To Activate or To Cancel: The Flash Play Malware Conundrum

Before you suffer Hamlet-esque paralysis by analysis, we want to warn you about a Trojan that is currently targeting Android users around the world. This especially insidious malware doesn’t care how long you look before you leap because you are darned if you activate or darned if you cancel.

 

Flash Play Malware

 

Gotcha!

Once the app appears on your Android device, it doesn’t matter what you do. You’ve already been had. Taking the form of an Adobe Flash Player app, a typical, but counterfeit, appears on your device and displays the options of “Activate Device Administrator” or “Cancel.”

If an unsuspecting user chooses “Activate,” the pop-up screen disappears, but the Trojan activates in the background and effectively gains total administrative rights on the device. Obviously, “Activate” would not be the wise choice.

The Obvious Answer is Wrong

 Based on what we have shared so far, the obvious response would be to “Cancel.” Wrong. The “Cancel” option is another cleverly devised “Gotcha!” In fact, it may prove to be more frustrating than choosing “Activate.”

When you choose “Cancel” the pop-up screen disappears – just like you would expect it to. Momentarily. Then it reappears. No matter how many times you click “Cancel,” the pop-up keeps popping up. It won’t go away until you choose “Activate.”

But, Wait! There’s More!

A good criminal (Look folks! An oxymoron!) always has a backup plan. In this case, the malware has its own deletion prevention system built in. Imagine a bunch of cyber-thugs certified in virtual martial arts. This malware will not go away simply because you want it too and it already anticipates what you will do to get rid of it.

Houston, We Have a Problem

Like the Apollo 13 astronauts, we can be thankful that there is a way. It may look like duct tape and bailing wire, but who doesn’t love duct tape?

The Trojan can be manually removed by going to: Settings>Security>Device Administrators>Google Play Services>Deactivate.  Once the administrative rights are deactivated, the user can find the Flash Player update and delete it.

The moral of the story is that sometimes you get stuck between a rock and a hard place. Often, there seems to be no way out. Sometimes the way out is not evident or easy. At Tech Sentry, it is our mission to protect you wherever we can and to rescue you when you need us. Contact us today to learn how we can help.

Just Give Me Your Personal Information and Everything Will Be Fine

A woman visiting a Myrtle Beach resort recently report a scam in which her credit card was charged close to $2,000 – in California!

The scam is neither new nor localized. In 2015 a Memphis hotel guest fell for the same scam and soon discovered $1,000 in unauthorized charges on his card.

Information, Please

Personal Information Myrtle Beach

The scam is simple. The scammer calls the hotel room and identifies themselves as “so and so and the front desk.” He or she goes on to explain that the hotel’s credit card system has crashed or that there was a minor problem with their credit card when they registered. All they need is to read your credit card information to them again over the phone.

The problem is that the call did not originate at the front desk. In fact, it could originate from nearly anywhere, as long as the caller sounds sincere.

Don’t Think You’d Fall for That? Think Again.

What if you were doing research on the internet and a window pops up on a website indicating that the information you want is a “secure file” or “protected document?” It’s not a problem. All you need to do is provide the requested personal information and you will be given access to the file.

Same scam. Different playground. Fooled you! Whether it is done on the phone or on the internet, the scammers are phishing, and you have taken the bait, hook, line, and sinker.

Be Smarter Than the Scammers

A simple rule: Never give out your personal information. The tighter you hold onto it, the less likely it is to be stolen.

A simple question: Was your information really stolen? Or, did you voluntarily give it away.

A simple strategy: THINK before you give out your personal information. It’s nice to be nice and cooperative, but it’s stupid to be stupid and cooperative.

A simple precaution: If you receive an email that asks you to view a secure or protected document by clicking a link, delete the email. Do not open. Do not pass Go. Do not lose $200.00 (or more).

For more information, please call Tech Sentries at 843-282-2222.

Avoid Spam Myrtle Beach

How to Avoid Spam Like a Kid at Supper Time

Avoid Spam Myrtle Beach

 

It’s true! Everybody hates SPAM, but “Nobody doesn’t like Sara Lee.” Why is that? It’s because Sara Lee is always sweet. Spam is about as appealing as a pig’s shoulder, which is, as it turns out, one of the commercial product’s main ingredients.

How Spam E-Mail Got Its Name

It all started with a Monty Python skit about the commercial product – Now available in 18 different varieties! Yuck. The skit is about a woman who doesn’t like Spam trying to order breakfast in a pub where every menu item comes with Spam. The combined annoyance of the woman trying to order something without Spam and the typical Monty Python droll and droning humor led to the name “spam” being attached the plethora of undesired emails filling inboxes everywhere.

