Page 10 of 11 FirstFirst 1234567891011 LastLast
Results 91 to 100 of 104
  1. #91
    Service Manager 5,000+ Posts
    FBI Security Alerts

    SalesServiceGuy's Avatar
    Join Date
    Dec 2009
    Location
    Nova Scotia
    Posts
    5,043
    Rep Power
    147

    Re: FBI Security Alerts

    Quote Originally Posted by BillyCarpenter View Post
    [h=2][SIZE=4][B]I don't think Biden is up to the job.
    ... while your concern holds little merit the statement that Synnex was breached should concern all copier/print vendors as they are the #1 distributor for countless products in the computer industry.

    I know of many dealers who order product like Lexmark from them everyday.

    "Synnex’s Urban told CRN Tuesday morning that the distributor has no relationship with Kaseya and doesn’t use any of its systems, including the compromised VSA remote monitoring and management product. “We do not know if this is related to the Kaseya ransomware attack to MSPs and some end customers,” Urban said in a statement emailed to CRN. “That is part of the review.” "

    ... the attack on Synnex may or may not have been successful.

  2. #92
    Service Manager 5,000+ Posts
    FBI Security Alerts

    SalesServiceGuy's Avatar
    Join Date
    Dec 2009
    Location
    Nova Scotia
    Posts
    5,043
    Rep Power
    147

    Re: FBI Security Alerts

    Microsoft delivers emergency patch for PrintNightmare security bug

    Microsoft is offering patches for unsupported versions of Windows to plug the so-called PrintNightmare bugs.

    Microsoft has released an out-of-band patch for the security flaw known as PrintNightmare that is under attack already and lets attackers take control of a PC.

    The PrintNightmare bug is being tracked as CVE-2021-1675 and CVE-2021-34527. It's a critical bug in the Windows print spooler with exploit code in the public domain before Microsoft had a chance to release a patch for it. Admins were advised to disable the Print Spooler service until a patch was made available.

    Microsoft has now completed its investigation and released security updates to address the security bug.

    "The security updates released on and after July 6, 2021 contain protections for a remote code execution exploit in the Windows Print Spooler service known as "PrintNightmare", documented in CVE-2021-34527, as well as for CVE-2021-1675," Microsoft said.

    "We recommend that you install these updates immediately," Microsoft said.
    The bug looks to be a serious concern at Microsoft, which has taken the rare step of releasing patches for Windows 7. That version of Windows reached the end of mainstream support on January 14, 2020.

    Very occasionally Microsoft releases patches for unsupported versions of Windows. It did that for Windows XP in 2017 after the WannaCry ransomware attacks, which were blamed on North Korean hackers.

    Windows 7 accounts for a smaller share of all Windows PCs out there today, but the numbers remained significantly large enough for Google to maintain Chrome support for Windows 7 until July 2021.

  3. #93
    Service Manager 5,000+ Posts
    FBI Security Alerts

    SalesServiceGuy's Avatar
    Join Date
    Dec 2009
    Location
    Nova Scotia
    Posts
    5,043
    Rep Power
    147

    Re: FBI Security Alerts

    I have a Windows 7 computer and it will not update after several attempts to counter this new Print Nightmare threat.

    Any ideas?

  4. #94
    Field Supervisor 500+ Posts
    Join Date
    Oct 2011
    Location
    Hunter Valley, NSW
    Posts
    859
    Rep Power
    44

    Re: FBI Security Alerts

    Quote Originally Posted by SalesServiceGuy View Post
    I have a Windows 7 computer and it will not update after several attempts to counter this new Print Nightmare threat.

    Any ideas?
    Update it to Windows 10, as I am sure you would advise your customers to do.

  5. #95
    Retired 10,000+ Posts slimslob's Avatar
    Join Date
    May 2013
    Location
    Bakersfield, CA
    Posts
    15,697
    Rep Power
    440

    Re: FBI Security Alerts

    Quote Originally Posted by SalesServiceGuy View Post
    Microsoft delivers emergency patch for PrintNightmare security bug

    Microsoft is offering patches for unsupported versions of Windows to plug the so-called PrintNightmare bugs.

    Microsoft has released an out-of-band patch for the security flaw known as PrintNightmare that is under attack already and lets attackers take control of a PC.

