Posts

How to Remove FilesLocker Ransomware – A Ransomware as a Service Attack?

Image
Encryptor RaaS (Ransomware as a Service) virus is a new era of ransomware distribution. Among all the cyber threats launched, ransomware attacks are garnering more attention lately. These attacks have gained intensity over time with attackers moving a step ahead by evolving vicious and harmful tactics to launch RaaS (Ransomware-as-a-Service) attack. RaaS Distribution is a practice where threat actors put their ransomware up for sale. It is then purchased and leveraged by other criminals who are technically unable to develop their own variants. Thus RaaS is gives even novice cyber-criminals an opportunity to launch sophisticated & profitable attacks. Most of the ransomware code packages are free to deploy with a profit-sharing model in which the author shares with the affiliates some percentage of earnings on the code package bought. This earning usually ranges from 25% – 30%. A new RaaS virus discovered in the dark web works like a similar legitimate software affiliate ...

Android app advertising scam – The hard cookie to crack for Google!

Image
The Internet Giant Google is striving continuously to fight irrational traffic and puts to use several filters & machine leaning models. It further makes collaborations with advertisers, publishers, tech ad companies, law enforcement agencies & other third-party corporations in order to locate & avoid potential threats. Still a recent report bared many popular Android apps that tracked user’s behavior & carried out a tremendous multimillion-dollar ad hoax strategy. A report from BuzzFeed News Investigation exposed around 125 Android apps & websites that have stolen millions of dollars through a forged advertising network. In response to the incident, Google clamped down & blacklisted several apps & websites and tightened its restrictions. Method of Operation of Ad Fraud 1. Scammers from a fake front company “We Purchase Apps” purchased established & legitimate applications on the Google Play Store from the developers. With the purchase, scamm...

How to Remove Utility Chest Browser Hijacker?

Image
Utility Chest is a deceptive application that is available for free downloads from its official site. The application may appear legitimate and claim to be useful with other inbuilt utilities like: 1. Online Calculator 2. Currency Converter 3. Maps 4. To-Do List 5. Translators & More The Utility Chest extension also offers convenient web search & claimed additional utilities like search for images, news etc from your Chrome Address Bar for free to lure users to download the application. However, to get all these proclaimed benefits this extension presents certain pre-conditions in front of users. These include: * Replace New Tab page to Utility Chest to provide these features * Read and Change all your data on the websites you visit. * Display Notifications * Manage your Downloads * Manage your apps, extensions & themes. The app may appear legitimate as it claims to be enhanced by Google to gain user confidence. However, if a user agrees to these terms he/she la...

9.4 Million Passengers affected by Cathay Pacific’s Data Breach

Image
Major IT security breach occurred in the information system of Cathay Pacific Airways that compromised the sensitive information of up to 9.4 million people. Let us read more to know about this data protection breach & how to protect yourself against this cyber breach. Cathay Pacific Airways Limited, the flag carrier of Hong Kong suffered a major Data Security breach. This Data Security Event is the worst damaging cyber attack ever to hit an airline. The theft compromised highly sensitive information of 9.4 million customers. Out of this total number 3, 80,000 passenger’s financial details were stolen. 1. Personal Data: Passenger Name, Date of Birth, Nationality, passport number, Identity Card Number, Address, Email, Phone Number, customer service remarks, frequent flyer programme membership number, Historical travel information 2. Credit Card Details: * 403 expired Credit card Numbers, * 27 Credit cards with no CVV Information stolen varies from passenger to passenger Rea...

Microsoft Hustles to fix bugs in Windows 10 Version 1809 Update

Image
Microsoft’s latest Windows 10 October 2018 Update or Version 1809 has a long list of bugs that apart from making Windows 10 PCs unusable also resulted in the loss of personal files. Let us read more to know what these bugs are and their fixes. Windows 10 Version 1809 Update: Windows 10’s October 2018 update – the sixth major release of the Window’s operating system – code-name Redstone 5 comes with numerous bugs that not only renders your System unusable but also results in the loss of personal files. This second semi-annual update of Windows 10 in 2018 aimed to introduce a new set of features to enhance productivity, security and performance of Windows 10 PCs. However, this new updated version of Windows 10 has not been well received by users who have already started telling horror stories about the new update. Soon this update is expected to become a scary anecdote in Microsoft’s history again. If user’s system had Known Folder Redirection (KFR) enabled, the OS version ...

Yet another fraud: McAfee Tech Support Scam

Image
Another Tech Support Scam associated with McAfee was reported last week after a user was asked to provide his credit card details & personal information to renew the anti-virus subscription. The scammers aim of stealing user’s sensitive information & earning illicit commissions on the subscription purchase. Tech Support Scams refers to communication frauds wherein a scammer claims to offer a licit technical support service & use scare tricks to make victims pay for unnecessary technical support services like fixing a manipulated device, platform, or antivirus problems. How a Tech Support Scam works? In the event, scammers call the victims & claim to be technical experts or representatives of the renowned companies like Apple or Microsoft. Other scammers bombard the victim’s screen with pop-up warnings of a detected virus or malware. After earning the trust of innocent users, they ask the users to install certain applications that provide them remote access to u...

Chinese Microchips Spied Major US Companies

Image
According to the reports by Bloomberg Business week, China conducted a giant corporate surveillance back in 2015. A Chinese microchip, about the size of a rice grain, was reported to have been found concealed in the Supermicro’s server motherboards that were used by over 30 US Companies, including government contractors, tech giant APPLE INC & largest web marketer AMAZON.COM INC. Further, the reports revealed that this extensive attack relied on the microchip that was inserted in the servers during the manufacturing process in China. The tiny chip was originally developed by the US IT Company, “Super Micro”, but later compromised by the government-affiliated groups during equipment assembling. The chip enabled the Chinese spies to sneak in major US Intelligence, military agencies, major banks & US based business internal servers through compromised devices. The technology developed by Elemental Technologies is renowned to have helped stream Olympic Games online, commun...