How to Control Spam

Spam is. You can’t change the fact that it exists, but you can control how much of it gets into your house. Here are a few tips.

  • Use your provider’s spam filter. Your email provider knows that you don’t like spam. They don’t like it either. That’s why they have provided a spam filter feature for your convenience. Look for it under the Settings menu. Like call blocking, emails from addresses that you list in the filter will not be delivered to you.
  • Identify spam as spam. Every provider offers an option to mark single emails as spam – just like Hormel does with its mystery meat. Once you mark an email message as spam, that information goes to the filter and subsequent messages from that sender email address will fall short of your inbox.
  • Set up email accounts with multiple providers. Once you have done that, use on or two of those accounts exclusively for responding to website requests for your contact information – especially if your visit is “one and done” and you don’t want them pestering you. All their follow up and solicitation emails will end up in an account that should contain nothing but spam. Works like a charm – and it costs nothing.

How to Avoid SPAM

  1. Stay out of Aisle Five. That “Cleanup on Aisle Five” you’ve heard about. That’s the SPAM police clearing the shelves.
  2. Beware of Amazon. Yes, SPAM is available on Amazon in singles, in 12-ounce cans, and by the case. Which begs, the question, “Who would buy SPAM by the case?”

There you have it. Here’s hoping that you receive no more spam, but something nice occasionally from Sara Lee. Nobody doesn’t like something from her.

For help staying clear of SPAM, please call us today!

Meet Hicurdismos. On Second Thought, Don’t

“It is truly marvelous, that in this art, and in this only, the various methods of falsification should be made a study: for the sample of the false denarius is now an object of careful examination, and people absolutely buy the counterfeit coin at the price of many genuine ones!”

So said Pliny the Elder, the first century A.D. philosopher who died in the eruption of Mt. Vesuvius, proving that men have engaged in the art of counterfeiting for more than two millennia. While it may not be the world’s oldest infamous profession, it is a close second.

Meet Hicurdismos

This is where you, the reader, think that Hicurdismos was an ancient Greek or Roman counterfeiter. You would be wrong. Hicurdismos is not Greek not Roman nor ancient, but one this Hicurdismos is a counterfeit.

Hicurdismos is a form of malware disguised as a BSoD (Blue Screen of Death) alert. It is a counterfeit of Microsoft Security Essentials tech support software for Windows 7 and Windows 8. In addition to going to blue screen, the malware hides your cursor so that you PC appears to be frozen. A warning message then appears. It includes a toll-free number to call for tech support. Of course, when you call the number, you discover that this counterfeit is also ransomware. Gotcha!

Meet Hicurdismo

 

The Problem with Counterfeiting

The problem with counterfeiting is that is so deceptive. It was deceptive in the first century. It is even more deceptive today. Why is that?

The reason is simple. Every solution for counterfeiting has always been the same: develop a better technology. Granted it didn’t take a giant leap in technology to craft a different drachma or denarius. It just took a while for the counterfeiters to catch up with the change.

In the 21st century technology is the answer for every problem. Technology is advancing at a rate that was unimaginable even 20 years ago. Think about that. Technology itself is moving so fast that a) it is more difficult to stay ahead of counterfeiters, and b) counterfeiters can move as fast or, in some cases, faster that the “feiters” can count.

Digital counterfeiters don’t have to be any faster. They only have to be good enough to fool the average person. As soon as a new technology exists, they can move rapidly to replicate the original for the pernicious purpose of pulling one over on us.

The Son of Hicurdismos

It remains to be seen what the next iteration of the Hicurdismos DNA will be. When it does become apparent, we will warn you to be on guard. In the meantime, don’t believe everything you read on your computer screen – unless, of course, it is from us. Be concerned. Be careful. Be cautious. We are here for you.

Call Tech Sentries at 843-282-2222 for assistance.

Just When You Thought It Was Safe…

safe-modeJust when you thought it was safe in the water … Well, you know the rest of the story.

Just because something looks safe, that does not mean that mean that it is. In fact, it now appears that just because something says that it is safe, no longer means that it actually is.

Unfortunately, that now applies to your computer’s Windows’ OS Safe Mode.

No Safe Is Safe

We should all be aware by now that there is no such thing as a safe safe. The infamous Willie Sutton claimed that there would never be a safe that he could not crack. The theory is simple: If you can figure out how to build a safer safe, someone else can figure out how to break into it.

That is precisely what has happened to Windows’ Safe Mode. That even includes computers with Windows 10’s Virtual Safe Mode, according to a report released on September 15, 2016, by CyberArk Labs.

