<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/malware/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 14:31:08 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Malware Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to deal with Ransomware.</title>
		<link>https://www.l2cybersecurity.com/deal-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 14:01:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1407</guid>

					<description><![CDATA[<p>I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. I have previously talked about how Ransomware can infect your machine. It can be by&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1408" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg" alt="Deal with Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware.jpg 500w" sizes="(max-width: 150px) 100vw, 150px" />I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. <span id="more-1407"></span>I have previously talked about how Ransomware can infect your machine. It can be by <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/" target="_blank" rel="noopener">dodgy looking e-mails</a> or <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/" target="_blank" rel="noopener">legitimate looking e-mails</a>. The variety is endless, but it is generally all down to somebody clicking a link or opening an attachment. I&#8217;ve got an <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">entire commandment</a> dealing with e-mails and how you should handle them.</p>
<p>What I&#8217;ve talked about above, is all prevention. However that doesn&#8217;t help you if you are staring at a monitor with a ransom demand on it. Let me give you a couple of examples of recently reported Ransomware incidents and how they were handled.</p>
<h3>Bristol Airport recovers from Ransomware Incident</h3>
<p>On the weekend of the 15th and 16th September, <a href="https://www.theregister.co.uk/2018/09/17/bristol_airport_cyber_attack/" target="_blank" rel="noopener">Bristol Airport suffered a Ransomware incident</a>. This incident took their flight information screens off-line for much of the weekend. Luckily no other safety or flight systems were affected.</p>
<p>How did the authorities at Bristol Airport deal with Ransomware? They re-built the systems and restored backups. They did not pay the Ransom.</p>
<h3>Scottish Brewery suffered a Ransomware incident from a job application.</h3>
<p>In the last couple of weeks, the <a href="https://www.bankinfosecurity.com/scottish-brewery-slammed-by-dharma-ransomware-variant-a-11537" target="_blank" rel="noopener">Arran Brewery in Scotland had all of it&#8217;s systems affected by Ransomware</a>. They had been running a recruitment campaign, advertising for a role via their own website. The evil doers took that ad and posted it to some international recruitment websites. The brewery then started receiving several e-mails a day from interested candidates from all over the world. In among those e-mails the bad guys slipped in one with Ransomware. The CV got opened and their files got scrambled. Not only were their live files affected, but their recent backups were too. These were stored online, attached to their network. Their most recent offline backups were 90 days old.</p>
<p>How did the brewery deal with Ransomware? They also re-built their systems and restored what backups they had. In this case though, they did consider paying the (GBP) £9,600 ransom. They came to the determination that the value of the data they lost (90 days of sales data) was less than the cost of the Ransom demand. They also took into consideration that paying the Ransom does not guarantee they would get back their data.</p>
<p>The brewery then did something really sensible. They have kept a copy of the scrambled data.</p>
<h3>Help may be available from the good guys.</h3>
<p>There is a not-for-profit, freely available service called <strong>No More Ransom</strong> (<a href="https://www.nomoreransom.org" target="_blank" rel="noopener">https://www.nomoreransom.org</a>). This is run by various Law Enforcement and Cyber Security firms around the world. They are constantly working on cracking the codes for the different Ransomware variants and enabling people to recover their data for free.</p>
<p>So the Arran Brewery is holding onto the scrambled data in the hope that someday they will be able to unscramble it.</p>
<h3>So how should you deal with Ransomware?</h3>
<p>Prevention is always better than a cure.</p>
<p>The first thing is to make sure you get your staff some security awareness training. This is something that I deliver. Details of the complete training is <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">available here</a>. We can do customised training to suit your organisation too. Call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail on <span style="color: #ff0000;"><a style="color: #ff0000;" href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a><span style="color: #000000;"> to discuss your requirements.</span></span></p>
<p>Then ensure that you have your systems <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">updated/patched regularly</a>, have security appliances like <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/" target="_blank" rel="noopener">Firewalls in place</a>, <a href="http://www.l2cybersecurity.com/use-anti-virus/" target="_blank" rel="noopener">Anti-Virus is generally helpful</a> against malicious software and also you <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">shouldn&#8217;t insert strange USB devices</a> into your computers.</p>
<p>Finally, you should have a good data backup system in place. This can be a very simple set-up or more complicated depending on your business needs. Again, I offer advice and support on backup strategies and business continuity planning. I also have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">a commandment about backups</a>.</p>
<p>That&#8217;s it! With all of the above in place, <span style="text-decoration: underline;"><strong>in the</strong> <strong>very unlikely event</strong></span> that you do subsequently suffer a Ransomware incident, you will be able to recover from it.</p>
<h3>What if it would cost me less to pay the ransom?</h3>
<p>This is a genuine struggle for a business owner, particularly small businesses. Recovering systems from a ransomware incident takes time, which costs money, and the business may be unable to operate while recovery is ongoing, so is not generating revenue. A good business continuity plan, should reduce such risks.</p>
<p>If you are tempted to pay, I just have two things I want you to consider:</p>
<ol>
<li>There is no guarantee that you will get your data back. Figures vary wildly from <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/" target="_blank" rel="noopener">50%</a> to <a href="https://gbhackers.com/ransomware-attack/" target="_blank" rel="noopener">100%</a> failure to recover data. If you pay and don&#8217;t get your data back, you will then have to pay the full cost of recovery anyway.</li>
<li>You are funding organised crime. You are paying criminals who not only do cyber crime, but human trafficking, drugs, weapons, etc. People think I am being jokey or have my tongue in cheek when I refer to <em><strong>Evil Doers</strong></em>. I&#8217;m not. This is an accurate description of these people. They! Are! <span style="text-decoration: underline;"><strong>Evil!</strong></span></li>
</ol>
<p>If you pay once, then the bad guys reckon you might pay again, so you will be a bigger target. My advice to deal with Ransomware is to implement preventative measures (call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail <a href="mailto:info@L2CyberSecurity.com"><span style="color: #ff0000;">info@L2CyberSecurity.com</span></a> to have a no obligation chat) and never pay these evil doers.</p>
<h3>What else do you need to consider?</h3>
