The Dangers of Mapped Drives
Here's the scenario:We had a cryptolocker virus tear through our servers over the weekend (had good backups, all is well - it just took a lot of time). I can only guess it traveled via mapped drives as...
View ArticleWebroot vs Cylance
Trying to decide which route to go. Need some input from the community. Pro's and Cons. We are replacing Kaspersky as our End Point protection.
View Articlehas anyone had ransom-foo!htm virus yet?
Has anyone experienced ransom-foo!htm yet. I think we also have crypto locker as well but I think its apart of the ransome-foo. I am able to remove most of it but I know this has opened our server and...
View ArticleNeed scrip for delete webroot from registry completely
Need scrip for delete webroot from registry completely
View ArticleCrypto Locker Virus
Well, here it is again. Another user infected with the virus and it going through the shared drives on the server. Luckily someone was trying to access a file, noticed something wrong and reported it...
View ArticleHow to check logs/registry for virus infection
Hello,While permissioning a folder I came across what looked to be some sort of ransomware attempt. It was a couple of HTML files, and a couple of text files with contact info on how to get the key to...
View ArticleThe Cost of CryptoWall
The actual cost of a cyber-attack is difficult to quantify. While businesses employ the best security measures there is no guarantee that they won’t be affected. In 2015 the FBI had estimated that the...
View ArticleESET AV problem, all servers needed hard reboot
Has anyone else had a problem with ESET AV 4.5 on Server 2012 in the last 24 hours?last night I had problems with a few servers starting with things like PRTG monitoring probes failing, no remote...
View ArticleAutomate Virus Scan Spyware Scan and Defrag
I want to do a little clean up on a few computers this weekend and would love to not be here at the office to do it I desperately need a day off lol. So is there a way to automate malware bytes to run...
View ArticleOffline rootkit scan
A client has a Sony VAIO Ultra notebook, with a PCIe SSD and no optical drive. We suspect a possible rootkit. Webroot runs on the device and it has not detected anything. Additionally, I temporarily...
View ArticleRecommended Business Anti-Virus & Anti-Malware
Hi,I work in a school and am looking for peoples recommendations on Business Anti-Virus & Anti-Malware after a pretty serious incident.We are currently using Avast Business Free and we like it...
View Article.VVV file Trojan Attack on my computer
Dear members,my computer has been attacked by a trojan called ransome and all my files show to have an extension of .VVV and the file type is VVV file.I have tried the following;System restoreCopying...
View ArticleFlash disk shortcut malware
Dear members,I have been having a problem on my network. Am using Avast endpoint but I keep getting some computers when a flash is inserted all files turn to shortcuts.I have been fixing it by deleting...
View ArticleFinding the cause of a Cryptolocker infection
Located "patient zero". But i need to find out how the infection got in (someone needs answers). Checked IE logs, emails, nothing out of the ordinary.Cannot find any processes out of the ordinary. User...
View ArticleNew version of Ransomware this morning?
A new version of ransomware did NOT clear Shadow Copies. The Engineer told me it is real sloppy, almost like it was a test run ... We will know more later!
View ArticleWest Cheshire Police Scam - Ransomware
The West Cheshire Police ScamI have a friend who has an Android Tablet.. The problem is we keep getting a Police scam virus.We have wiped and reset the tablet numerous times, wiped the internal SD...
View ArticleCryptoWall
I had a user get infected with CryptoWall last Thursday but didn't say anything to me about files missing/corrupt until this morning. Luckily she only had access to two network shares. Fortunately, the...
View ArticleChoosing and Endpoint Solution
What Endpoint solution and what are the most important considerations to take into account when choosing a solution for an organisation. The size is +/- 600 users. with about 130 physical and virtual...
View ArticleLongest Running Malwarebytes Scan
I have a badly infected computer where Malwarebytes has been running for the past 24 hours. Yes, that's right ... 24 hours! I have never seen this happen in my tenure in the IT field. This is a new...
View Article