Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

Focused in Russia and Ukraine but also spotted in Bulgaria, Germany, and Turkey, Bad Rabbit shut down Russia’s Interfax Agency--a major news outlet--as well as Ukraine’s Kiev Metro, the Odessa International Airport, and both the Ministry of Infrastructure and the Ministry of Finance. The attack on Kiev Metro was found to leverage Diskcoder.D, yet another variant of the infamous Petya ransomware.

Fortunately, there is a considerably lesser chance of Bad Rabbit repeating what WannaCry managed to accomplish during its spread across Europe and, to a lesser extent, North America. This is because, instead of relying on a worm as WannaCry did, Bad Rabbit uses a server message block vulnerability called EternalRomance to spread, after being downloaded while disguised as an Adobe Flash installer on legitimate websites. It would also appear that Bad Rabbit and NotPetya (another significant ransomware attack) were deployed by the same threat actor, as 67 percent of their codebases are the same.

There is also evidence that this threat actor is a Game of Thrones fan, as the code strings used in Bad Rabbit include character names from the novels and television series.

Unfortunately, Bad Rabbit should not have been able to spread as far as it has, as Microsoft released a patch for EternalRomance in March, when the EternalBlue vulnerability was also patched. This makes this attack yet another example of why it is crucial to install patches and updates when they are released--if the organizations affected by Bad Rabbit had done so, they would not be in the position they are now.

Computerware can help you make sure that your systems are not left vulnerable to attacks like this by managing your patches and updates for you. Reach out by calling (703) 821-8200 for more information.

Tip of the Week: It’s Easy to Color-Code Your Goog...
Security Should Come In Two Parts


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Managed Service Provider Hackers Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Smartphones Small Business Gadgets Quick Tips Network Security User Tips Business Continuity Mobile Devices Computer Mobile Office Disaster Recovery Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Miscellaneous Upgrade Windows 10 Windows Android Unified Threat Management Ransomware Smartphone Passwords Holiday Operating System Remote Computing Innovation BYOD Mobile Computing Communication WiFi Remote Monitoring Vendor Management The Internet of Things Marketing Collaboration Apps Facebook Firewall Analytics History Managed IT services Users Apple Data Management IT Support Alert Outsourced IT IT Consultant Cybersecurity Phishing Managed IT Services Save Money Bring Your Own Device Office App Automation Gmail Productivity Big data Health Content Filtering BDR Spam Going Green Budget Outlook Wireless Technology Search Managed IT Virus Lithium-ion Battery Hiring/Firing Hard Drives Windows 8 Browser Tech Support Artificial Intelligence Best Practice communications IBM Mobile Device Maintenance Data Backup Update Phone System Money Office 365 Help Desk Internet of Things Bandwidth Antivirus Recovery Employer-Employee Relationship Printer Encryption Cost Management Information Technology Document Management Customer Service Travel Saving Time Education Administration Law Enforcement Data storage Save Time Legal It Management Hard Drive Running Cable SaaS Proactive IT Government Computers Humor Risk Management Networking Tablet Excel Telephone Systems Training Two-factor Authentication Computer Repair Wireless Disaster End of Support Website Project Management Securty Intranet Solid State Drive Flexibility Hacking Digital Payment User Mobility Comparison Fax Server PowerPoint Social Networking Hosted Solution DDoS Windows 10 Robot VPN Twitter Word Password Avoiding Downtime Black Market Cortana iPhone Hacker Business Intelligence Business Growth Data Recovery Current Events User Error Presentation Google Maps Company Culture Patch Management YouTube Virtual Desktop Settings Trending Unified Communications Documents Cloud Computing Programming Gaming Console Heating/Cooling Hack Webcam Statistics Politics Retail eWaste Streaming Media Experience Inbound Marketing Distributed Denial of Service Cryptocurrency Public Cloud Google Docs Laptop Chrome Router Office Tips Bitcoin Co-managed IT Computer Accessories Paperless Office Customer Relationship Management Safety Specifications Scam Social Automobile Augmented Reality Sports Computing Mouse Lifestyle Network Congestion How To Text Messaging IT service Digital Cybercrime Compliance Start Menu Social Engineering Taxes Computing Infrastructure Software as a Service Access Control Uninterrupted Power Supply Net Neutrality Downtime Pain Points Processors Data Security USB Telephony Monitors Flash Advertising IP Address cache CCTV Upselling Google Wallet Windows 7 Webinar Human Resources Video Surveillance Data Loss Corporate Profile In Internet of Things Displays Fiber-Optic Skype LinkedIn Saving ZTime Assessment Emails Banking Scalability Drones Freedom of Information Redundancy Debate Data Breach VoIP Teamwork File Sharing Archive Fraud Language Permissions Best Practives Consultation Storage Meetings PDF Cabling Business Metrics Private Cloud Point of Contact News Microserver switches Audit Keyboard Best Available Administrator Writing email scam Supercomputer Product Reviews Thin CLient Domains Emergency Worker Read Chromebook Machine Learning Fake News Vulnerabilities Turn Key Computer Care Shortcut Value Messenger Employer Employee Relationship Work/Life Balance Mobile Technology Trojan Leadership Google Drive Troubleshooting Vulnerability Environment Licensing Download Microsoft Excel Organize Staffing Business Cards Device Management IT consulting Printing Competition Electricity Books Botnet Cleaning Mobile Payment Business Owner Business Technology Microchip CIO Windows XP Downloads Application WannaCry Reading Computer Malfunction online Currency Regulations Society Television Time Management Hacks Micrsooft Blockchain Google Calendar Digital Signature Relocation Motion Sickness Tracking Identity Theft Harddrive SharePoint Touchscreen Entertainment Knowledge GPS Notifications Tip of the week External Harddrive Technology Tips Reliable Computing Web Server Workers Analytic Virtual Reality Music Evernote Websites Ebay Tech Terms 3D Upgrades Virtual Assistant Bluetooth Smart Phones Recycling LiFi Get More Done Public Speaking Access Samsung Data Warehousing Printer Server Pirating Information Adminstration Entrepreneur Rental Service G Suite Deep Learning Hard Drive Disposal Business Managemenet Memory Visible Light Communication Spyware HIPAA Physical Security Electronic Payment Tablets Wi-Fi Windows Server 2008 Data Protection Sync Content Management Unified Threat Management Capital Productuvuty 3D Printing Piracy Software License CrashOverride

hp supplies medallionLarge2017