Rozena Backdoor Malware

Rozena Backdoor Malware Uses a Fileless Attack to Injecting Remote shell on Windows. There are currently many methods of distribution of malware. Rozena is no different, so to distribute a previously undocumented backdoor named Rozena on Windows systems, a phishing campaign has recently been observed that leverages the recently disclosed Follina vulnerability. Partner Now Request Infomation There are currently many methods of distribution of malware. Rozena is no different, so to distribute a previously undocumented backdoor named Rozena on Windows systems, a phishing campaign has recently been observed that leverages the recently disclosed Follina vulnerability. The Microsoft Windows Support Diagnostic Tool (MSDT) is an application designed for remote code execution, resulting in a CVE-2022-30190 vulnerability published in May 2022. A malicious external URL link can be embedded in a Microsoft Office document to trigger an exploit allowing attackers to inject a malware OLE object into the file. This method lures victims into clicking on the link or simply previewing the document. CVE ID: CVE-2022-30190 Description: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability Released: May 30, 2022 CVSS: 7.0 Affected platforms: Microsoft Windows Impact parties: Microsoft Windows Users Impact: Full Control of Affected Machine Severity: Critical Technical Analysis Upon opening an infected document containing a Discord CDN URL as a starting point, the document connects to a Discord CDN URL to retrieve an HTML file (“index.htm”) as the result of the latest attack chain observed by Fortinet.  Technical Analysis Upon opening an infected document containing a Discord CDN URL as a starting point, the document connects to a Discord CDN URL to retrieve an HTML file (“index.htm”) as the result of the latest attack chain observed by Fortinet.  #malware #microsoft #windows #html #cibersecurity #ciberseguridad Credit. Pablo Palacios shorturl.at/cdrwZ

Honda cars vulnerability

The vulnerability in Honda cars allows hackers to unlock and boot? Hackers could open the doors and start the car remotely on almost all Honda models. A keyless remote entry system is often installed in modern vehicles, allowing effortless access to the car. Partner Now Request Infomation A keyless remote entry system allows you to unlock or start the vehicle remotely via a mobile device. Recently, a security professional conducted a test to assess the resistance level of an RKE system currently in use. Based on the results of this analysis, it found that all Honda vehicles that have been manufactured between the years 2012 and 2022 have a Rolling-PWN attack vulnerability. Any hacker could exploit this vulnerability from afar to open the car door permanently or, in the worst case, even start the car’s engine as well.Fault profileCVE ID: CVE-2021-46145Description: The remote control subsystem in 2012 Honda Civic vehicles allows a repeat attack to unlock. The related variable code that does not expire and a counter resynchronization. Base score: 5.3 Severity: MEDIUMTechnical analysis A software-defined radio allows an attacker to capture the code that the car owner uses to unlock the vehicle by exploiting a vulnerability in the software-defined radio. The hacker could also open the car by reproducing the process upto 30 meters can be observed in some cases, it is possible to attack from that distance. Below, we have mentioned all the vulnerable Honda models tested: 2012 Honda Civic2018 Honda X-RV2020 Honda C-RV2020 Honda AccordHonda Odyssey 20202021 Honda InspireHonda Fit 2022 INTRODUCTIONModern vehicles are often equipped with a remote keyless entry system. These RKE systems allow unlocking or starting the car remotely. The goal of our research was to evaluate the resistance of a modern-day RKE system. Our study disclosed a Rolling-PWN attack vulnerability affects all Honda vehicles currently existing on the market (From the Year 2012 up to the Year 2022). This weakness allows anyone permanently opens the car door or even start the car engine from a long-distance away. The Rolling-PWD bug is a severe vulnerability. We found it in a vulnerable version of the mechanism of the rolling code, which was implemented in a huge amount of Honda vehicles. A rolling code system in keyless entry systems is to prevent replay attacks; after each keyfob button is pressed, the rolling codes synchronizing counter increases. However er, the vehicle receiver will accept a sliding window of codes to avoid accidentally being key pressed by design. Sending the commands in a consecutive sequence to the Honda vehicles will resynchronize the counter. Once the counter is resynced, commands from the previous cycle of the counter are reworked again. Therefore, those commands can be used later to unlock the car. Credit. Pablo Palaciosshorturl.at/cdrwZ Click here

