We hope you enjoyed a nice long weekend! It’s been a busy weekend when it comes to ransomware attacks, Windows bugs, and hackers so we’ll get right into it. Here is your weekly cybersecurity round up!
While many have been enjoying their holiday weekend, a massive ransomware attack paralyzed the networks of thousands of businesses worldwide. The ransomware attack started Friday, July 2 when the REvil cyber gang exploited a vulnerability in a software supplier’s update mechanism. The malicious code allowed the ransomware to spread at an alarming rate and infect thousands of companies.
REvil is asking for $70 million in ransom to provide the global decryptor key. This is the highest ransom demanded to date, beating the previous REvil request of $50 million after attacking the computer brand, Acer.
To learn more about the developing story, click here.
Microsoft has updated its security update page to describe a printing bug that could be used for remote code execution. Pretty much any hacker could break into your computer, without needing the password for your account. Once in, the hacker can then take over your computer.
Microsoft is working on a fix for this bug but in the meantime make sure your antivirus is running and up-to-date. If you don’t have antivirus yet, we recommend you install some. You can get a great deal of McAfee here. We also recommend you run a FixMeStick scan this week to make sure nothing is hiding on your computer.
We expect there to be a patch soon, likely by next Tuesday (or even sooner!). This is why we always recommend keeping your operating system up-to-date. If you don’t want to use your Windows computer until there is a patch, you may want to consider using the StartMeStick! It’s a fast, private, and secure operating system on a stick so you don’t have to worry about any bugs within Windows. You can check it out here.
Finally, in other hacker related news, Colombian police arrest Gozi malware suspect after 8 years at large. Gozi was responsible for malware that would trick victims into revealing personal information related to their online banking. It was successful because there was no tell-tale error message or failed transaction, and there is a fake URL a user might notice.
The third, and last member of the group to be free, was caught last week at Bogotá International Airport by the Colombian authorities. They are working with the US diplomatic service to potentially start the extradition process.
That’s all we have for this week’s round-up! Let us know if you have any questions or what to know more about anything in the comments below.