<p>Don&#8217;t forget that if the data that gets scrambled contains personal data, then you have a data breach on your hands, which may be notifiable under the new Data Protection Act 2018 which incorporates the General Data Protection Regulation (GDPR). I&#8217;ve a short video here:</p>
<p><iframe title="What is a data breach - Ransomware" width="500" height="281" src="https://www.youtube.com/embed/PVnq6Bu-GEA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Finally, if you do suffer a Ransomware incident, a crime has been committed, so please report it to local Law Enforcement. They may not be able to do much about it, but it needs to be reported for statistical purposes if nothing else. If it can be shown that Cyber crime is as big a problem, as I know it to be, then the more reports to Law Enforcement will mean they will get more resources to be able to tackle it&#8217;s root cause.</p>
<p>#LetsBeCarefulOutThere and #StaySafe</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Posh POS was Compromised</title>
		<link>https://www.l2cybersecurity.com/posh-pos-was-compromised/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Apr 2018 10:58:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1292</guid>

					<description><![CDATA[<p>A headline worthy of The Register and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &#38; Taylor. These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this in a post on their site on the 1st April.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1293" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg" alt="POS compromised" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />A headline worthy of <a href="https://www.theregister.co.uk/2018/04/02/hacks_fifth_avenue_crooks_slurp_card_numbers_from_luxury_chain/">The Register</a> and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &amp; Taylor. <span id="more-1292"></span>These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this <a href="http://investor.hbc.com/releasedetail.cfm?ReleaseID=1062423">in a post on their site</a> on the 1st April. But it was no April Fool joke.</p>
<p>Basically the evil doers implanted malicious software on the Point of Sale (POS) terminals in the upmarket stores in the USA. For nearly a year (between May 2017 to March 2018) this malware was capturing customers credit/debit card details and passing this back to the bad guys. The crooks claimed to have gathered up to 5 million cards as a result of this hack and they have been selling off batches of them on the internet.</p>
<p>We are quite familiar with Chip &amp; PIN usage in Ireland as we have had it for quite some time. This does offer a great deal of protection as your card information is stored in an encrypted form on the chip. However in the US, they are only at the early stages of rolling out Chip &amp; PIN, so most people are still swiping their cards at the terminals. The magnetic stripes that are swiped do not have the data encrypted, and so the information can be accessed and passed on quite easily.</p>
<p>It&#8217;s not been revealed how the malicious software got onto their POS terminals, but it seems that the POS was compromised at all of their bricks and mortar stores in the US. Their online store was not affected.</p>
<p>Credit Card issuers are usually fairly good at detecting fraud by knowing their customers usual buying habits. So if somebody who usually spends €20-€50 on shopping items, suddenly attempts to buy high-end phones, tablets or televisions this should trigger an alert. However for the customers of Saks or Lord &amp; Taylor, such behaviour is much less likely to trigger an alert. So the crooks might be able to make away with a lot of goodies as a result.</p>
<p>The parent group, HBC, needs to put in place better segmentation and monitoring on their network, so if one store gets compromised, the malicious software cannot find it&#8217;s way easily to another store. They should also apply Commandments 1 (<a href="https://www.l2cybersecurity.com/use-automatic-updates/">automatic updates</a>), 2 (<a href="https://www.l2cybersecurity.com/use-anti-virus/">anti-virus</a>), 3 (<a href="https://www.l2cybersecurity.com/have-a-firewall-in-place/">firewall</a>) and 9 (<a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">control use of USB sticks</a>) to their POS network.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meltdown and Spectre</title>
		<link>https://www.l2cybersecurity.com/meltdown-spectre-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 10:00:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1064</guid>

					<description><![CDATA[<p>You probably can&#8217;t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster. This includes Mac OS X on Apple computers. Interestingly it has been reported that iPhones and iPads&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/meltdown-spectre-vulnerabilities/">Meltdown and Spectre</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1065" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/Meltdown-150x150.jpg" alt="Meltdown" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/Meltdown-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/01/Meltdown.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />You probably can&#8217;t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster. <span id="more-1064"></span>This includes Mac OS X on Apple computers. <span style="color: #800080;"><em><del>Interestingly it has been reported that iPhones and iPads are NOT affected.</del></em></span> These vulnerabilities have been given names. One is called <em>Meltdown</em> and the other <em>Spectre</em>.</p>
<p>I&#8217;m not going to go into any technical detail on these vulnerabilities. If you want to read the technical side you can go to the team that discovered the problems, Google&#8217;s <a href="https://googleprojectzero.blogspot.ie/2018/01/reading-privileged-memory-with-side.html">Project Zero</a>. There is some less technical information available on a <a href="https://meltdownattack.com/">dedicated webpage</a> for the vulnerabilities. I&#8217;ve put in some easy to read background on this in the discussion section below.</p>
<h2><span style="color: #ff0000;">What do you need to do about Meltdown NOW:</span></h2>
<p>First of all <span style="text-decoration: underline;"><strong>DON&#8217;T PANIC</strong></span><span style="text-decoration: underline;">.</span> This is not the end-of-the-world. The situation is serious, but there are currently no active exploits out there. So keep a cool head and this can be managed successfully.</p>
<p><span style="color: #0000ff;"><strong>Original Text posted 4th January 2018 @ 16:30 GMT</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 30th January 2018 @ 10:00 GMT:</span></strong></p>
<p>Steve Gibson, a renowned security expert has created an excellent free little tool, called <em><strong>InSpectre</strong></em> for helping people to understand if they are protected or not from the two vulnerabilities. It has other useful advice there too. I would suggest you download it and run it against your Desktop/Laptop and see what your exposure is. Link to the download page is here.</p>
<p><a href="https://www.grc.com/inspectre.htm">https://www.grc.com/inspectre.htm</a></p>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/30-10:00</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 8th January 2018 @ 10:00 GMT:</span></strong></p>
<ul>
<li>It has been reported that the Microsoft patches <a href="https://answers.microsoft.com/en-us/windows/forum/windows_10-update/after-installation-of-kb4056892-boot-failure-after/6c015632-2a45-4725-a882-f231f8c88f36?auth=1">are causing problems</a> for people using some AMD processor chips. It stops the machine from booting properly and seems to require Windows to be re-installed. If you have a PC with an AMD processor, it might be advisable to turn off Windows Update <em><strong>temporarily</strong></em><em> </em>until this issue is fixed.</li>
