WannaCry Isn’t Dead Yet: They Hit Boeing

WannaCry Isn’t Dead Yet: They Hit Boeing

So we all remember the WannaCry last year. Because in 2017, this malware virus tore a lot of things up, from hospitals to government agencies. It’s still around in 2018. WannaCry isn’t dead yet: They hit Boeing.

That’s right. So reports say their the malware started at Boeing’s? North Charleston, SC site. One memo wrote the virus hit automatic assembly tools, although he wrote it in code. Then, the memo said that ‘airplane software’ may be next. Very soon after they discovered the threat, they treated it with a ‘kill switch’ and patches. This did slow the virus, with significance. However, they may not kill the virus altogether. I say that because this may be a newer strain.

Boeing came out with a statement addressing this potential crisis. They admitted WannaCry affected dozens of machines, but it won’t interfere with their aircraft production. They also claimed the memo, and other news articles, overstated the threat. Yes, they admit the malware threat. But they assured they remedied the situation and it will not mess up production of any kind. However, we don’t know where the attack came from. Though a lot of people have a good idea.

That suspect is North Korea. They served as a thorn in the IT service world since The Interview movie fiasco back in 2014. And in the years that followed, the relationship between the west and North Korea got more intense. Many security experts claim North Korea is responsible of WannaCry. Some others say they’re behind this attack on Boeing. It wouldn’t surprise me.? I hope Boeing is telling the truth about this threat not being so bad. Over the years, this malware caused a lot of havoc on other IT support systems. I hope it causes none on one of the biggest airplane makers in the world. WannaCry isn’t dead yet. What will it take to kill it?

Android Malware In A Code App: What to do?

Android Malware In A Code App: What to do?

So when it comes to Android fighting the constant battle against malware, there is good news and bad news. The good news is that they’re doing a better job keeping malware out of the Google store. But the bad news is hackers are finding new and creative ways to invade your Droid. There is Android malware in a code app.

This new malware strain is?Andr/HiddnAd-AJ. Yes, that’s the name of it. However, what is scary is how subtle and innocent it looks. Hackers slipped it into Google Play as a QR code and compass app. This is kind of like a repair man coming to your house, but you find out that repair man is a burglar. By the time you realize he knows the way to your house, it’s too late.

This tactic is nothing new, but is is slick and tricky. They buried a hostile code in a regular Android library. And it doesn’t mess up your system right away. In fact, it can take up to six hours before this malware does any damage. There is more good news. In the last 24 hours or so, Google found and cancelled this fake app that’s causing this. Google and security experts insists it’s safe to use and buy from Google Play.

I can only hope so. Myself, and many in our Boston computer service shop, a lot of us use Android. I will give Android credit. A few years ago, all we read about is Android getting hacked, and getting hacked often. Now, you don’t hear about that as much. That’s a good sign. But this doesn’t mean the hackers are going to stop trying. In fact, it means they’re going to try even harder. Any good IT service worker will warn you of such threats because they don’t want you going through it. That’s what we try to do here. Have any of you been impacted by Android malware in a code app?

Ransomware Hacks Atlanta: Is It SamSam?

Ransomware Hacks Atlanta: Is It SamSam?

So many of us still have nightmares of WannaCry and NotPetya. Those are the malware viruses that nearly crippled British computer systems back in May 2017. But now Atlanta is under the gun. Ransomware hacks Atlanta: Is it SamSam?

Over the past 24 hours, malware crept into Atlanta’s IT service systems. Because of this, the city government can’t even do simple things. This includes processing payments and getting court case information. Then, Atlanta Mayor Keisha Bottoms addressed the attacks. She assured the Atlanta people the government will be open the next day (which is today). She also said this malware didn’t attack airports, public safety or services.

Mayor Bottoms stated she’s working with federal agencies to see who compromised what data. But here’s what we do know. SamSam ransomware sent a note. The note demanded $51,000 in Bitcoin to let go of the systems.They’re also demanding certain files. I cringe to think what those files are and what they want with them.? That’s almost six Bitcoin. SamSam is just one of malware systems that attack government and health care systems. Furthermore, SamSam has been doing this since 2015. They deliberately target these systems because they know how critical gov’t and health care are to the people. Thus, leaders are more likely to pay the ransom. These hackers also know they have better means to pay than individuals or small businesses.

But immediately after the attacks started, Atlanta tweeted the people of what’s going on. The mayor followed that with a press conference, and got federal agencies like FBI and DHS involved. Microsoft also helped out in this. So I applaud Atlanta Mayor Keisha Bottoms for how she handled Ransomware hacks Atlanta. Hopefully, all systems are normal in Atlanta. Why does what happen in Atlanta affect Boston, particularly near our Boston computer service shop? If it can happen in Atlanta, what makes you think it can’t happen in Boston?