Avosec Partner Zillya Ukrainian Antivirus

Avosec Announces Strategic Partnership with Ukrainian Antivirus Leader Zillya Partner Now Request Infomation Avosec is excited to announce a new strategic partnership with Zillya, the leading Ukrainian antivirus vendor. This partnership focuses on delivering consumer antivirus solutions across the UK, the Balkans, Greece, and Turkey, empowering home users with advanced protection and reliable cybersecurity. James Norris, CEO of Avosec, commented:“We have long admired Zillya’s innovative consumer security products. In the face of the current crisis in Ukraine, supporting our partners is more important than ever. Profits from Zillya software sales will be donated to the British Red Cross Ukraine Appeal, helping those affected during these challenging times.” About Zillya: Zillya is the only dedicated antivirus laboratory in Ukraine, with a strong focus on cybersecurity and antivirus software development since 2009. Operating in 15 countries worldwide, Zillya delivers high-quality consumer protection for home users, offering premium features at competitive prices. All products and technologies are entirely developed and supported in their Kyiv offices, ensuring customers continue to receive reliable protection and support even during challenging circumstances. Looking Ahead:Both Avosec and Zillya are committed to growing this partnership, providing home users with affordable, reliable, and feature-rich antivirus solutions, while making a meaningful impact through charitable contributions. Avosec are pleased to announce that we have signed a new partnership agreement with Ukrainian Antivirus vendor Zillya. The partnership is focused on offering consumer licensing in the UK, the Balkans, Greece and Turkey.James Norris CEO of Avosec said, “We have long been looking at the competitive consumer products Zillya has been producing. With the current crisis within Ukraine, it is important now, more than ever, to support our Partners. Profits from Zillya! Software sales will be donated to The British Red Cross Ukraine appeal”. Zillya are the only Antivirus Laboratory in Ukraine.Zillya has developed Cyber Security and Antivirus software since 2009. The company operates in 15 countries worldwide and offers consumer protection for home users. The products are the highest quality and provide additional features that more costly premium competitor offerings don’t.The products and technologies of cyber protection are entirely developed and supported by their Ukraine offices in Kyiv. Their employees continue to provide customers with reliable security and support throughout the current crisis.We are pleased to partner with Avosec and believe that the partnership will evolve.

Avast Discounts & Avast Coupon Codes

Avast Discounts & Coupon Codes Partner Now Request Infomation Avast is the leading cybersecurity company and the largest antivirus company globally. Avosec is the UK’s leading Distributor of Avast Business and AVG Business products.There are many Avast discount and AVG discount levels available to Avast Partners. Discount starts at 10% and up to 30% discount on Avast and AVG.Avast Business suites contain different levels of protection to keep you and your business safe. The product suites are. Avast Essential Business Security Avast Premium Business Security Avast Ultimate Business Security Avast Business Avast Business Pro Avast Business Pro Plus Avast Patch Management Avast Cloud Backup AVG Patch Management AVG Antivirus Business Edition AVG Internet Security Business Edition Contact us for Avast Discount

Avast Free Support

Free Support for Avast users If you need help then look no further. Avosec has been helping Avast customers for over 20 years. We know our stuff!avosec 360° managed cyber security service Get Support Here Find out more Why work with us? Protect against known Viruses and emerging threats Avosec Managed Antivirus Endpoint helps to keep both known and emerging Malware off workstations and servers. Our Managed Antivirus Services stay up-to-date with the latest threats using traditional signature-based protection but also protects against new threats and Malware using Artificial Intelligence and behavioural scanning. With new threats created each day, businesses need to protect themselves by using proactive cybersecurity countermeasures to help ensure rock-solid Malware protection. Gain Your own Cybersecurity Malware Team Avosec employees have provided Antivirus Security Consultancy to the likes of IBM, Ford, Lloyds TSB, Deutsche Bank, Dresdner Bank, British Nuclear Electric, Scottish Power, and various NHS Trusts. We have been delivering Managed Antivirus Services since 2002, and we believe nobody comes close to us in terms of knowledge and expertise.

No more Cybersecurity Insurance?