<li>Qualcomm is another chip manufacturer, who make processors for mobile devices (e.g. &#8211; the Snapdragon processor that is used by many Android phones). <a href="http://www.theregister.co.uk/2018/01/06/qualcomm_processor_security_vulnerabilities/">They have now confirmed</a> that their chips are also affected by these vulnerabilities.</li>
</ul>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/08-10:00</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 5th January 2018 @ 21:45 GMT:</span></strong></p>
<ul>
<li><a href="https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/">Intel have advised</a> that they are rolling out software and firmware patches to address the exploits as best possible. They expect to have 90% of the chips that were made in the last 5 years updated by the end of next week. They don&#8217;t seem to be talking about anything older than 5 years, so this might be a concern for people with older equipment.</li>
</ul>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/05-21:45</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 5th January 2018 @ 11:00 GMT:</span></strong></p>
<ul>
<li>What I didn&#8217;t mention yesterday was there are reports that fixing these vulnerabilities will cause the processor performance to degrade. While there will be some level of degradation, in typical workloads it shouldn&#8217;t be too noticeable. I won&#8217;t quote a percentage degree of slowdown as has been reported elsewhere, as it is purely speculation.</li>
<li>Operating Systems:
<ul>
<li>Microsoft have pushed out their patch for this to all platforms. As mentioned earlier some Anti-Virus vendors need to make changes before the patch can apply correctly. Keep an eye on this <a href="https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/edit?usp=sharing">google doc</a> for the current situation with the various anti-virus packages. Be sure to test the patch where possible before widespread deployment, in case there are any issues.</li>
<li>Apple Macs &#8211; MacOS patches are available.</li>
<li>Linux &#8211; patches are available.</li>
</ul>
</li>
<li>Browsers:
<ul>
<li>Firefox &#8211; be on version 57 (currently available).</li>
<li>Chrome won&#8217;t be releasing version 64 for a few weeks, but Google advise people to enable an experimental feature called &#8220;Site Isolation&#8221; that can offer some protection against the web-based exploits but might also cause performance problems. Do the following:
<ul>
<li>Copy <span style="color: #0000ff;">chrome://flags/#enable-site-per-process</span> and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key.</li>
<li>Look for Strict Site Isolation, then click the box labelled Enable.</li>
<li>Once done, hit Relaunch Now to relaunch your Chrome browser.</li>
</ul>
</li>
<li>Internet Explorer/Edge will be updated with today&#8217;s patches from Microsoft</li>
</ul>
</li>
<li>Mobile and Smart Devices:
<ul>
<li>The big change since the original post is that iPhones and iPads have been <a href="https://support.apple.com/en-us/HT208394">declared as vulnerable</a> by Apple. Expect updates in the coming days for iOS devices.</li>
<li>Google branded Android phones/tablets will get the January 2018 patches in the next few days. Non-Google branded phones will only get updates at the discretion of the manufacturer. So please watch out for these.</li>
<li>If you have any other devices (smart fridge/kettle/thermostat/toaster, CCTV cameras, digital assistants), be sure to check their interface to see if updates come available for them.</li>
</ul>
</li>
<li>Virtualisation Software:
<ul>
<li>VMWare have <a href="https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html">issued guidance</a> on their affected products.</li>
<li>Citrix don&#8217;t believe they are directly affected, but <a href="https://support.citrix.com/article/CTX231399">have guidance</a> for their customers as other software running on their platform may be impacted.</li>
</ul>
</li>
<li>Cloud platforms:
<ul>
<li>Google Cloud platform has <a href="https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html">detailed advice</a> for their clients.</li>
<li>Microsoft&#8217;s Azure platform also <a href="https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/">has information</a> for their customers.</li>
<li>Amazon also has <a href="https://aws.amazon.com/security/security-bulletins/AWS-2018-013/">a detailed statement</a> for their clients.</li>
<li>If you use some other Cloud Platform, please contact them to find out what their plans are to address these vulnerabilities.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/05-11:00</strong></span></p>
<hr />
<p>I hate to say it, but you need to patch and patch everything as soon as you can. <span style="color: #ff0000;"><strong>Warning:</strong></span> Make sure patches/fixes come from their usual sources and not by somebody sending you <a href="https://www.l2cybersecurity.com/fantom-ransomware-strikes/">an e-mail with the patch</a>. That won&#8217;t end well for you.</p>
<ul>
<li>Microsoft are issuing their monthly Patch bundle today (4th January) to address Meltdown. Install it as soon as it comes available on your PCs and schedule an emergency patch for your servers ASAP. <span style="color: #ff0000;"><strong>Warning:</strong></span> There have been <a href="https://twitter.com/GossiTheDog/status/948833482784038912">reports</a> that some Anti-Virus software may not play nicely with the Windows fixes and cause your machine to crash badly. Check this <a href="https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/edit?usp=sharing">google doc</a> for the current situation with the various anti-virus packages.</li>
<li>Firefox users make sure you are running version 57 (click the three horizontal lines and go to Help-&gt;About Firefox).</li>
<li>Chrome users need to wait for version 64 which is coming (click the three vertical dots and go to Help-&gt;About Google Chrome).</li>
<li>Apple Macs already have the patches out there, so make sure you are up-to-date.</li>
<li>If you have Linux anywhere, patches are available so update it ASAP.</li>
<li>Hopefully Android phones/tablets will get updates, so please watch out for them.</li>
<li>iPhones/iPads are currently safe from this issue.</li>
<li>If you have any other devices (smart fridge/kettle/thermostat/toaster, CCTV cameras, digital assistants), be sure to check their interface to see if updates come available for them.</li>
</ul>
<p>I would not be at all surprised if there will be multiple patches emanating from Microsoft over the next week or two in respect to this.</p>
<h2>I use services in the cloud, am I affected?</h2>
<p>Absolutely. However reports are that Amazon and Microsoft are busy working away patching their infrastructure. There are a LOT of other other cloud services out there, so please check with them to see if you are in anyway exposed to these bugs.</p>
<h2>Discussion:</h2>
<p>When I check <a href="https://twitter.com/L2_Evangelist">Twitter</a> each morning, I normally see about 10 or 20 tweets from overnight. This morning it was hundreds of tweets. The cyber security world has gone into overdrive in the last 24 hours. I was seeing rumours of an Intel processor vulnerability circulating yesterday and then the disclosure broke overnight. It seems that they were trying to hold off until next week, in order for more work to be done on issuing fixes, but it was leaked. So now there is the scramble to get the fixes out there as fast as possible.</p>
<p>The Meltdown bug is poorly named, as it is not going to &#8220;melt&#8221; anything (ignore the picture I&#8217;ve used for this post I just liked the look of it <span id="c128" class="notranslate">?</span>). What it does is it breaches protections between the operating system (e.g. Windows) and Applications that are in use (e.g. Excel, Sage, etc.). The bug enables a malicious program to get at parts of the computer memory that stores sensitive information, such as passwords. Once it has this information it could send it to the bad guys. This vulnerability is relatively easy to exploit and proof of concept exploits have shown up in the wild.</p>