The Patya Ransomware Attack: What We Know

The Patya Ransomware Attack: What We Know

Yesterday, I talked about a dangerous ransomware. The attack hit around the world, but hit Russia and Ukraine really hard. However, don’t think it’s over. I don’t believe it is. The Patya ransomware attack: What we know.

So first of all, we know the name of the attack. They call it Patya. There was some confusion about that when I reported it 24 hours ago. There are similarities to the WannaCry of May 2017 attack. But here is what makes Patya so dangerous: it cultivates. For example, it uses several methods to spread to several computers all at once. So this thing has no limits, no boundaries.

And remember our young, British hero who virtually stopped Wannacry? Well, so far, we have no such hero for Patya. There is no kill switch, not yet. However, some are working on a ‘vaccine’ to put this ransomware down. According to Ukranian authorities, ME-Doc software played a role in the launch. We still don’t know the motive. Many in the cyber crime-fighting community doubt this was just another money making scheme. Some think this was just to hurt Ukraine. But if that’s true, then it didn’t just hurt Ukraine. We also learn a Patya hit a US nuclear power plant. Patya also hit a US pharmacy firm and a French construction company.

So what are we going to do about it? At our Boston computer service shop, we haven’t seen the Patya ransomware attack yet. I hope we never do. But I’ve heard about this file called Perfc. When certain malware meets that file, Perfc tricks the virus and stops the encryption. That works with malware, but I don’t know it that will work with Petya. We can only hope. I understand some people and some institutions are still running Windows XP, and other defunct software. If that’s you, then stop! That’s an easy target. And if you do get eaten up, there’s nothing Microsoft can do about it. But what else can we do?

Can Your Mouse Cause Malware? Maybe

Can Your Mouse Cause Malware? Maybe

For years, we learned that clicking on certain links can cause malware. But yet, the hackers often seem to one up the good guys. Because it looks like they did it again. Can your mouse cause malware? Maybe.

So according to some cyber security leaders, cyber crooks discovered something evil. That evil is a Trojan malware that they can put on your computer. Furthermore, you don’t have to click a thing. All you do is point your arrow at at or around the hyperlink. Then, the PowerPoint hyperlink does the rest. This kind of malware isn’t coming. It’s already here.

Can your mouse cause malware? Maybe. Because it’s already happening overseas. They used it in a span campaign, mostly about finances. For instance, they saw hashtags like #invoice and #order. That gets the readers’ curiosity. Then, they attach it to a fake PowerPoint presentation. Furthermore, it says, “Loading…please wait”. But by the time you wait, the malware takes over. Before too long, the malware infects your PC.

But there is good news, especially if you use newer Microsoft Office. Most of us use it here in our Boston computer service shop. That’s because they have Protected View. What this does is warn you about ‘potential security concerns’. All you have to do is click ‘disable’. There’s also another way. I got hit by a sudden malware attack. I just restarted my computer and it was fine. We can’t stress this enough. If you’re hacked, and they tell you to call Microsoft, don’t do it! That’s a way to get your information, your money and goodness knows what else. Also, don’t hesitate to call us at Computer Geeks. Our computer repair experts are here to serve and protect you from these malware evils. I’m here reporting on such evils to keep you safe. Can your mouse cause malware? I’m afraid it’s coming to that.

Microsoft Fixes Potential Disaster; Or Did They?

Microsoft Fixes Potential Disaster; Or Did They?

When it comes to Malware, Microsoft does better at protecting themselves then most. But even they must watch their back. Because there is a new, powerful and scary threat looming over Microsoft, especially the anti-malware system. Microsoft fixes potential disaster, or did they?

Researchers say this threat is so powerful it bypasses any security. Then, it turns over your whole computer system to a hacker. But this threat needs a ‘specific crafted file’. They send this bad file either through email or send them the websites with hardly any protection. Windows’ malware protection system scans this file. But all this software does is let the hacker get into the system. Then, this malware can add or delete however it pleases. That’s how it gets and exploits private information.

This is why the threat is so scary. It abuses and exploits the very system it needs to protect. What’s even scarier is that Windows usually does a great job scanning all content for malware threats. However, this one just passes through. In fact, you don’t even need to open this vile thing before mayhem breaks loose on your computer. All it has to do is just show up. So what is Microsoft doing about it?

This is how Microsoft fixes potential disaster. They’re rolling out a patch. This patch is supposed to close this whole so this threat won’t get through. These updates can take up to 48 hours. However they don’t tell me how to obtain this patch. In computer repair, and at our Boston computer servicing shop, we haven’t seen this issue, yet. But now that you know about this threat, I suggest you do all you can to avoid it at all cost. And if you were hit, then do what you must to rid yourself of it before it destroys or exploits your system. I with I knew more about how Microsoft fixes potential disaster. What tips do you have for prevention?

Computer Geeks Now Offers No-Contact Service
We offer two types of service: 1) Online remote 2) No-Contact at your Curb Service
X