    The PrintNightmare bug is being tracked as CVE-2021-1675 and CVE-2021-34527. It's a critical bug in the Windows print spooler with exploit code in the public domain before Microsoft had a chance to release a patch for it. Admins were advised to disable the Print Spooler service until a patch was made available.

    Microsoft has now completed its investigation and released security updates to address the security bug.

    "The security updates released on and after July 6, 2021 contain protections for a remote code execution exploit in the Windows Print Spooler service known as "PrintNightmare", documented in CVE-2021-34527, as well as for CVE-2021-1675," Microsoft said.

    "We recommend that you install these updates immediately," Microsoft said.
    The bug looks to be a serious concern at Microsoft, which has taken the rare step of releasing patches for Windows 7. That version of Windows reached the end of mainstream support on January 14, 2020.

    Very occasionally Microsoft releases patches for unsupported versions of Windows. It did that for Windows XP in 2017 after the WannaCry ransomware attacks, which were blamed on North Korean hackers.

    Windows 7 accounts for a smaller share of all Windows PCs out there today, but the numbers remained significantly large enough for Google to maintain Chrome support for Windows 7 until July 2021.
    Guess what, it is now July 2021.

  6. #96
    Service Manager 5,000+ Posts
    FBI Security Alerts

    SalesServiceGuy's Avatar
    Join Date
    Dec 2009
    Location
    Nova Scotia
    Posts
    5,043
    Rep Power
    147

    Re: FBI Security Alerts

    Multiple REvil ransomware sites are down on the dark web



    • Dark web sites affiliated with the REvil ransomware gang were not operating Tuesday morning.
    • The disappearance of the sites affiliated with the Russian-linked gang REvil, also known as Sodinokibi, comes on the heels of an international ransomware outbreak on July 2 that the group had taken credit for.
    • President Joe Biden recently said it would make sense for the United States to attack computer servers used by ransomware groups.




    Dark web sites linked to the REvil ransomware gang were not operating Tuesday morning, CNBC has confirmed.

    It is not clear what led to the websites of the ransomware-as-service group going down Tuesday. Visitors to the sites, which had recently been active, were greeted with messages saying, “A server with the specified hostname could not be found.”

    The disappearance of the public-facing sites affiliated with Russia-linked REvil, also known as Sodinokibi, comes on the heels of an international ransomware outbreak on July 2 that the group had taken credit for.

    A National Security Council official declined to comment to CNBC on Tuesday morning.

    On Friday, President Joe Biden was asked by a reporter if it “makes sense” for the United States to attack the computer servers that have hosted ransomware attacks.

    “Yes,” Biden answered.

    A National Security Council official later that same day told reporters that U.S. authorities expected to take action against ransomware groups soon.

    “We’re not going to telegraph what those actions will be precisely,” that official said.

    “Some of them will be manifest and visible, some of them may not be. But we expect them to take place in the days and weeks ahead.”

    John Hultquist of Mandiant Threat Intelligence told CNBC on Tuesday, “The situation is still unfolding, but evidence suggests REvil has suffered a planned, concurrent takedown of their infrastructure, either by the operators themselves or via industry or law enforcement action.”

    “If this was a disruption operation of some kind, full details may never come to light,” Hultquist added in an email.

    He also said an analysis shows that “known websites associated with the REvil ransomware RaaS are offline or non-responsive.”

    “REvil’s darknet (.onion) and clearnet (decoder.re) websites are offline, and although we have no visibility into exactly how their darknet sites have been taken down their clearnet site’s domain has simply ceased resolving to an IP address and its dedicated name servers are still online,” Hultquist said.

  7. #97
    Service Manager 5,000+ Posts
    FBI Security Alerts

    SalesServiceGuy's Avatar
    Join Date
    Dec 2009
    Location
    Nova Scotia
    Posts
    5,043
    Rep Power
    147

    Re: FBI Security Alerts

    US blames China for hacks, opening new front in cyber offensive


    The United States and its foreign allies on Monday accused China of widespread malfeasance in cyberspace, including through a massive hack of Microsoft's email system and other ransomware attacks, a dramatic escalation in the increasingly urgent attempt by the Biden administration to stave off further breaches.