<p>The Spectre bug is not as easy to exploit as Meltdown, but it is also not as easily fixed. It works by breaking the isolation between different applications, which enables an attacker to fool normal computer programs into revealing sensitive data that they have in memory. The current discussion on this indicates that to truly protect against Spectre, hardware may need to be replaced.</p>
<p>We&#8217;re in for an interesting start to 2018!!! <span id="c126" class="notranslate">?</span><span id="c126" class="notranslate">?</span><span id="c126" class="notranslate">?</span></p>
<p>The post <a href="https://www.l2cybersecurity.com/meltdown-spectre-vulnerabilities/">Meltdown and Spectre</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dodgy e-mail that looks legit.</title>
		<link>https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 10:45:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=984</guid>

					<description><![CDATA[<p>I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like last weeks story, this message looked kinda plausible.It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-985" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg" alt="Dodgy e-mail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like <a href="https://www.l2cybersecurity.com/double-check-security/">last weeks story</a>, this message looked kinda plausible.<span id="more-984"></span>It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one person to be waiting on a delivery to fall for it.</p>
<p>Here is the offending dodgy e-mail:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-986" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg" alt="" width="516" height="352" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg 516w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1-300x205.jpg 300w" sizes="auto, (max-width: 516px) 100vw, 516px" /></p>
<p>To me, there are a number of obvious indicators that this is a dodgy e-mail:</p>
<ol>
<li>The sending address (the bit after &#8220;UPS View&#8221;) was not a UPS address.</li>
<li>The two links in the e-mail did not go to a UPS website.</li>
<li>Most obviously &#8230; I wasn&#8217;t expecting a delivery!</li>
</ol>
<p>So lets take them one at a time:</p>
<ul>
<li>Some e-mail clients don&#8217;t actually show you the whole e-mail address of the sender. They just show the <em><strong>Display Name</strong></em>, which in this case is &#8220;UPS View&#8221;. So if you were using such a client, then it would appear to be a legitimate UPS e-mail address. However in my case, there was this @aol.com e-mail address, which is not associated with UPS.</li>
<li>When you see a link in an e-mail or website, you can hover the mouse over it. Somewhere towards the bottom of your browser window, you should be able to see where the link is going to take you. In this e-mail&#8217;s case it was going here, which is not a UPS site:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-991" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-2.jpg" alt="" width="252" height="19" /></p>
<ul>
<li>In my case I wasn&#8217;t expecting any delivery. But what if I was? What if I was an under pressure procurement clerk in a large organisation? I&#8217;d be getting deliveries on a regular basis. I&#8217;d be very inclined to click on those links.</li>
</ul>
<p><span style="text-decoration: underline; color: #ff0000;"><strong>Please note</strong></span> I carried out the following action on a sacrificial machine, so please do not be tempted to ever click on links to see what happens next. It could end very badly for you.</p>
<p>So what would have happened if I did click on the link? A word document, with a name that started &#8220;Tracking-3154631&#8230;&#8221; was downloaded. This document, if opened, would persuade me to click on &#8220;Enable Editing&#8221; and then click on &#8220;Enable Content&#8221;. Once I had taken those actions, macros (a set of instructions for a computer) in the word document would have downloaded a really nasty piece of software. Then all of my files would have been scrambled and I would be presented with a ransom demand to get my data back.</p>
<p>If I was that under pressure procurement clerk, it would not have stopped at just the files on my computer, but any files that I could access on the company&#8217;s network. That could be very, very disruptive to the organisation.</p>
<p>Out of curiosity, I checked the website (the bit before the &#8220;/UPS/16-Nov&#8230;.&#8221;) that hosted that document. It appears to be a legitimate business website. However, they&#8217;ve probably been hacked by the bad guys, who are now using their site to host their malicious downloads.</p>
<p>UPS offer advice on <a href="https://www.ups.com/us/en/about/news/fraud-alert.page">fraudulent e-mails</a>.</p>
<p>As usual, we&#8217;ve even got a <a href="https://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">commandment</a> that covers dodgy e-mails too. So have a read to see what you can do to protect yourself.</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Draughty Backdoor in popular application.</title>
		<link>https://www.l2cybersecurity.com/draughty-backdoor-popular-application/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 11:45:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=911</guid>

					<description><![CDATA[<p>It was revealed a couple of days ago that a widely used application had a backdoor in it. A specific version of CCleaner, a well known utility for doing housekeeping on computers, had been compromised by evil doers. What makes this somewhat more concerning, at first glance, is that CCleaner is a product that is owned&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">Draughty Backdoor in popular application.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-912" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/CCleaner_Backdoor-150x150.png" alt="Backdoor" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/CCleaner_Backdoor-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/09/CCleaner_Backdoor.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />It was revealed a couple of days ago that a widely used application had a backdoor in it. A specific version of CCleaner, a well known utility for doing housekeeping on computers, had been compromised by evil doers. <span id="more-911"></span>What makes this somewhat more concerning, at first glance, is that CCleaner is a product that is owned by <a href="https://www.avast.com/">Avast</a>, a well known Security Software vendor. How could they possibly have been hacked?</p>
<p>Actually Avast was not the company that had been breached. It was a company called <a href="https://www.piriform.com">Piriform</a>, who were the original creators of CCleaner. Avast bought Piriform in July 2017, but Piriform were already compromised at that time. I&#8217;ll take you through the timeline, explain what a backdoor is and what you should do if you were affected.</p>
<h2><span style="color: #ff0000;">Update &#8211; 21st September 2017:</span></h2>
<p>Cisco have been continuing to analyse what went on and <a href="http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html">have discovered</a> that this backdoor may have been used to target specifically named Corporations, namely Intel, Microsoft, Samsung, Sony, HTC, VMWare, Linksys, Cisco, Vodafone and more. They analysed the controlling server which law enforcement shut down and found that at least 20 machines had some malicious software downloaded to them (what they refer to as &#8220;Stage 2 Payloads&#8221;). This number could possibly rise, as this is an active investigation.</p>
<p>While this appears to be a targeted attack, I would still urge extreme caution. If you used the compromised version of CCleaner, please do follow the suggestions below, which will mitigate any risk of compromise.</p>