It’s Kind of Like Judo

The attacks on Safe Mode are similar to the fundamental concepts behind Judo and other martial arts. Leverage the other person’s strengths against them. In this case, the strength is Safe Mode and hackers can now use it against you and your business.

The strength of Safe Mode is that it allows users to boot their PCs and servers using only those tools that are essential to the operating system. Put another way, the computer or server booted in Safe Mode restricts the operation of third-party software. That can – and often does – include security software.

Safe This Way

This new innovation of hack enters through the door where you least expect it – the one that is marked “Safe This Way.” While that may sound innocuous enough, to a safecracker more like an invitation. Hackers see it the same way. We think it identifies a safe route or place. Safecrackers and hackers see it as the route to the place where the safe is.

From the hackers’ perspective, “Once in Safe Mode, logins can be stolen and otherwise with defeated pass-the-hash lateral techniques can be used to compromise other networked machines. A fake login screen can be shown using a COM object technique to emulate a normal boot and cloak Safe Mode. Users who then type in their credentials assuming a normal reboot will hand their logins to attackers.

Once attackers break through the perimeter and gain local administrator privileges on an infected Windows-based machine, they can remotely activate Safe Mode to bypass and manipulate endpoint security measures.

In Safe Mode, the attackers are able to freely run tools to harvest credentials and laterally move to connected systems – all while remaining undetected.”

What Should We Do Now?

Unfortunately, not much. However, we advise the following precautionary measures per CyberArk’s and PC Pit Stop’s advice: Network administrators should

  • cycle privileged account credentials to disrupt pass-the-hash attacks
  • enforce the least privilege by stripping local administrator rights
  • deploy security tools capable of running in Safe Mode.\
  • ensure your operating system and applications are updated
  • run a security scan at least once a week
  • think before you click

Finally, read our newsletters and releases to stay abreast of threats and ways to prevent them. And don’t be afraid of the dark.

For any further information, please contact Tech Sentries at 843-282-2222.

Ransomware Satana

The Latest Ransomware from Hell: Satana

It sure seems that ransomware is rampant! As soon as we get control of one virus, the cyber criminals are at it again, creating an even more vicious strain of ransomware, spyware, malware and any other “ware” that will bring harm to your computer. The fight must go on and we will work hard to keep you informed of the latest dangers to your system and help you to stay safe.

One of the most recent discoveries of ransomware is a malware that has been nicknamed “Satana.” This could point to Russian roots. The two things this Trojan will do is corrupt and encrypt the Windows Master Boot Record, which means that the booting process on Windows is otherwise corrupted, your computer will be unable to determine which partition actually stores theRansomware Satana blocked.

Here’s a little education for those who might need it. The master boot record, or “MBR” is part of your hard drive. It stores information on the system’s files that various disk partitions use, along with the main partition that stores your operating system. If this becomes corrupted or encrypted, your computer loses critical information. Once your computer is unable to find this information, it cannot boot up.

The criminals behind “Satana” have taken this one step farther and not only locked these encrypted files into place, but also caused the booting system to be completely locked. The code in the MBR is then replaced with the code of a ransom note and the nightmare starts.

Satana Ransomware

There is some good news here. The MBR can be repaired with the right skills. It can take some serious understanding of how to navigate inside the command prompt and the OS restore feature. The average computer user will not feel at ease doing this and therefore will often get themselves in even deeper trouble. Basically, even if you could get Windows unlocked and get your OS turned back on, the encrypted files have yet to be recovered and while a cure is underway, none has been successful yet.

Satana has not become very widespread or sophisticated yet, so now is the time to get a grip on how to protect yourself! You must keep a close watch on these viruses and threats—that is your first and best defense. Follow our simple advice below to stay as safe as possible:

1. Regularly perform backups on your data! We can’t stress this enough.

It’s the only insurance policy you have against a ransomware attack. If you’re properly backed up, retrieving your files is not generally a big deal once the operating system has been reinstalled.

2. NEVER open emails with attachments you aren’t sure about.

Even if the link or attachment seems to have come from someone you trust, don’t open or click on anything you aren’t sure of. It’s the number one entry point of a virus into your system. The same goes for opening suspicious emails.

3. Get reliable anti-virus protection.

Tech Sentries will provide you with all the information and services you need to stay safe!

4. Follow Tech Sentries Guardian newsletter!

This is the best way to stay informed and aware. We find the malware and ransomware threats and pass them on to you BEFORE you become a victim.

Call Tech Sentries today (843-282-2222)! Stay safe while we do all the work behind the scenes.

