Monthly Archives: February 2014

Security Alert – Linksys Router Vulnerability “The Moon”

Technical details about a vulnerability found in home based and SMB Linksys routers that have been exploited by a new work released on Sunday along with a proof-of-concept that has a long list of vulnerable device models.

Last week, security researchers from the SANS Institute’s Internet Storm Center identified a self-replicating malware software that can exploits and bypasses an authentication vulnerability to infect Linksys routers. The worm has been named TheMoon.

Initial reports from SANS found that the administration interface from the E-Series router models are the target of these infections, but may not be the only Linksys devices vulnerable to this CGI attack. An exploit writer, who used the online handle as REW, later confirmed writing these two scripts and left the following quote in response “I was hoping this would stay under wraps until a firmware patch could be released, but it appears the cat is out of the bag,” Rew wrote in the exploit notes.”… Read more

Read more

Shield Watch helps a Tampa SMB Avoid Disaster

Tampa’s premier retirement community Rocky Creek Village was able to avert a major Trojan attack on its entire IT infrastructure thanks to its IT Managed Services provider, Shield Watch.  Click… Read more

Scam Alert – One Ring

A new phone scam is on the rise and regardless of your technical ability it can get you!

According to the BBB, this scam is being called “One Ring”.  The scammer calls random phones, but before it has a chance to ring on your end they hang up in hopes when you call them back.  Sounds innocent enough right?  How often do we get called by random phone numbers in an age where most people would rather send a text than leave a voicemail we call them back to see who it was… they have you!… Read more

Read more

Malware Warning – Death Notification

A fake funeral announcement email is making the rounds with a very speaking malware infection attached.  You’ll typically receive something from “The Amos Family” or “Eubank Funeral Home” claiming they have more information regarding a memorial service that may interest you.

The link goes directly to a compromised server run by the Asprox botnet, which will ultimately give access to your system via the Kuloz or dofoil Trojan horse.

There is and most likely be more variants of this message so please look out for these type of morbid deceptions.  There’s a screenshot of what a similar message looks like.  Please forward to your staff so they don’t possibly open this clever malware attempt.… Read more

Read more