<p>The remainder of this article below remains as originally posted.</p>
<h2>Timeline of events:</h2>
<ul>
<li>First week in July: It would seem this was when hackers compromised Piriform&#8217;s development systems.</li>
<li>July 18: Avast buys Piriform, the company that created CCleaner.</li>
<li>August 15: CCleaner version 5.33 is released. The CCleaner 5.33.6162 installer includes the backdoor, but this only works on 32-bit systems.</li>
<li>August 24: CCleaner Cloud version 1.07.3191 is released and this also includes the backdoor.</li>
<li>September 12: A company called Morphisec had detected some unusual activity around CCleaner 5.33 and so they notified Avast and also Cisco. Avast starts its own investigation and also notifies US law enforcement. Cisco also starts its own investigation.</li>
<li>September 14: Cisco tells Avast what it has found and also around the same time they had taken some steps to prevent the backdoor from being effective.</li>
<li>September 15: Following a collaboration between Avast and law enforcement, the evil doers server that controlled the backdoor was shut down. Avast releases a clean version of CCleaner 5.34 and CCleaner Cloud 1.07.3214 that remove the backdoor.</li>
<li>September 18: The incident comes to public attention, following Avast, Cisco and Morphisec reports.</li>
</ul>
<h2>A backdoor might not sound dangerous, but it is:</h2>
<p>What happened in this case was the bad guys managed to gain access to Piriform&#8217;s software development systems and they implanted computer code that created a backdoor in CCleaner. This went undetected and so the compromised version of CCleaner, version 5.33 was released. People would have downloaded this, or updated to it, as paid versions of CCleaner have an automatic update feature.</p>
<p>So the backdoor in this case, effectively meant that version of CCleaner would have occasionally made contact with servers on the internet controlled by the bad guys and look for for new instructions. The hackers could have put any malicious code they want on these servers, and this would have almost certainly affected the victims machine, regardless of the protections that were in place (Antivirus, Firewalls, etc.). They could have loaded Ransomware onto the victim or something that would have stolen banking credentials.</p>
<h2>What you should do if you were affected:</h2>
<p><a href="https://blog.avast.com/update-to-the-ccleaner-5.33.6162-security-incident">Avast</a> recommend simply installing version 5.34 will remove the nasty backdoor. Cisco&#8217;s detailed <a href="http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html">write-up</a> doesn&#8217;t offer much in the way of guidance, but their work on this pretty much hobbled the malicious software.</p>
<p>However, looking at the timeline, the infected software was available from 15th August and nothing was detected until 12th September. So that&#8217;s 27 days where this thing <em><strong>could</strong></em> have been doing something evil. There&#8217;s no evidence to say that anything had happened, but there&#8217;s no evidence that nothing happened. It&#8217;s <em><strong>possible</strong></em> that other malicious software has been deployed on affected machines.</p>
<p>I would therefore be of the view that any machine that had this software installed, is potentially still compromised. The safest course of action is to wipe the machine and reset to factory settings. I would also change any passwords for e-mail, banking, social media and other online services. Maybe even bite the bullet and give your online accounts the <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">best protection possible</a>. I know this is a pain in the ass, but because there is uncertainty, I wouldn&#8217;t take the risk,</p>
<p>I had the free version 5.32 of CCleaner installed on my personal desktop, so I don&#8217;t need to worry. I might wait for the dust to settle before I upgrade it though.</p>
<p>The post <a href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">Draughty Backdoor in popular application.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phishing subject lines &#8211; Top 10.</title>
		<link>https://www.l2cybersecurity.com/phishing-subject-lines-top-10/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 20 Jul 2017 15:22:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=814</guid>

					<description><![CDATA[<p>What would you expect if you got an e-mail with the subject line of &#8220;Security Alert&#8221;? How about &#8220;Unusual sign-in activity&#8221;? You probably expect it to be an e-mail that is trying to raise your awareness about some potential security issue. I&#8217;m afraid it is likely not. These are just two examples from the Top&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/phishing-subject-lines-top-10/">Phishing subject lines &#8211; Top 10.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-544" src="https://www.l2cybersecurity.com/wp-content/uploads/2016/05/Phish-150x150.png" alt="Phishing Subject Lines" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2016/05/Phish-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2016/05/Phish.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />What would you expect if you got an e-mail with the subject line of &#8220;Security Alert&#8221;? How about &#8220;Unusual sign-in activity&#8221;? You probably expect it to be an e-mail that is trying to raise your awareness about some potential security issue. I&#8217;m afraid it is likely not. These are just two examples from the Top 10 Phishing Subject Lines <a href="http://www.prweb.com/releases/2017/07/prweb14499138.htm">report</a> for Quarter 2 2017 that was release by KnowBe4 recently.<span id="more-814"></span></p>
<p>The report shows that people are clicking on e-mails with the above subjects (which could potentially be business related). However some of the other subject lines are not very &#8220;business-like&#8221; at all and people are still going into them and potentially bringing things like Ransomware into their employers networks.</p>
<ol>
<li><span style="color: #0000ff;">21%</span> Security Alert</li>
<li><span style="color: #0000ff;">14%</span> Revised Vacation &amp; Sick Time Policy</li>
<li><span style="color: #0000ff;">10%</span> UPS Label Delivery 1ZBE312TNY00015011</li>
<li><span style="color: #0000ff;">10%</span> BREAKING: United Airlines Passenger Dies from Brain Hemorrhage – VIDEO</li>
<li><span style="color: #0000ff;">10%</span> A Delivery Attempt was made</li>
<li><span style="color: #0000ff;">9%</span>  All Employees: Update your Healthcare Info</li>
<li><span style="color: #0000ff;">8%</span>  Change of Password Required Immediately</li>
<li><span style="color: #0000ff;">7%</span>  Password Check Required Immediately</li>
<li><span style="color: #0000ff;">6% </span> Unusual sign-in activity</li>
<li><span style="color: #0000ff;">6% </span> Urgent Action Required</li>
</ol>
<p>Clearly #4 above is not in anyway a business related e-mail (unless you are a United Airlines employee, obviously <span id="c128" class="notranslate">?</span>). However #3 and #5 could also be unrelated to your company&#8217;s day-to-day business.</p>
<p>The e-mails in the research actually made it passed any spam or malware filters that the surveyed organisations had in place, showing that technology cannot be completely relied upon to give 100% protection against the many evils on the internet. Your staff will be your last line of defence.</p>
<p>Of course you could avail of our <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Security Awareness and Safety Training</a>. This will show your staff what to watch out for and how to handle such dodgy e-mails. It will also give them a very comprehensive insight into what threats are out there and how they can prevent downtime in your business</p>