Ransomware Virus Zepto

ALERT: Over 130,000 E-Mails Sent By New Ransomware Virus Zepto

Ransomware known as Locky hasn’t been very active in the last several weeks but now has resurfaced in a big way, and it’s extremely concerning. While Locky isn’t new, it appeared to have gone dormant awhile back. However, the creators of this vicious ransomware are just as evil now as they were then. There is now a brand new strain of this virus known as Zepto.

Unfortunately, it has struck its first victim. More than 130,000 emails were sent to users, tailor made for each email recipient. They were sent to look as though they came from executives in their respective companies. These emails were made to look official and came with instructions for the recipient to open and review various documents. As soon as that link is clicked on, the Ransomware Virus Zeptovirus gets in and the crisis starts.

It has been reported by International Business Times that Zepto is closely related to Locky based on three criteria:
• Both Locky and Zepto use RSA tools of encryption
• The same files are used to infect computers
• The ransom messages sent out to recipients is very similar

Here’s what you can do to protect yourself now!

• Perform a security update immediately! Updates are issued as soon as security companies discover any holes. This can only happen if you perform regular updates, so it’s crucial that you stay up to date on your security software.
• Don’t use security programs that use blacklisting technology only. If you employ security programs that also implement whitelisting technology, you will ensure your online safety. The threat of malware is constant and you need the right technology to combat it. This means whitelisting AND blacklisting.
• Make sure you have an up-to-date operating system. Seems rather benign, but it’s super important when it comes to cyber security! Keep in mind that performing updates will allow your system to repair itself automatically when problems are detected. If you don’t run updates, your system will not fix the issues. Your computer will scan for potential problems as you perform system updates.

The best way to stay safe is to stay connected with Tech Sentries. We have many options to make sure your system is backed up automatically, as well as protected against viruses of all kinds. Let us do the work for you so you don’t find yourself in a security nightmare. Tech Sentries is the best option available to both home and business users.

Call us today 843-282-2222 and stay informed!

cleanup computer files

Cleaning Out Your Computer to Free Up Space – Part 2

In our last article, we gave some great tips on how to free up space and let your computer run faster. Here, we will continue those tips and help you do the organizing needed for a thorough deep clean of your computer. Here we go!

Deleting Apps

If you are a Mac user, drag your unwanted programs and apps to the Trash. This usually
will get rid of the files associated with that app, as well. It will keep support files and preference files. While preference files don’t take up much room, support files can – especially for large media programs like Garage Band. Go to Finder, click on Macintosh HD (or Home) > Library > Application Support. Your files are listed by the app they are associated with. Drag and drop them in the trash. Be cautious to delete only the files associated with the apps you have definitely deleted! There are some good apps that will allow you to delete several apps at once and you can find these in the app store.cleanup computer files

For Windows users, simply go to your Control Panel and click on Controls and Features. Choose the program you want to delete and click Uninstall. That easy!

Getting Rid of Trackers and Spyware

Over the course of casually browsing the net, you can easily pick up minor viruses and trackers unless you’ve been using a great security software or automatic protection by Tech Sentries. Malware is always evolving so you should have your computer regularly scanned for these trackers and Trojans, etc. Tech Sentries will do all this for you automatically!

Finishing the Job….

It helps to minimize the applications you see in your Control Panel or Dock. If you don’t need them every day, get rid of the apps that show up all the time. You can let your computer run faster by doing this. It won’t delete the app, just the icon in your task bar or dock.

Sort things by file type now that you’ve cleaned things out. Merge your duplicate folders. Name the folder you really want to keep and manually merge any duplicates into that folder and delete the old one.

Give Your Photos a Proper Home

First, figure out where your pictures are. They may have auto-synced if you download a lot from a smartphone or email. They may end up in your downloads folder but be available to view through iPhoto if you’re a Mac user. If you are a Windows user with an iPhone, you will want to have iCloud installed and then Apple’s My Photo Stream will download all your newest pictures to your computer. Turn on Photo Stream in settings > iCloud > Photos.

If you have an Android phone, your pics will likely sync to your Google + account. You can also import them to your computer via USB. It’s also good to use a service like Dropbox to store on the cloud. It’s a great way to keep space free on your hard drive.

Another good way of organizing all your photos is with an external hard drive designed especially for photo storage.

Finally, move all your documents to the Documents Folder, move all your songs and mp3s to the Music Folder, and All Movies and Videos to the Video Folder. This may seem simple, but it makes a huge difference to your ease of use! It can be time consuming to sort files but it’s worth it in the end. You will not have to search for thing you’re looking for and your computer will be free of duplicates, which bog it down and cause it to run much slower.

