It has arrived! Petya

Petya Ransomware

Supportedge have been monitoring this threat since 28 June 2017

Again None of our clients have reported this infection.

What is the danger to Supportedge’s clients?

This problem is an issue for Microsoft Windows systems only. The Petya attack starts by sending spam messages containing links to download a ZIP archive. The archive contains a malicious file and as well as a JPEG image. The file names are in German at this stage, the file names are made to look like resumes for job candidates, for this reason the main is HR staff in German-speaking countries.

Australia has not been hit by a wave of attacks. This attack uses the same exploit in Windows that was used to spread WannaCry virus. There are notable differences between Petya and WannaCry, the largest is, WannaCry had a kill switch, Petya does not! If you are infected by Petya Your computer becomes locked and held at ransom (no access to the operating system).

The top 5 countries that have been affected

  1. Germany
  2. China
  3. India
  4. Japan
  5. Russian Federation

What do I do to protect myself?

Call us, we will check your system and report the risk. If you’re a subscription client we have already checked your systems, you don’t need to do anything.

If you’re interested in self-checking your system and you don’t need our help you can find more information and procedures here: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx As a part of your self-checks please also make sure to validate your backups.

Ask about our computer monitoring tool!

Not only will this software provide centralised and market-leading anti-virus protection, it will also conduct a thorough series of checks each and every morning before you start work. Checks include:

  • Your antivirus is up-to-date and protecting you from the latest threats online
  • Your disk space to ensure your system won’t crash and your workers aren’t left unproductive while you recover
  • Your hard disk and memory health to ensure your system is always in peak operating condition
  • Your Critical Event Logs to spot other developing problems that could cause downtime during the day.
  • Automated Operating System patch management

Useful Links

Here is a list of some useful links: Generate strong passwords: http://passwordsgenerator.net Online malware scanner and statistics: http://www.virustotal.com


Read More...

Social Media

Here at Supportedge we like to maintain a close working relationship with our customers and their systems. Social media platforms provide you with a range of ways to connect with us, give us your feedback, and keep up to date with our progress and current trends in the world of IT. Please drop by and say hi! There’s nothing we value more than your queries and ideas! Facebook www.facebook.com/supportedge Instagram www.instagram.com/supportedge Twitter www.twitter.com/supportedge


Read More...

Cloud Computing

The “cloud” has become a household name in the past couple of years, but what does it actually mean and what can it do for your business and home? According to info-world.com: “Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities… Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering.” Howstuffworks.com describes what cloud computing does: “In a cloud computing system, there’s a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user’s side decrease. The only thing the user’s computer needs to be able to run is the cloud computing system’s interface software, which can be as simple as a Web browser, and the cloud’s network takes care of the rest.” An everyday example of cloud computing, that most people have encountered, can be found within web-based email accounts like, gmail, hotmail and yahoo. Your own computer only [&hellip


Read More...

Like us on facebook