Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

Focused in Russia and Ukraine but also spotted in Bulgaria, Germany, and Turkey, Bad Rabbit shut down Russia’s Interfax Agency--a major news outlet--as well as Ukraine’s Kiev Metro, the Odessa International Airport, and both the Ministry of Infrastructure and the Ministry of Finance. The attack on Kiev Metro was found to leverage Diskcoder.D, yet another variant of the infamous Petya ransomware.

Fortunately, there is a considerably lesser chance of Bad Rabbit repeating what WannaCry managed to accomplish during its spread across Europe and, to a lesser extent, North America. This is because, instead of relying on a worm as WannaCry did, Bad Rabbit uses a server message block vulnerability called EternalRomance to spread, after being downloaded while disguised as an Adobe Flash installer on legitimate websites. It would also appear that Bad Rabbit and NotPetya (another significant ransomware attack) were deployed by the same threat actor, as 67 percent of their codebases are the same.

There is also evidence that this threat actor is a Game of Thrones fan, as the code strings used in Bad Rabbit include character names from the novels and television series.

Unfortunately, Bad Rabbit should not have been able to spread as far as it has, as Microsoft released a patch for EternalRomance in March, when the EternalBlue vulnerability was also patched. This makes this attack yet another example of why it is crucial to install patches and updates when they are released--if the organizations affected by Bad Rabbit had done so, they would not be in the position they are now.

Computerware can help you make sure that your systems are not left vulnerable to attacks like this by managing your patches and updates for you. Reach out by calling (703) 821-8200 for more information.

Tip of the Week: It’s Easy to Color-Code Your Goog...
Security Should Come In Two Parts


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Quick Tips Smartphones Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Virtualization Mobile Office Network Microsoft Office Server VoIP Social Media Smartphone Mobile Device Management Android Windows 10 Miscellaneous Upgrade Innovation Unified Threat Management Windows Ransomware Remote Monitoring Passwords Holiday Operating System Remote Computing Mobile Computing WiFi Vendor Management BYOD Collaboration Communication Apps The Internet of Things Marketing Facebook Cybersecurity Firewall Analytics History Apple Managed IT services Users Data Management IT Support Productivity communications Alert Phishing Internet of Things Managed IT Services Save Money IT Consultant Outsourced IT Health Content Filtering Spam BDR Automation Bring Your Own Device Gmail Office Big data App Best Practice Information Technology Going Green Hiring/Firing Mobile Device Bandwidth Outlook Wireless Technology Search Maintenance Browser Virus Lithium-ion Battery Data Recovery Hard Drives Budget Managed IT Windows 8 Antivirus Artificial Intelligence Tech Support Data Backup Hacking Office 365 IBM Money Encryption Recovery Employer-Employee Relationship Update Cost Management Phone System Help Desk Printer Save Time SaaS It Management Hard Drive Document Management Running Cable Saving Time Intranet Government Administration Cybercrime Networking Risk Management Training Law Enforcement Proactive IT Two-factor Authentication Customer Service Cloud Computing Computers Data storage VPN Website Travel Humor Education Legal Business Intelligence Current Events Hosted Solution Excel Robot User Computer Repair Mobility Social Engineering Compliance DDoS Black Market Windows 10 Business Growth Word Telephone Systems Cortana Password Access Control Hacker Digital Payment Disaster Downtime Data Security End of Support Comparison Tablet Augmented Reality Securty Company Culture Data Loss PowerPoint Social Networking Solid State Drive Fax Server Wireless Flexibility Data Breach Twitter Laptop Project Management iPhone Avoiding Downtime Paperless Office Public Cloud Sports Pain Points Computing Vulnerabilities Identity Theft Mobile Technology User Error Business Technology Trending IT service Virtual Reality Safety Specifications Tech Term Automobile Social Scam Statistics Bitcoin Gaming Console Bluetooth Computing Infrastructure Network Congestion How To Webcam Digital Blockchain Streaming Media Websites Tech Terms Inbound Marketing Start Menu Telephony Monitors Taxes Software as a Service Uninterrupted Power Supply Chrome YouTube Settings Unified Communications Processors Router USB Data Protection Computer Accessories Co-managed IT Presentation Customer Relationship Management Google Maps Patch Management Politics Virtual Desktop Mouse Emails Lifestyle Documents Text Messaging Redundancy Programming Hack Heating/Cooling Cryptocurrency Private Cloud Google Docs Cleaning Retail Experience Office Tips eWaste Value Distributed Denial of Service Net Neutrality Regulations email scam Society Troubleshooting Google Drive Employer Employee Relationship Licensing Multi-factor Authentication Hacks Staffing Content Management Micrsooft Environment Vulnerability Competition Printing Electricity Wireless Headphones Botnet Relocation Fake News Business Owner Device security Notifications Video Surveillance Webinar Application Downloads Saving ZTime WannaCry Computer Malfunction Reliable Computing Microsoft Excel Upselling LinkedIn Business Cards Music Time Management Mobile Payment Archive Upgrades Debate LiFi Google Calendar Digital Signature Motion Sickness Piracy Point of Contact Entertainment Touchscreen Tracking HTML Rental Service Television Deep Learning Best Practives Knowledge Visible Light Communication Technology Tips Thin CLient Web Server Memory Software License Wi-Fi Microserver Analytic Workers Devices SharePoint Public Speaking Advertising Leadership Access Tip of the week Flash Samsung IT Plan Turn Key Google Wallet Accountants G Suite Evernote Displays Trojan Entrepreneur Device Management Organize HIPAA Spyware Business Managemenet Physical Security Virtual Assistant Tablets Migration Banking Drones Electronic Payment Equifax Sync File Sharing Data Warehousing online Currency Language IP Address Permissions cache CCTV Hard Drive Disposal Desktop Business Metrics Human Resources switches Corporate Profile Startup In Internet of Things Windows Server 2008 Writing Assessment Skype Unified Threat Management Applications Scalability Chromebook GPS Teamwork VoIP Smart Tech Messenger Windows 7 Harddrive Work/Life Balance Storage Consultation Meetings Fiber-Optic Cabling Mobile Security Download External Harddrive PDF Ebay 3D Keyboard Recycling IT consulting Audit Best Available Multi-Factor Security Administrator Books Freedom of Information Fraud Domains Product Reviews Supercomputer Read Adminstration Worker UTM Machine Learning Microchip Smart Phones Get More Done Pirating Information CIO Emergency Printer Server Shortcut Windows XP Computer Care Legislation Reading News Nanotechnology CrashOverride Capital 3D Printing Productuvuty