Call us at Tech Sentries today to find out how we can keep your computer running at peak performance and keep you protected!

common computer virus

Stay Safe from Two of the Newest Ransomware Viruses

Ransomware is a beast for sure. It has a sneaky way of flying under the radar and is always changing so it’s hard to detect it. To help you stay safe, we’re letting you know of two new ransomware viruses that have recently come to our attention and could seriously impact your computers.
You might know or heard about CryptoXXX, Cerber and even Petya, but how about MIRCOP or Bart? The last two are new ransomware viruses desperately trying to get into your computer and cause you all kinds of virus problems.

MIRCOP is particularly nasty. They are turning the tables by making themselves look like the victim with YOU as thecommon computer viruses perpetrator! Hard to believe? Well, it gets worse. They send notices to you claiming that you have stolen bitcoins from them and that the only way they will leave you alone is if you pay them $33,000 USD to solve the matter. They claim to know a lot of your personal information and this, of course, lures people in simply by using the fear tactic. HOWEVER—this particular virus company has yet to actually collect any of this money, as most people aren’t going to give them the time of day once they see that amount! If you see anything at all with the name MIRCOP, close it, do NOT open any attachments, and just be aware of your activity.

BART is another ransomware virus out right now. While your files are not encrypted, what it does do is steal your files and put them in a password-protected zip file, making them inaccessible to you. The file name will change to something with Bart in it, and once this has happened to all your files, you have no recourse. They will send you a ransom demanding of at least $1800 and at that point, the damage has already been done.

So what do you need to know?

First, both of these new ransomware viruses get spread through the use of email, so NEVER open anything that has either of these names in it. It’s especially important not to click on any links.
Second, call Tech Sentries TODAY and let us protect your computer and all the files you have without ever having to even think about it! We provide Proactive Whitelist Virus Protection and can provide encrypted backup so you don’t have to. Tech Sentries will give you the peace of mind you deserve when it comes to your computer safety, so call us today and find out how easy it really is!

Common Computer Viruses

How to Understand the Terms of Common Computer Viruses

Part of owning a computer is having to deal with the different viruses and bugs that can corrupt your system. In this article, we will educate you about some common terms for computer viruses and what they mean. These terms can get used incorrectly so it’s important for you to know what they mean and how they are used. You may come into contact with files that can compromise your computer, so it’s critical that you get some great anti-virus software. Tech Sentries can help you know just what you need and we’ll also do all the legwork behind the scenes to keep your system safe!

Recognizing Computer Viruses

Just what is a virus? What does it do? A computer virus can do a lot of damage. They are programs that mix into your other Common Computer Virusessoftware programs where they spread and multiply. They are almost always there due to nefarious intent. It can be hard to know when and if you’ve been infected by computer viruses, so you need to know the symptoms to look for. They include lost space on your hard drive, data that becomes corrupted, pop-ups that are relentless, and personal information that becomes compromised.

Computer Worms

Computer worms have a very serious implication and can cause a lot of damage in your system. Worms don’t need other software programs in order to clone themselves. This makes them different than viruses. They look for soft spots in your security and networks in order to infect other computers. While your files are not altered, these computer worms recreate themselves on their own, making them very destructive.

Trojan Horses

Trojan horses, or trojans for short, are very sneaky and hackers absolutely love them. They are considered malware and are most often spread through attacks on social engineering. While they cannot reproduce themselves, they are still highly dangerous and can cause catastrophic damage. This makes them different than other computer viruses. Once a system has been infected with a trojan horse, it helps hackers be able to get your personal information, credit card numbers, passwords, etc. They can even cause your webcam to get turned on without you knowing it.

Rootkits

Rootkits are considered trojans and they look for access through administrative routes in order to gain root. Rootkits conceal themselves and can also hide things like registry keys, other files and even your network connection. Rootkits are so destructive and difficult to remove that more often than not, your entire operating system will have to be reinstalled in order to clean your system of them.

The internet is full of potential dangers as you download various files or even click on certain links. It’s impossible to know all of the dangers or prevent them. The only way to have the assurance that your computer is safe is to have superb anti-virus software that runs constantly. Tech Sentries knows exactly how to protect your computer and will keep it protected by doing the behind the scenes work while you are busy with other things. This means you will never have to even think about computer security because we will do it for you in the background at all times! While there are many products on the market to protect you from computer viruses, none can compare to the superior protection we offer here at Tech Sentries.

For more information, please call us here at Tech Sentries today! 843-282-2222.

1 2 3 4