity Mobile Devices User Tips Mobile Office Disaster Recovery Computer Network Security Virtualization Network Microsoft Office Server VoIP Windows 10 Miscellaneous Upgrade Social Media Mobile Device Management Windows Unified Threat Management Ransomware Android Smartphone Innovation Passwords Operating System Remote Computing BYOD Communication Remote Monitoring WiFi Vendor Management Mobile Computing Apps The Internet of Things Marketing Holiday Collaboration Facebook Users Managed IT services Firewall History Apple Data Management Analytics Save Money IT Consultant Outsourced IT Alert IT Support Big data Content Filtering Health Managed IT Services Phishing Bring Your Own Device Productivity Automation Office App Lithium-ion Battery communications Hard Drives Budget Windows 8 Artificial Intelligence Tech Support Managed IT Best Practice BDR Spam Going Green Hiring/Firing Outlook Wireless Technology Search Virus Browser Employer-Employee Relationship Encryption Phone System Data Backup Help Desk Antivirus Printer Cybersecurity Information Technology IBM Gmail Maintenance Internet of Things Recovery Update Proactive IT Computers Customer Service Humor Travel It Management Education Law Enforcement Data storage Save Time Mobile Device Document Management Legal Money Saving Time Running Cable SaaS Administration Government Bandwidth Word Risk Management Password Digital Payment Black Market Cost Management Hacker Networking Tablet PowerPoint Telephone Systems Social Networking Fax Server Training VPN Two-factor Authentication Twitter Disaster Wireless Website Securty Hard Drive Solid State Drive Avoiding Downtime iPhone Mobility Business Intelligence Flexibility Hacking Current Events Windows 10 Office 365 Computer Repair User Intranet Hosted Solution DDoS Data Recovery Cybercrime Patch Management Google Maps Compliance Chrome Cortana Cloud Computing Router Hack Computer Accessories Comparison Downtime Business Growth Customer Relationship Management Co-managed IT Processors Project Management Telephony USB Monitors Augmented Reality Presentation Company Culture YouTube Lifestyle Virtual Desktop Text Messaging Settings Unified Communications Documents Programming Heating/Cooling End of Support Public Cloud Politics Net Neutrality Retail Experience Scam Automobile Pain Points Google Docs Laptop Excel User Error How To Trending Office Tips Start Menu Paperless Office Taxes Statistics Gaming Console Safety Software as a Service Social Sports Webcam Access Control Uninterrupted Power Supply Computing Network Congestion Streaming Media Robot Inbound Marketing IT service cache Virtual Reality CCTV Analytic Music Leadership Turn Key Social Engineering Upgrades Bluetooth In Internet of Things Device Management LiFi Trojan Data Loss Public Speaking Corporate Profile Assessment Computing Infrastructure Emails Organize Redundancy Entrepreneur Rental Service Deep Learning Scalability Memory Business Managemenet Visible Light Communication Data Breach VoIP online Currency HIPAA Consultation Electronic Payment Wi-Fi Meetings Cabling Private Cloud Flash Administrator Mouse Advertising Audit IP Address Supercomputer Google Wallet Human Resources GPS Emergency Worker Displays Machine Learning Distributed Denial of Service Skype Harddrive Computer Care Mobile Technology Google Drive Banking Employer Employee Relationship Drones External Harddrive 3D File Sharing Licensing Teamwork Ebay Language Botnet Recycling Permissions Printing Electricity Storage Mobile Payment PDF Business Metrics switches Smart Phones Adminstration Get More Done Business Technology Keyboard Best Available Writing Pirating Information Computer Malfunction Product Reviews Printer Server Downloads Domains WannaCry Time Management eWaste Chromebook Read Shortcut Messenger Content Management Value Troubleshooting Work/Life Balance Motion Sickness Cryptocurrency Google Calendar Staffing Touchscreen Environment Download Tracking Video Surveillance IT consulting Knowledge Competition Books LinkedIn Business Owner Web Server Cleaning Upselling Saving ZTime Webinar Technology Tips Digital Websites Microchip Workers CIO Debate Windows XP Tech Terms Application Reading Archive Regulations Specifications Society Access Hacks Samsung Point of Contact Micrsooft Best Practives Relocation Digital Signature G Suite Entertainment Identity Theft Physical Security Thin CLient Spyware Notifications Tablets Microserver Data Security Reliable Computing Data Protection Sync Capital Productuvuty Vulnerability Television CrashOverride 3D Printing

hp supplies medallionLarge2017