Bad Rabbit: The Latest Variant in the World of Ransomwares

What is Bad Rabbit Ransomware? Ransomware attacks are on the rise and, the recent one that’s making headlines this week is the Bad Rabbit Ransomware. The malware is said to be linked to the previously released Petya ransomware and inspired by Game of Thrones as the code contains references to the Dragons featured in it. Bad Rabbit ransomware has affected corporate and media houses in Russia and Ukraine and appears to be affecting Turkey and Germany. Though the full reach and extent of it is yet to be determined, researchers at Kaspersky security firm say that Bad Rabbit ransomware bears […]

Read More

Locky Ransomware: Everything You Need to Know

What is Locky Ransomware? After WannaCry and Petya, another ransomware seems to spreading like wildfire, taking a hold of computer systems all over the globe, this time it’s being called Locky. The Computer Emergency and response team (CERT) under Government of India has raised an advisory on the spread of Locky Ransomware via spam emails.   CERT-In published Alert regarding the spam campaign spreading Locky ransomware https://t.co/hzbuyDLjvB — CERT-In (@IndianCERT) September 3, 2017 Quoted from CERT-In Locky is a ransomware that scramble the contents of a computer or server (associated network shares, both mapped and unmapped and removable media) and […]

Read More

Another Ransomware Attack Petya makes Headlines

What is Petya? The latest ransomware cyber attack ‘Petya/Petrwrap/ExPetr’ or ‘GoldenEye’ has quickly targeted computer systems all over the globe crippling large firms across Europe, Israel, Russia and the US, reportedly starting from Ukraine. It makes use of Eternal Blue exploit as a means to multiply  itself wrecking the system and leaving it inaccessible until a payment of $300 Bitcoins has been made. Kaspersky Lab’s global research director Costin Raiu tweeted on June 28th to say the majority of infections seen by his firm had taken place in Ukraine, the Russian Federation, and Poland. How does Petya work and which […]

Read More

wannacry cyber security SMB attack resellerclub blog

Patching Windows on ResellerClub Dedicated Servers to protect against the ‘WannaCry’ SMB Attack

What is “WannaCry’? WannaCry is a ransomware attack that has (in)famously brought much of the world’s computers and servers to a complete standstill including critical systems such as UK’s healthcare network, Russia’s government systems and those of the Indian state, Andhra Pradesh. It makes use of an SMB (Server Message Block) vulnerability on Windows systems and spread rapidly across networks. How does it work and where did it originate? Many experts suspect that WannaCry aka WannaCrypt was based on some exploits leaked from the US Government’s NSA toolkit for cyber-attacks and works by encrypting all files in a server/device and threatening to delete […]

Read More

Security Beat: The Black Vine Group

The digital world has benefited us in hundreds and thousands of ways , enabling us to store data, search, transfer, record, analyse, communicate, buy, sell, share & do SO much more! But the more we rely on cyber space, the higher the risk we face of losing it. What if all of it were breached? What there were a security compromise? That’s a threat that’s quickly becoming a reality closer to you. In light of that, we’re launching our Security Beat, a monthly feature covering cyber threats & measures you can take to protect your data. This month, we’re bringing you up […]

Read More

Update on the Gumblar Attack front

In our previous Blog post, we informed you about hosting packages on our Linux Hosting environment being affected by Gumblar Attacks. Over the past few days, we have been investigating these attacks, and working on methods to mitigate the damage caused by them; our findings and recommendations are as follows: Through our investigations, it was confirmed that the infection was not due to any server vulnerability. We enforce stringent security measures to safeguard your data. The attack is perpetrated through stolen FTP login credentials. It transmits FTP information to an IP address from an infected machine. This FTP information is […]

Read More