<p>If you don&#8217;t want to go down that road, then at least have a read of <a href="https://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> of our very own Top 10 &#8211; <a href="https://www.l2cybersecurity.com/the-ten-commandments/">The Ten Commandments of Cyber Security</a>, which will give you plenty to think about in respect to handling e-mail with any type of phishing subject lines.</p>
<p>The post <a href="https://www.l2cybersecurity.com/phishing-subject-lines-top-10/">Phishing subject lines &#8211; Top 10.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Communication is vital after a disaster.</title>
		<link>https://www.l2cybersecurity.com/communication-vital-after-disaster/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 13 Jul 2017 10:17:30 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=799</guid>

					<description><![CDATA[<p>Maersk Line were one of the biggest victims of the Petya/NotPetya Ransomware worm that struck on 27th June 2017. Here are some details, in case you missed it. Two weeks later, they are still not back to full operational capacity, but they are doing something really well. The are using the critical competence of communication&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/communication-vital-after-disaster/">Communication is vital after a disaster.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-2947 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/07/Disaster-planning-150x150.jpg" alt="Communication is vital after a disaster" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/07/Disaster-planning-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/07/Disaster-planning.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Maersk Line were one of the biggest victims of the Petya/NotPetya Ransomware worm that struck on 27th June 2017. <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Here</a> are some details, in case you missed it. Two weeks later, they are still not back to full operational capacity, but they are doing something really well. The are using the critical competence of communication to keep their clients informed of the progress they are making towards recovering from the cyber attack.</p>
<p><span id="more-799"></span>They have been publicly posting on their website the current status of the various systems that were impacted. One of the biggest systems hit was their customer service phone lines. This would have been their main route for communication with their clients and being able to deal with specific queries that concerned customers would have for them. However the Ransomware took that offline and so, the Maersk teams went to work to start recovering their systems.</p>
<p>They obviously followed a Disaster Recovery Plan, as they mention on 6th July that their business-critical systems were up and running which allowed them to take on new business. But they also admit that there are backlogs for existing business. They also show on July 8th that they have been able to respond to 70% of the customer service e-mail backlog. For a business of their size, this would have been a significant number of e-mails to have responded to in a period of great stress for their teams. On the 10th July they admit that there were problems with getting their rate sheets out in a timely manner and advise of further delays to get it sorted out again.</p>
<p>This communication, warts and all, was out there in the public domain,  in great detail, for everyone to see and it is refreshing and reassuring that they take customer service so seriously.</p>
<p>There were other businesses widely affected by Petya/NotPetya. DLA Piper, the large global law firm issued 3 public notifications on their website, on the day of the attack, the following Monday and then last Monday. However the communication in their case was more to do with Public Relations than customer service. &#8220;Our IT team acted quickly to prevent the spread of the suspected malware and to protect our systems.&#8221; and &#8220;We continue to see no evidence that client data was taken or that there was a breach of the confidentiality of that data.&#8221; These are boiler plate statements, which you expect to hear, but don&#8217;t provide anything meaningful to understand what the current actual status is.</p>
<p>Mondelez, the food giant, who were also affected by Petya/NotPetya published a single <a href="http://ir.mondelezinternational.com/releasedetail.cfm?ReleaseID=1032381">post on their website</a>, over a week after the incident, and it&#8217;s main focus was the impact the disruption would have on their revenue &#8220;Our preliminary estimate of the revenue impact of this event is a negative 300 basis points on our second quarter growth rate.&#8221; There was some other boiler plate platitudes in the post, but this has got to be the worst communication of the three organisations.</p>
<p>Still, it&#8217;s better than no communications.</p>
<p>Bottom line:</p>
<ol>
<li>make sure you have a Business Continuity Plan (BCP) in place that is regularly reviewed</li>
<li>make sure it&#8217;s backed by a tried and tested IT Disaster Recovery Plan (ITDRP)</li>
<li>and for the love of dogs, make sure that communicating clearly and honestly with your customers is built in to the plan. It will make for happier customers if you do it right.</li>
</ol>
<p>The post <a href="https://www.l2cybersecurity.com/communication-vital-after-disaster/">Communication is vital after a disaster.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How a typo can cause you problems.</title>
		<link>https://www.l2cybersecurity.com/typo-can-cause-problems/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 13 Jun 2017 14:55:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Adobe Flash Player]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Flash Player]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Typo]]></category>
		<category><![CDATA[Typosquatting]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=747</guid>

					<description><![CDATA[<p>Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;Typosquatting&#8220;. Essentially this is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-748" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg" alt="Typo squatting" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;<a href="https://en.wikipedia.org/wiki/Typosquatting">Typosquatting</a>&#8220;.</p>
<p><span id="more-747"></span></p>
<p>Essentially this is where the bad guys have a web page at an address that is very very very close to the spelling of a popular or well known webpage and they count on you having a typo and either missing a letter (e.g. instgram.com) or hitting an adjoining letter (e.g. facebooo.com) in error.</p>
<p><span style="text-decoration: underline;"><strong>Don&#8217;t try this on your desktop/laptop/tablet/phone</strong></span>. I have a separate, sacrificial machine which I can use for such things.</p>
<p>I tried to access www.instgram.com (missing the &#8220;a&#8221; in the middle) and received the following page:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-750" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg" alt="instgram.com 1" width="572" height="201" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg 572w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1-300x105.jpg 300w" sizes="auto, (max-width: 572px) 100vw, 572px" /></p>
<p>Notice the address where it is going to (circled in yellow) &#8211; that is not an Instagram address, but some sort of ad/advertising address.</p>
<p>When I clicked to continue, I got:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-749" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg" alt="instgram 2" width="765" height="472" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2-300x185.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>I didn&#8217;t continue any further, as I googled gr8musik.com and the results indicated it was a scam site, which if you registered with it, would take money from your credit card, even though you were supposed to be in some kind of a free trial period.</p>
