Tag: malware (Page 1 of 4)

fireball adware infection

Trending “Fireball” Adware Raises Botnet Concerns

Earlier this week, security researchers reported on a trending adware infection known as Fireball. Sourced to the Chinese marketing firm Rafotech, reports indicate a footprint of more than 250 million infected machines worldwide. While the infection currently appears to only make changes to victims’ browser homepages and search engines, analysis suggests that the software could be remotely leveraged to act as a malware dropper. A malware dropper is a program that can be used to remotely install malicious software onto a victim’s computer or network. This can be performed after any amount of time following the installation of the dropper itself.

If true, it’s possible that infected systems could be made part of a botnet and used to carry out new types of attack over the Internet.

The Fireball adware is being distributed via freeware software installers through a method known as bundling. You’re likely to have seen bundling yourself at some point. Legitimate software developers use bundling as a way to monetize the release of otherwise free software. When you download and install such a program to your computer, you may notice that you’re being asked to install additional, unrelated software, like toolbars or free trials of a different company’s programs. While annoying, most cases of bundling are simply a way for developers to make money while releasing a free product. However, this can also be used to deliver PUA (Potentially Unwanted Applications), like adware, software that can track your behavior online and serve advertisements based on this data.

Because of this, it’s important to remain mindful of the sources of programs you install. Cracked versions of paid products frequently include malicious files that can be used to infect your systems. For website owners, this also applies to pirated versions of software that you might want to install on your website, like premium WordPress plugins and themes. Even if the pirated files are free of malware, they do not typically receive security patches from the original developers, or they could be configured to download a malicious component at a later time. This can open your website to a myriad of vulnerabilities that can be exploited by attackers to cause further damage to your online reputation.

Another point to consider, in the wake of Fireball’s massive online footprint, is the potential for damage caused by a botnet of this size. Malicious tasks that would be practically impossible for a single machine to perform (bulk hash cracking, login bruteforcing, denial of service attacks, etc.) become trivial when an attacker can utilize a quarter billion machines simultaneously to accomplish their goals. The potential for mobilization on this scale means it’s as important as ever to ensure tight security on all of your systems.

Strong passwords are a good start. Changing passwords regularly is another important step, given the frequency of major data leaks across the internet. By changing your credentials, you render a previously leaked password useless.

Protecting your website from bot traffic is a critical step in preventing malicious activity on your site. SiteLock TrueShield, a web application firewall,  provides effective traffic filtering that can drastically limit the impact of these attacks. Contact a SiteLock Website Security Consultant at 855.378.6200 to find the right security package for your business. We are available 24/7/365 to help.

Malware Removal

Why Website Reinfections Happen

We all know someone who’s been in a difficult position following a security breach. They are rushing to assess the damage, while simultaneously repairing website functionality to limit the compromise. It’s a stressful situation, especially if you’ve had to deal with a compromise more than once. Unfortunately for some website owners this is a reality — shortly after the initial security breach, the website becomes compromised again. It leaves the website owner asking why their website is being targeted and how the website re-infection is happening.

The short answer is that it’s most likely due to unresolved vulnerabilities. While it may seem like you’ve been singled out and targeted by some menacing hackers, most of the time that isn’t the case. The majority of website compromises are preceded by automated campaigns that locate websites vulnerable to a particular exploit the hacker wishes to employ. The bottom line is, you aren’t the target that the hacker is singling-out, it’s the software on your website. There are a couple main culprits for this scenario.

Read More

Web developer blog

Fake Joomla! Plugin Keyscaptcha Still in the Wild

A favorite, and particularly sneaky, way to inject malicious content into popular CMS platforms is through fake extensions and plugins. Fake plugins disguise their malicious intent by mimicking the form and function of legitimate plugins. We will discuss a not-so-well-known fake Joomla! extension, what it does, and what you can do to protect your site from such attacks.

Read More

eCommerce

Are Your Customers Afraid to Shop Online?

Retail therapy is the act of shopping with the primary purpose to improve the buyer’s mood. This form of “therapy” is practiced among many consumers, with more than half of Americans admitting to making a purchase as a way to lift their spirits. As therapeutic as shopping can be, it also raises fear among many consumers – especially around the holiday season. With websites, including eCommerce sites, experiencing 22 attacks per day on average, shoppers have good reason to be concerned.

Read More

SiteLock Election Infographic

Is Your Voter Data Secure? [Infographic]

Regardless of whether you’re a registered Democrat or Republican, your voter data could be in jeopardy of being compromised by cybercriminals. This election cycle has brought on attacks in 20 states, leading to two successful data breaches. Learn why 34 percent of voters believe this election will be or has been hacked.

Read More

SiteLock Security by Obscurity Blog

Are You Certain Your Website is Secure?

Websites experience 22 attacks per day on average. That’s more than 8,000 attacks per year, per website. You might assume the majority of these attacks are aimed at eCommerce sites because they accept and store credit card information, but actually, the eCommerce sector accounts for only one percent of compromised websites.

Read More

Factors that increase website vulnerabilities

The More Popular The Website, The More Likely The Cyberattack

In honor of National Cybersecurity Awareness Month (NCSAM), SiteLock has published new website security data to help raise awareness about the need for increased website protection and cybersecurity.

Over 760,000 websites are breached each year. However, only 6 percent of website owners use proactive website monitoring for suspicious activity, while 84 percent don’t find out about website attacks until after they’ve been compromised.

Read More

SiteLock_Case_Study

Bluedge Business Solutions Seeks Help From SiteLock [Case Study]

Company Background

Darin Wilson founded Bluedge Business Solutions in 2010 after several friends and colleagues reached out to him for help with their businesses. Bluedge is a comprehensive marketing and business development firm specializing in marketing, branding and planning for companies of all sizes. Wilson stands by the Bluedge philosophy for each of his clients: create an effective three-tier marketing plan by synchronizing the client’s goals, sales plan and tactics.

Wilson’s website, bluedgebiz.com, is the face of his firm. The site provides visitors with information about the company’s services and project portfolio. Prospecting clients visit bluedgebiz.com to read and request information. It is very important to Wilson’s business that the site is available to his visitors at all times.

Read More

College_Data_Breaches

Prevent Data Breaches from Hitting Your College Campus

The new school semester has begun and is off to a great start. Your students are engaged, prepared and full of spirit. Ready for their first test, they log in to their online student portal to access the exam. Just as the test is about to begin, the website crashes. Panic ensues among the students, who instantly turn to twitter and email for help.

Here’s what happened: The school did not have proper website security in place and consequently was the target of a cyberattack that shut down its website. Higher education institutions are attractive and lucrative targets to cybercriminals. In 2015, the education sector was among the top three sectors breached, behind healthcare and retail. College campuses store a wealth of confidential student and faculty data, including medical records, financial information and intellectual property for products and prescription drugs. Some of the most common attacks cybercriminals use to breach higher education institutions are hacking, malware and DDoS attacks.

Read More

why would someone hack my website

Why Would Someone Hack My Website?

It is hard to keep track of all the websites that are compromised on a daily basis. Cybercriminals are constantly crawling the web for targets, and they’ll often go after websites you might not expect, such as a vegan cooking blog. So what does a hacker look for in a website? And why would they be tempted to attack your site? Here are some examples so you have an accurate picture of common website attacks.

Read More

Page 1 of 4

Powered by WordPress & Theme by Anders Norén