    In a coordinated announcement, the White House and governments in Europe and Asia identified China's Ministry of State Security, the sprawling and secretive civilian intelligence agency, with using "criminal contract hackers" to conduct a range of destabilizing activities around the world for personal profit, including the Microsoft hack, according to a senior US administration official.

    The administration official also said China was behind a specific ransomware attack against a US target that involved a "large ransom request" — and added that Chinese ransom demands have been in the "millions of dollars."

    The public disclosure of the Chinese efforts amounts to a new front in an ongoing offensive by the Biden administration to bat away cyberthreats that have exposed serious vulnerabilities in major American sectors, including energy and food production. The extent of Chinese involvement in hiring criminal networks to invade and extort money around the world came as a surprise to the White House, officials said.

    "What we found really surprising and new here was the use of criminal contract hackers to conduct this unsanctioned cyber operation and really the criminal activity for financial gain. That was really eye-opening and surprising for us," a senior administration official said on Sunday ahead of the announcement.

    Still, while American officials have raised concerns with the Chinese about the behavior, the US is stopping short of applying new punishment on Beijing as part of Monday's announcement. The official said the US was "not ruling out further actions to hold (China) accountable."

    On Monday, the Justice Department announced that four Chinese nationals and residents were indicted by a federal grand jury in San Diego for "a campaign to hack into the computer systems of dozens of victim companies universities and government entities" in the US and abroad between 2011 and 2018.

    Three of the individuals were Hainan State Security Department officers who were "coordinating, facilitating and managing computer hackers and linguists" for front companies to conduct hacking for the "benefit of China and its state-owned and sponsored instrumentalities," the department said. Another individual was a computer hacker who allegedly hacked into computer systems used by foreign governments, companies and universities, and created malware and supervised other hackers.

    They were each charged with one count of conspiracy to commit computer fraud and one count of conspiracy to commit economic espionage.

  8. #98
    Service Manager 5,000+ Posts
    FBI Security Alerts

    BillyCarpenter's Avatar
    Join Date
    Aug 2020
    Location
    Long Beach, Mississippi
    Posts
    5,920
    Rep Power
    209

    Re: FBI Security Alerts

    Quote Originally Posted by SalesServiceGuy View Post
    US blames China for hacks, opening new front in cyber offensive




    Still, while American officials have raised concerns with the Chinese about the behavior, the US is stopping short of applying new punishment on Beijing as part of Monday's announcement. The official said the US was "not ruling out further actions to hold (China) accountable."
    \

    \

    The reason why this is happening is because they see Biden as a pushover. He better act and it better be severe or the cyber attacks will only get worse.

  9. #99
    IT Manager 10,000+ Posts bsm2's Avatar
    Join Date
    Feb 2008
    Location
    Don't be a Billy
    Posts
    10,976
    Rep Power
    146

    Re: FBI Security Alerts

    Quote Originally Posted by BillyCarpenter View Post
    The reason why this is happening is because they see Biden as a pushover. He better act and it better be severe or the cyber attacks will only get worse.
    Maybe you could turn on SMB1 Billy that will Help



    Do not turn on Smb1 on its a known security threat.

    Don't be a Billy!
    Last edited by bsm2; 07-19-2021 at 04:13 PM.

  10. #100
    Service Manager 5,000+ Posts
    FBI Security Alerts

    SalesServiceGuy's Avatar
    Join Date
    Dec 2009
    Location
    Nova Scotia
    Posts
    5,043
    Rep Power
    147

    Re: FBI Security Alerts

    Quote Originally Posted by BillyCarpenter View Post
    The reason why this is happening is because they see Biden as a pushover. He better act and it better be severe or the cyber attacks will only get worse.
    ... try and stay informed about the news!

    On approx July 14, President Biden authorized a cyber strike that knocked out all of the transaction servers used the the Russian cyber criminal group R-Evil on the dark web.

    Those servers are still down and the criminal groups ability to launch RaaS attacks has been significantly reduced.

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Get the Android App
click or scan for the Copytechnet Mobile App

-= -= -= -= -=


IDrive Remote Backup

Lunarpages Internet Solutions

Advertise on Copytechnet

Your Link Here