Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Startup GRAIL closes $900 million in Series B funding.

March 7, 2017 by The T By D Team Leave a Comment

cancer cell made in 3d software

Not our everyday computer post around here, but I found it nice that in among all the Crowdfunding programs that give money to stupid things everyday like digging holes and filling them, GRAIL, a startup that hopes to try and catch the early stages of cancer before it takes hold in the body, is well on it’s way to 1 billion dollars and could climb to upwards of 1.8 billion.  Its nice to see a feel good tech story once in a while instead of all the ransomware alerts that have become part of the daily culture.  Here’s to hoping they are able to perfect the technology and make a difference!

Early cancer detection startup GRAIL closes on $900 million in Series B funding

Filed Under: Blogs, Featured

ALERT: Double-Ransomware Attack

December 14, 2016 by The T By D Team Leave a Comment

homer-any-key

Double-Ransomware Attack

A new, and very scary ransomware strain has surfaced, called Goldeneye.  It encrypts the workstation TWICE:  First it encrypts the files, then it encrypts the Master File Table.

The attack is received as spam phishing email (HINT:  Need a Spam Filter!), and presents itself as a job application form to be filled out.  Attached is an infected PDF with the “application” which claims will get the process started.  In the PDF is a polite reference to the also attached Excel file, which it states “contains more details”.

When the victim opens up the Excel file, they get a suggestion on how to display the “aptitude test”.

Sophos, the company that first reported Goldeneye, states,

“The crooks don’t openly ask you to do anything obviously risky, such as “Enable macros” or “Turn off the default security configuration”, but they do encourage the victim to make a change to their Office settings, something that Excel will invite you to do because the file contains what are known as Visual Basic for Applications (VBA) macros.

If you permit macros to run in this Excel file, you will quickly regret it.  The VBA downloads a copy of the Goldeneye ransomware, and immediately launches it.”

The VBA programming language used in Office macros is powerful enough to allow CyberCriminals to control Word or Excel progammatically, but also to perform more general functions…such as downloading files from the web, saving them to disk, and running them.

Once the Excel file is activated, all the malicious activity happens in the background.  However, when the encryption is completed, there’s a whole bunch of files left behind called: “YOUR_FILES_ARE_ENCRYPTED.TXT”, which announces the infection:

goldeneye

Most file-encrypting ransomware strains stop here.  But Goldeneye’s developer has experience, and does a double-whammy attack similar to their Petya/Misha strain and encrypts the Master File Table (MFT) of that machine as well.

Goldeneye works a bit different than previous strains in that first it encrypts the files, then performs a “UAC bypass” and the low-level MFT attack, then reboots and pretends it’s doing a CheckDisk.

goldeneye-check-disk

Once the “check” is finished, another reboot sounds the alarm with some rather dramatic ASCII art:

reboot-alarm

Pressing the “Any Key” (anyone else hear Homer Simpson in their head right now?) gives you this:

any-key-result

**In case you’re wondering why Sophos redacted the so-called personal decryption codes in the images above, the encryption is different for your files and for your MFT: the malware uses different algorithms and different keys each time.**

Long story short, if you pay to unlock your scrambled MFT so you can reboot into Windows, then (assuming the CyberCriminals actually send you the decryption key) you’ll get back into Windows only to face the “YOUR_FILES_ARE_ENCRYPTED.TXT” pay page as well.  

If you don’t have reliable backups, you get to pay 1.4 Bitcoins all over again.  

Yes, that’s 2.8 Bitcoins total, which starts to get very expensive!

Want help?  Need an IT partner that cares as much about your business as you do?
Call Technology by Design.  We’ll build a custom IT plan to suit your needs AND your budget!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-292-8293

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

Coming Soon to An Internet Provider Near You: Infected Routers!

December 8, 2016 by The T By D Team Leave a Comment

hacking-routersComing Soon to An Internet Provider Near You:  Infected Routers!

One of the latest attacks to be unleashed upon the public:  routers infected by internet-of-things botnet-building malware such as Mirai.