<p>Similarly, I tried www.facebooo.com (an &#8220;o&#8221; instead of the &#8220;k&#8221;) and got the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-751" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg" alt="facebooo 1" width="798" height="409" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg 798w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-300x154.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-768x394.jpg 768w" sizes="auto, (max-width: 798px) 100vw, 798px" /></p>
<p>This was just some kind of survey. But you never know what you will get. A subsequent attempt to go to www.instgram.com brought me to the survey, followed by the survey (again), followed by a sign-up form for mcplayz.com (identical to the above gr8musik.com). So these crooks are randomly sending you to different pages trying to compromise you in someway.</p>
<p>According to this <a href="https://isc.sans.edu/diary/Deceptive+Advertisements%3A+What+they+do+and+where+they+come+from/22494">post</a>, the victim&#8217;s typo sent him to a &#8220;Technical Support&#8221; page, where he was advised that his PC was locked and he needed to telephone for support. If he did this, the scammers at the other end of the line would have talked him through giving them remote access to the PC and then they would have totally locked him out and looked for his credit card details to &#8220;fix&#8221; the problem.</p>
<p>Some pages reached by a typo try to apparently show you a video, but then indicates there is a problem and that you need to download a specific video player to watch it. For example, the following headline is tempting you to watch the video to get your hands on software worth $7,000.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-753" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg" alt="video player not" width="765" height="462" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer-300x181.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>These will typically download what is referred to as adware, and if you read our last week&#8217;s <a href="http://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">post</a> about the Fireball adware, you can see  how insidious that adware can be. Adware will take control of your browser and fire ads at you while you are trying to use the internet. It might also re-direct your searches to odd search engines, which will likely attempt to track you and violate your personal privacy on the internet.</p>
<p>So just be careful when typing addresses. Better still use bookmarks.</p>
<p>If you do inadvertently get taken to some page that you never intended to go to, just close the browser immediately by way of the <strong>X</strong> in the top right-hand corner of the window. You might get warnings about losing data, just ignore them and close that browser. It would do no harm to run a spyware check on your PC at this point, in case any adware did manage to sneak in without your knowledge or permission. There are free tools from <a href="https://www.malwarebytes.com/">Malwarebytes</a> or <a href="https://www.safer-networking.org/">Safer Networking</a> that can do this for you, but you might want to also talk to some real life technical support (a techy friend or the IT team in your place of employment) about it and have them give your PC a once over.</p>
<p>Whatever you do, don&#8217;t continue to engage with a website that you weren&#8217;t intending to visit and stay safe.</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fireball &#8211; 1,000 times bigger than Wannacry.</title>
		<link>https://www.l2cybersecurity.com/fireball-bigger-than-wannacry/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 05 Jun 2017 16:24:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=738</guid>

					<description><![CDATA[<p>Have you seen the news reports and headlines about Fireball? No? That&#8217;s odd. 250 million PCs are infested with it. That&#8217;s a thousand times more machines around the world than WannaCry (you do remember WannaCry don&#8217;t you, or was it sooo two weeks ago ?). So you would think the news organisations would be all&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">Fireball &#8211; 1,000 times bigger than Wannacry.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-739" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/Fireball-150x150.jpg" alt="Fireball malware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Fireball-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Fireball.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Have you seen the news reports and headlines about Fireball? No? That&#8217;s odd. 250 million PCs are infested with it. That&#8217;s a thousand times more machines around the world than WannaCry (you do remember <a href="http://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> don&#8217;t you, or was it sooo two weeks ago ?). So you would think the news organisations would be all over it. Of course, it&#8217;s not doing anything much to it&#8217;s victim PCs &#8230; at this point &#8230; but that could easily change. So nothing really to report on, is there.<span id="more-738"></span></p>
<p>Not only has it not carried out anything of note &#8230; yet &#8230; it has mainly been spread around India, Brazil, Mexico and Indonesia, which account for ~33% of the total infections. The US has about 5.5 million infected machines or 2.2% of the total. Fireball is an Adware product of a Chinese Digital Marketing agency called Rafotech. This has been <a href="http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/">discovered</a> by security researchers at Check Point.</p>
<p><strong>So how has it spread so widely and quietly?</strong></p>
<p>Lets answer that by saying what it is first. It&#8217;s what is known as a browser high-jacker. It takes control of your browser (Chrome, Firefox, Safari, Internet Explorer or Edge) and directs any searches you make on the internet to go through Rafotech search engines rather than Google or Yahoo. They use other tracking technology (<a href="https://en.wikipedia.org/wiki/Web_beacon">tracking pixels</a>) to capture personal data about you. All of this generates advertising revenue for Rafotech as Fireball controls where your browser goes.</p>
<p>How it has spread was by being bundled with other software, which people have downloaded and installed. Fireball was included and installed without permission on the victim&#8217;s computer. Fireball is capable of executing any code on the victim machines, resulting in a wide range of actions from stealing credentials to dropping additional malware.</p>
<p>What this means is that, <strong>at this time</strong> it is nothing more than a sneaky spy that is watching what you are browsing and re-directing your searches to it&#8217;s own search engines so it can generate advertising revenue for Rafotech. It could very easily be weaponised and have much more destructive malware execute without your permission on your machine.</p>
<p><strong>How do I know if I&#8217;m infected?</strong></p>
<p>To check if you’re infected, first open your web browser. Was your home-page set by you? Are you able to modify it? Are you familiar with your default search engine and can modify that as well? Do you remember installing all of your browser extensions? If the answer to any of these questions is “NO”, this is a sign that you’re infected with some type of adware.</p>
<p><strong>How do I clean it up?</strong></p>
<p><span style="color: #ff0000;"><strong>1.</strong></span> To remove almost any adware:</p>
<p style="padding-left: 30px;">Follow these simple steps on Windows:</p>
<p style="padding-left: 30px;">1. Uninstall the adware by removing the application from the Programs and Features list in the Windows Control Panel.</p>
<p style="padding-left: 30px;">For Mac OS users:</p>
<ol>
<li>Use the Finder to locate the Applications</li>