No more Cybersecurity Insurance? Partner Now Request Infomation Will cyber insurance that covers ransomware attacks goes away? AXA France has stopped writing new insurance policies for ransomware in France. Will the trend continue? Will others do the same? How will you insure your business against ransomware?   Let us show you a demo! Try NeuShield NeuShield Data Sentinel provides effective data protection against ransomware because changes are never made directly to your protected files. To try NeuShield click here. Partner program We work closely with all types of partners to deliver technologies that are simple to deploy and easy to manage. To join our partner program click here. Download the full article

Kaspersky Partnership

Kaspersky Partnership The best security makes life easier, not harder for congested IT departments. If your business is growing fast or is in the process of digital transformation, then it is possible that resources have been exceeded. Choose an endpoint product that provides immediate protection and is ready to scale if necessary. Partner Now Request Infomation A single security solution that will meet all your IT security needs We are happy to announce that Kaspersky customers can now benefit from our expert consultancy, sales and support! Kaspersky’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Effortless cybersecurity for growing businesses The best security makes life easier, not harder, for overworked IT departments. If your business is growing fast, or is in the throes of digital transformation, the chances are that resources are continuously overstretched. Choose an endpoint product that delivers instant protection and is ready to scale when you need it. Get in touch to learn more now

Poor Patch Management attributes to 57% of data breaches

Poor Patch Management attributes to 57% of data breaches Patching takes time. A lot of it. Unfortunately, many businesses wind up skipping it simply because they don’t have the bandwidth – leaving them vulnerable and exposed to serious cyberthreats. Partner Now Request Infomation Having an automated patch management solution to avoid harmful data breaches is a non-negotiable in today’s world. We’ll help ensure you’re not the next data breach headline. Our Patch Management solution simplifies installation and configuration and uses powerful, automated discovery and deployment features to keep your business safe and compliant with industry regulations and business requirements. Let us take care of the patching, with our Patch Management solution. We’ll keep your Windows systems and third-party apps up-to-date with all the latest patches. Take back time in your day, so you can focus on running your operations. With Avast Business Patch Management, you can: Automatically scan devices, identify vulnerabilities, deploy patches, and more Obtain scan results in a record time of 4-8 seconds Leverage the largest patch catalog in the market, including third-party applications (200 vendor families, 350 applications, overall ~7K different patched versions) We’ll help you achieve compliance, mitigate exploits, and close vulnerabilities. Contact us today for more information. Download the full article

Norton eager to buy Avast

NORTON EAGER TO BUY AVAST Avast and AVG are in the midst of being consumed by NortonLifeLock (formerly known as Symantec). They are in advanced talks to merge to create the world’s largest cybersecurity company. Both of companies have confirmed that talks are taking place, with Avast announcing that the deal would be completed in one part cash and one part stock. Partner Now Request Infomation Norton and the Avast AVG brands may end up merging as AVG is part of the Avast portfolio now. Avast merged with AVG, and both companies pioneered freemium antivirus, offering free protection and additional paid features. By the end of 2020, they had 435 million active users, of which 16.5 million pay for additional features. The pandemic has made them grow even more due to the increase in computer sales. They would be the undisputed leaders in the antivirus market dwarfing others. One of the most curious features that Norton has launched on the market has been the possibility of using the antivirus itself as a tool for mining cryptocurrencies, with a wallet integrated into the program itself. With this, they seek to prevent users from mining with programs of dubious origins, and which may be stealing part or all of the money mined if it has been downloaded from unreliable sources. Under UK law, NortonLifeLock has until August 11 to make a takeover offer to Avast to buy the Avast and merge two companies into one, and the figure is certain to be between $8 billion and $10 billion. The company is still estimating the size of the offer for all of Avast and its subsidiaries and reserves the right to vary the form or final outcome of the merger. They have not said anything about whether they will keep Avast free or that of AVG, but hopefully, they will. The merger will benefit NortonLifeLock the most, not only because it will merge with the antivirus company with the largest share, but because the company has its largest worldwide share of users in the United States, while for example in Europe others like Avast and other regional antivirus have more share. Credits to techbriefly Download the full article