One of the latest victims is London-based TalkTalk, or, to be precise, many of its broadband customers who were issued routers that contain a vulnerability now being exploited by at least one Mirai variant.  Security researchers report that the vulnerability appears to relate to a poor implementation of the TR-064 “LAN-Side DSL COE [Consumer Premises Equipment] Configuration” protocol in its routers.

talktalk

Although TalkTalk has begin to fix the vulnerability, infected routers are already being used as IoT launch pads for distributed denial-of-service (DDoS) attacks.  Researchers at the security firm Incapsula reported in a December 7/16 blog post that one of its customers (an unnamed bitcoin website) was hit with a DDoS attack on December 5th.  Incapsula states it traced the attack back to 2,398 Mirai-infected TalkTalk routers located in the U.K.  

Another security researcher, speaking on condition of anonymity, told the BBC that he’d exploited the flaw in TalkTalk routers to scrape 57,000 subscribers’ devices and retrieve each one’s service set identifier (SSID) code and media access control (MAC) address, as well as Wi-Fi password.  The researcher said his intention was to highlight that a malicious attacker could have also gained access to the devices, for example, to infect them with Mirai malware, which is known to target known vulnerabilities (including default access credentials) in dozens of different types of routers and other internet-connected devices, including digital video recorders and IP cameras.

Think just because this happened in the U.K. that you shouldn’t worry?  Think again.

Most routers are very similar, no matter where you live.  The UK just happened to be targeted first…this time.  And you can bet that the U.S. and Canada aren’t far behind.

Most people do not change the default settings, including default password, from the one which comes with their equipment.  This provides quick & easy access to your equipment, information, and your business.

A lot of small businesses tend to try to save money by doing their own IT, or by having a friend or family member that “knows a bit about computers” do it.  I’m all for saving money, but on the right things.  If you partner up (yes, your IT person should feel like a partner) with the correct IT company, they can help you protect your business, while saving you money by cutting out stuff you simply don’t need.

Want help?  Need an IT partner that cares as much about your business as you do?
Call Technology by Design.  We’ll build a custom IT plan to suit your needs AND your budget!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-292-8293

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

URGENT ALERT: AdultFriendFinder Scams

November 14, 2016 by The T By D Team Leave a Comment

adultfriendfinderURGENT ALERT:  AdultFriendFinder Scams

A massive data breach of the adult dating and entertainment company Friend Finder Network has exposed more than 412 million accounts including over 15 million “deleted” records that had not been purged from the company’s databases.

The exfiltrated records included 339 million accounts from AdultFriendFinder.com, which the company promotes as the “world’s largest sex and swinger community.”  62 million accounts from Cams.com, and 7 million accounts from Penthouse.com were stolen, as well as a few million from other smaller properties owned by the company.

The data accounts for 2 decades worth of data from the company’s largest sites, according to breach notification LeakedSource, which obtained the data.

Why does this matter?  Because outside of the fact that people, even people who had deleted their accounts, private and personal information was stolen, CyberCriminals will be using this information to victimize these people again, and again.  Spammers, phishers, and blackmailers will be rubbing their hands together in anticipation, never mind the divorce lawyers and private investigators that will be pouring over their data for clients.  

All of these 339 million registered AdultFriendFinder users are now a target for a multitude of social engineering attacks.  People that had straight or gay extramarital affairs can be made to click on links in emails that threaten to out them.

As in the Ashley Madison case a while ago, you can expect phishing emails that claim people can go to a website to find out if their private data has been released.  A sample of one of the phishing emails sent out in the Ashley Madison case is:

Unfortunately, your data was leaked in the recent hacking of Ashley Madison and I now have your information.

If you would like to prevent me from finding and sharing this information with your significant other send exactly 1.0000001 Bitcoins (approx. value 625 USD) to the following address:

1B8eJ7HR87vbVbMzX4gk9nYyus3KnXs4Ez [link added]

Sending the wrong amount means I won’t know it’s you who paid.

You have 7 days from receipt of this email to send the BTC [bitcoins].  If you need help locating a place to purchase BTC, you can start here…

On the other side of the spectrum, other phishing emails will be received that lures people into clicking on a link to a website to see if their spouse has not been faithful.  The subject line will likely be something similar to “Your spouse was found on the AdultFriendFinder list”.

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

ALERT: Fake Retail Apps

November 14, 2016 by The T By D Team Leave a Comment

fake-retail-appsALERT:  Fake Retail Apps for iPhone and Android

The New York Times has issued a warning to the public about a new kind of ID theft:  App ID Theft…just in time to deceive holiday shoppers!