<li>Drag the suspicious file to the Trash.</li>
<li>Empty the Trash.</li>
</ol>
<p style="padding-left: 30px;">Note – A usable program is not always installed on the machine and therefore may not be found on the program list.</p>
<hr />
<p><span style="color: #ff0000;"><strong>2.</strong></span> Scan and clean your machine, using:</p>
<ul>
<li>Anti-Malware software</li>
<li>Adware cleaner software</li>
</ul>
<hr />
<p><span style="color: #ff0000;"><strong>3.</strong></span> Remove malicious Add-ons, extensions or plug-ins from your browser:</p>
<p style="padding-left: 30px;"><strong>On Google Chrome:</strong><br />
a. Click the Chrome menu icon and select Tools &gt; Extensions.<br />
b. Locate and select any suspicious Add-ons.<br />
c. Click the trash can icon to delete.</p>
<p style="padding-left: 30px;"><strong>On Internet Explorer:</strong><br />
a. Click the Setting icon and select Manage Add-ons.<br />
b. Locate and remove any malicious Add-ons.</p>
<p style="padding-left: 30px;"><strong>On Mozilla Firefox:</strong><br />
a. Click the Firefox menu icon and go to the Tools tab.<br />
b. Select Add-ons &gt; Extensions.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Remove any suspicious Add-ons.<br />
d. Go to the Add-ons manager &gt; Plugins.<br />
e. Locate and disable any malicious plugins.</p>
<p style="padding-left: 30px;"><strong>On Safari:</strong><br />
a. Make sure the browser is active.<br />
b. Click the Safari tab and select preferences.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Select the Extensions tab.<br />
d. Locate and uninstall any suspicious extensions.</p>
<hr />
<p><span style="color: #ff0000;"><strong>4.</strong></span> Restore your internet browser to its default settings:</p>
<p style="padding-left: 30px;"><strong>On Google Chrome:</strong><br />
a. Click the Chrome menu icon, and select Settings.<br />
b. In the On startup section, click Set Pages.<br />
c. Delete the malicious pages from the Startup pages list.<br />
d. Find the Show Home button option and select Change.<br />
e. In the Open this page field, delete the malicious search engine page.<br />
f. In the Search section, select Manage search engines.<br />
g. Select the malicious search engine page and remove from the list.</p>
<p style="padding-left: 30px;"><strong>On Internet Explorer:</strong><br />
a. Select the Tools tab and then select Internet Options.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
b. In the Advanced tab, select Reset.<br />
c. Check the Delete personal settings box.<br />
d. Click the Reset button.</p>
<p style="padding-left: 30px;"><strong>On Mozilla Firefox:</strong><br />
a. Enable the browser Menu Bar by clicking the blank space near the page tabs.<br />
b. Click the Help tab, and go to Troubleshooting information.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Select Reset Firefox.</p>
<p style="padding-left: 30px;"><strong>On Safari:</strong><br />
a. Select the Safari tab and then select Preferences.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
b. In the Privacy tab, the Manage Website Data… button.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Click the Remove All button.</p>
<p>The post <a href="https://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">Fireball &#8211; 1,000 times bigger than Wannacry.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sick subtitles can infect your media player</title>
		<link>https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 29 May 2017 15:28:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Kodi]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Media Player]]></category>
		<category><![CDATA[Popcorn Time]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Strem.io]]></category>
		<category><![CDATA[Stremio]]></category>
		<category><![CDATA[Subtitles]]></category>
		<category><![CDATA[VLC]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=714</guid>

					<description><![CDATA[<p>Do you use a media player like VLC, Kodi, Popcorn Time or Strem.io? Perhaps you are using one of those &#8220;dodgy&#8221; Android boxes? If so you will want to update them to their latest version ASAP because it is possible that they might pick up subtitles that can compromise the machine that you are playing&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/">Sick subtitles can infect your media player</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-715" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408-150x150.jpg" alt="Evil subtitles" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Do you use a media player like VLC, Kodi, Popcorn Time or Strem.io? Perhaps you are using one of those &#8220;dodgy&#8221; Android boxes? If so you will want to update them to their latest version ASAP because it is possible that they might pick up subtitles that can compromise the machine that you are playing the media on.<span id="more-714"></span></p>
<p>According to <a href="https://www.theregister.co.uk/2003/10/18/kill_bill_trojan_fails/">this</a>, the concept of using malicious subtitle files to compromise a machine goes back to the early 2000&#8217;s. However that was not a very widespread phenomenon back in the day.</p>
<p>In this modern era, where every home probably has multiple media players, this could become a very serious problem, because you might not have the media player set to automatically update. In fact in some cases there is no automatic update facility available, only a message to suggest you update the software manually. This is the case with VLC and Kodi for Windows. As we say in our <a href="http://www.l2cybersecurity.com/use-automatic-updates/">First Commandment</a>, you should always keep your software up-to-date with patches and new versions.</p>
<p>You might ask what kind of impact could a malicious subtitle file really have. The researchers at Check Point posted their <a href="http://blog.checkpoint.com/2017/05/23/hacked-in-translation/">research</a> into this attack vector and the following is what they said could happen:</p>
<blockquote><p><em>By conducting attacks through subtitles, hackers can take complete control over any device running them. From this point on, the attacker can do whatever he wants with the victim’s machine, whether it is a PC, a smart TV, or a mobile device. The potential damage the attacker can inflict is endless, ranging anywhere from stealing sensitive information, installing ransomware, mass Denial of Service attacks, and much more.</em></p></blockquote>
<p>So, yes it is pretty serious alright. The researchers also discovered that it is possible to manipulate sites that host subtitles in order to make a malicious subtitle file more &#8220;popular&#8221; so the sick subtitles would be more likely to be chosen and loaded by the media player when the video is being played.</p>
<p>They have also provided a video to show, as a proof of concept, how easy it is to take control of the victim&#8217;s computer by way of malicious subtitles.</p>
<p><iframe loading="lazy" title="Hacking Demonstration | Popcorn Time Translation Malware Found" width="500" height="375" src="https://www.youtube.com/embed/vYT_EGty_6A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>I realised after reading this story that I still have Kodi installed on my home PC, though I have not used it in a couple of years (as I use Plex to watch my media now). It was running version 14.1 whereas the current version is 17.3. So I&#8217;ve uninstalled it altogether now and also verified that my Plex installation is fully updated, as well as any installs of VLC. I gotta practice what I preach. <img decoding="async" src="https://www.facebook.com/images/emoji.php/v9/f61/1/28/1f64f.png" alt="?" /><img decoding="async" src="https://www.facebook.com/images/emoji.php/v9/f64/1/28/1f60e.png" alt="?" /></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/">Sick subtitles can infect your media player</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