Kaseya vulnerabilities

KASEYA VULNERABILITIES Here are three clear steps to help keep yourself and your businesses as safe as possible Partner Now Request Infomation “It never rains but it pours.” It’s the saying that describes situations in which several bad things happen at once, and these situations are ones that security incident teams know well. In fact, security teams across the globe have quite recently been experiencing such a situation in regards to the active, formidable PrintNightmare and Kaseya threats. For those who don’t have dedicated security teams, such as home users and small and medium businesses (SMBs), it can be both confusing and overwhelming to understand what you need to do about either of these security events. In this post, I’ll briefly but clearly walk you through what you need to do to help keep yourself and your businesses as safe as possible. It comes down to three simple steps: If you use Kaseya VSA, disconnect your Kasya VSA servers as instructed by Kaseya. Immediately install the newly released security update from Microsoft for the Print Spooler vulnerability (also referred to as the PrintNightmare vulnerability). Continue to monitor for information from Kaseya and Microsoft for any new steps you may need to take. Disconnect Kaseya VSA servers Kaseya makes software to help manage computers and servers. On July 2, 2021, Kaseya learned that they experienced an attack trying to spread ransomware to the computers and servers managed with their software. An indirect attack like this is sometimes referred to as a supply chain attack and is similar to the SolarWinds attacks in December 2020. This “chain” of attack becomes more complicated because many of the same end customers who use Kaseya VSA and could be at risk are also using this product as customers of managed service providers (MSPs). These customers may not think of themselves as “Kaseya customers” but instead customers of their specific MSP, even though in this situation, they’re at risk as users of Kaseya’s VSA product. Kaseya has been working to prevent the spread of ransomware through their product and they have given clear guidance for their customers for now: If you have a Kaseya VSA server, you should take it offline until further notice from Kaseya. This step breaks the “chain” in this supply chain attack and is the best step that any Kaseya customer can take. This can prevent the ransomware payload that attackers placed in the Kaseya distribution chain from reaching and infecting your systems. If you are a customer of an MSP who uses Kaseya, you might not have a Kaseya VSA server yourself: your MSP may have it. The best thing you can do here is to contact your MSP and ask them if they’re aware of Kaseya’s guidance, what they’re doing in response to it, and which steps you’ll need to take in order to stay protected. Kaseya has indicated that this step is a temporary step to protect their customers while they work on this situation. They expect to instruct their customers to take their VSA servers back online once their investigation and remediation work is done. Install the security update for the PrintNightmare vulnerability On July 1, 2021, it was reported that there was a new unpatched vulnerability affecting the Print Spooler in all versions of Microsoft Windows. The Print Spooler is responsible for handling formatting, submitting and managing print jobs in Windows and runs by default on all systems with the same privileges as the operating system. The potential impact of a successful attack against this vulnerability would be to give an attacker complete control over the system. This is particularly dangerous for domain controllers because an attack against these systems could give someone complete control over the entire network, not just a single system. As of July 6, 2021, Microsoft has released an emergency out-of-band security update to address this vulnerability. It’s a mark of how serious this vulnerability is that not only has Microsoft released an emergency security update for it, but they’ve also released security updates for versions of Windows that are otherwise no longer supported. What you should do in this situation is simple: Download and install this security update for every and all Windows systems as soon as possible. If you’re running a version of Windows that’s no longer supported, like Windows 7, you should also look to migrate to a version of Windows that is supported as soon as you can after installing this security update. Out-of-support versions of Windows are vulnerable to a number of other security vulnerabilities, and being on an out-of-support version is inherently unsafe and dangerous. As of right now, there are no known widespread attacks against this vulnerability. Continue to monitor for new information Both of these situations are still in progress and new information can (and will) develop. For instance, Kaseya has indicated that their customers should be prepared to bring their Kaseya VSA servers back online when instructed to do so. Also, whenever there is an emergency patch like the one that Microsoft has released, there’s always a chance that there will be new developments after it has been released. For these reasons, after taking the steps outlined in this post, you should continue to watch the Kaseya and Microsoft websites for any further steps. If you take the aforementioned steps and continue to monitor for new information, you will have done all you can to most effectively protect yourself, your systems and your business from these two major concurrent security events. Both Avast Business and AVG Business Antivirus will keep you protected from these threats. Keep in mind that Avast Patch Management and AVG Patch Management will help you avoid further malware threats. Download the full article

Translate »