Every holiday season, “retail apps” become popular.  Starbucks started the trend, but others have since copied.

Both Apple’s App Store and Google Play are getting crowded with fake “imposter” apps.

The counterfeiters are masquerading as big retail chains like Dollar Tree and Foot Locker, big department stores like Dillard’s and Nordstrom, online product bazaars like Zappos.com and Polyvore, and luxury-goods makers like Jimmy Choo, Christian Dior and Salvatore Ferragamo.

The fake apps trick you into dowloading them to your smartphone or tablet, and ask you to load your credit card.

5 Things to Remember When Downloading Apps:
  1. Be very judicious in deciding what app to download.  Better safe than sorry!
  2. If you decide to download an app, first check the reviews.  Apps with few reviews, or bad reviews, are a big Red Flag!
  3. Never click on a link in any email to dowload a new app.  Only go to the website of the retailer to get the link to the legit app on the AppStore or Google Play.
  4. Give as little information as possible if you decide to use an app.
  5. Be very, VERY, reluctant to link your credit card to any app!

For more information on the New York Times’ warning, go to: http://www.nytimes.com/2016/11/07/technology/more-iphone-fake-retail-apps-before-holidays.html

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

ALERT: New Locky Ransomware Released

November 10, 2016 by The T By D Team Leave a Comment

locky-ransomwareNew Locky Ransomware Released

There seems to be a new Locky ransomware phishing attack released this past week.

The emails claim to be “credit card suspended” or “suspicious money movement” warnings.

Graham Cluley reports:

“In the last few days there have been a spate of spammed-out attacks using similar techniques to dupe unwary internet users into clicking on an attachment that will lead to their Windows PC being infected with the notorious Locky ransomware.”

This attack is now using threats claiming that there have been “suspicious movements” of funds out of your bank account and/or that your credit card account has been suspended.

Here are a couple of examples of the phishing emails being received:

1.  “Suspicious movements” email:

lockey-phishing-email

2.  “Suspended card” email:

locky-suspended-card

Attached to the email is a ZIP file containing a malicious Javascript file (.JS) that, once opened, downloads that most recent version of the Locky ransomware from a remote server.

The Locky CyberCriminals are extremely well-organized, and highly automated.  They change the names and contact details used in these phishing emails, so you cannot rely on them being the same.  Ransomware is CyberCrime’s most successful and lucrative business model, so you can count on the threat being around for a long time.

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

How Employees Help Bad Guys Steal Credentials

November 7, 2016 by The T By D Team Leave a Comment

credentials-theftHow Employees Help Bad Guys Steal Credentials

How exactly do CyberCriminals gain access to a company’s network?

A security researcher decided to see how hard it would be to create a targeted phishing attack on a total stranger.  He went to Facebook and found a guy he did not know personally, and found a wealth of information, including:

  • He visited Tapley’s Pub in Whister, BC on Sept. 20
  • He visited The Brewhouse in Whistler on Sept. 16
  • The names of at least some of the people he was with on Sept. 13
  • He visited the 192 Brewing Company on Sept. 12
  • He visited the Chainline Brewing Company on Sept. 11
  • He visited American Pacific Mortgage on Sept. 9
  • He went to a Seattle Seahawks game on Sept. 3

And based on his Facebook profile, it was clear who he worked for, the city in which he lives, his wife’s name, and lots of other information.

If the security researcher was a bad guy trying to get access to this victim’s corporate login credentials, he could easily create an eamil with the subject line “Problem with you credit card charge at Tapley’s Pub” — a subject line that would make him open the email given his recent visit there.

Next, in the email, the bad guy could write a short, believable message about a problem in running his credit card and provide a link asking him to verify the charge.  That link could be to a site that would automatically download a keystroke logger to his computer, and…GAME OVER.

The bad guy can now capture every keystroke of the victim from then on, which would include login credentials and other confidential information.

The moral of this story:  
Do not share all kinds of personal information on social media.  

This is true from the mail room up to the board room.  Shared personal information can come back to you & bite hard!

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

ALERT: Another Tech Support Scam Making the Rounds

October 31, 2016 by The T By D Team Leave a Comment

scamALERT:  Another Tech Support Scam Making the Rounds

Tech support scams are getting more and more sophisticated.  

Security giant Symantec states, “These scams remain one of the major and evolving forces in the computer security landscape.  Between January 1 and April 30 this year, the Internet Crime Complaint Centre (IC3) received 3,668 complaints related to tech support scams, which amounted to adjusted losses of almost US $2.27m.”  And that’s just in the U.S.

Now, there’s a new scam that’s popping up on computer monitors everywhere.

The scam starts when the victim unknowingly visits a compromised website.  Then, according to Symantec, “the web page displays a fake ‘hard drive delete timer’ that warns the user that their hard drive will be deleted within five minutes.  A warning audio tone is also played in the background, which again warns the user that their system is infected.”

Victims then receive a popup “alert” on their monitor, claiming to be from the victims’ “Internet Service Provider”, or Microsoft, or something similar.  The popup ‘alert’ states it is warning the user that their hard drive will be wiped of all data…unless, of course, they call the fake customer support number (which of course they are nice enough to provide you with).  

tech-support-scam

Another variation is that your screen goes blue, and claims that your computer needs to be repaired.

fake-blue-screen

DO NOT call any numbers provided to you via popups.  Do NOT click on any links.  Do NOT open any attachments.

If you think the warning might be legitimate, call your Internet provider, or whoever the popup is claiming to be from…but look up the phone number yourself.  Or go to their website by typing their website into the address bar yourself.  Never call numbers provided, click on links, or open attachments.

From January 1, 2016 through October, Symantec has blocked more than 157 million tech support scams.  
The U.S., UK, and Canada were the countries targeted the most by tech support scams.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

How to be an Easy Hacker Target

October 27, 2016 by The T By D Team Leave a Comment

hacker

How to be an Easy Hacker Target

One of the most publicized items of the U.S. election (other than Trump’s alleged sexually inappropriateness), is the hacking of Hillary Clinton’s private server.

I’m actually surprised that this hasn’t gotten more press than it has, given the highly sensitive data & emails that have been leaked.  But, that aside, how did this happen?  How was this allowed to happen?

John Podesta is the Chairman of the 2016 Hillary Clinton presidential campaign (he also previously served as Chief of Staff to President Bill Clinton, and Counselor to President Barack Obama).  Podesta fell for simple social engineering.  He fell for one of the most common phishes that we see – a Google credentials phish.  

In Podesta’s case, the bad guys used a bit.ly link – something else we see all the time.  And the landing page for the credentials phish, probably looked similar to the one below:

google-credit-phish

How To Make Yourself an Easy Phishing Target:
  • Use a terrible password.  Use a common, easy-to-remember (ie. easy-to-guess) password.
  • Re-use that same password for multiple sites and/or accounts.  
  • Share your password with your coworkers, and/or assistants.
  • Ask an assistant to email you your password when you forget it.
  • Not turning on two-factor authentication
  • Not changing passwords after one account was known to be compromised.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

ALERT: Exotic Ransomware

October 20, 2016 by The T By D Team Leave a Comment

ransomware2ALERT:  Exotic Ransomware

New ransomware strain released by “EvilTwin” or “Exotic Squad” was discovered in early October.

Although the ransomware looks like all the other ransomware on the surface, in looking deeper, it could prove VERY annoying in the future.

The Exotic Ransomware will encrypt all files, just like other ransomware.  What it does differently than other ransomware, is that it also ecrypts executables in targeted folders on a victim’s computer, which makes the programs unusable.  Then it will hit the Desktop twice, making it appear although it was continuously monitoring for new files.

The encrypted files will then look similar to the ones below, when you go to look for them:

exotic-ransomware-encryption

The ransomware will then download a background image for the lockscreen & display the lock screen similar to below:

exotic-ransomware

When the timer reaches 0, Exotic will shutdown the computer.  

The ransomware appears to be in the development state, with 3 variants released over 3 days.  The latest contains the Jigsaw Ransomware-like screenlocker ransom note that demands $50 USD to decrypt the files.  

You shouldn’t be seeing it too much yet.  But you can bet it’s being geared up for widespread release soon!

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

  • 1
  • 2
  • 3
  • 4
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in