<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Advisories Archives &#8211; ATYXIT - Illinois IT Services and IT Support</title>
	<atom:link href="https://atyxit.com/category/security-advisories/feed/" rel="self" type="application/rss+xml" />
	<link>https://atyxit.com/category/security-advisories/</link>
	<description>Illinois IT Services and IT Support</description>
	<lastBuildDate>Thu, 16 Jan 2025 14:39:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.4</generator>
	<item>
		<title>Ransomware Recovery Guide</title>
		<link>https://atyxit.com/ransomware-recovery-guide/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Thu, 16 Jan 2025 14:38:27 +0000</pubDate>
				<category><![CDATA[Business IT Tips]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207979</guid>

					<description><![CDATA[<p>This article explores the role of data backups, particularly immutable backups, in protecting businesses from ransomware attacks and provides a ransomware recovery guide that covers the the recovery process for companies with and without proper backup strategies.</p>
<p>The post <a href="https://atyxit.com/ransomware-recovery-guide/">Ransomware Recovery Guide</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Data backups serve as a critical line of defense for businesses against the growing threat of ransomware attacks. As cyber crime costs are projected to reach $10.5 trillion annually by 2025, organizations must implement and periodically test robust data protection mechanisms to safeguard their valuable information. This article explores the role of data backups, particularly immutable backups, in protecting businesses from ransomware attacks and provides a ransomware recovery guide that covers the the recovery process for companies with and without proper backup strategies.</p>



<h2 class="wp-block-heading">The Importance of Data Backups in Ransomware Protection</h2>



<p>Ransomware attacks have become increasingly sophisticated, targeting not only primary data but also backup systems. Regular data backups are essential for reducing the impact of these attacks and ensuring business continuity. By maintaining current copies of critical data, companies can avoid the difficult decision of whether to pay a ransom and can resume operations more quickly after an attack.</p>



<h3 class="wp-block-heading">Immutable Backups: A Powerful Defense</h3>



<p>Immutable backups have emerged as a superior solution for ransomware protection. These backups are designed to be unchangeable, providing an extra layer of security against various threats, including ransomware attacks, accidental deletions, and insider threats.</p>



<p>Key benefits of immutable backups include:</p>



<ol class="wp-block-list">
<li>Enhanced protection against ransomware</li>



<li>Data integrity and security</li>



<li>Compliance with data regulations (e.g., GDPR)</li>



<li>Reliable disaster recovery</li>



<li>Faster Recovery Time Objectives (RTOs)</li>



<li>Higher Recovery Point Objectives (RPOs)</li>
</ol>



<h2 class="wp-block-heading">Recovering from a Ransomware Attack: With Immutable Backups</h2>



<p>When a business with immutable backups faces a ransomware attack, the recovery process is significantly more straightforward and less costly. Here&#8217;s what the ransomware recovery typically looks like:</p>



<ol class="wp-block-list">
<li><strong>Incident Detection and Containment</strong>: The organization identifies the ransomware attack and isolates affected systems to prevent further spread.</li>



<li><strong>Damage Assessment</strong>: An IT team such as <a href="https://atyxit.com">ATYXIT</a> evaluate the extent of the attack and identify which systems and data have been compromised.</li>



<li><strong>Backup Verification</strong>: The immutable backups are verified to ensure they haven&#8217;t been tampered with or encrypted by the ransomware.</li>



<li><strong>System Restoration</strong>: Using the clean, immutable backups, the organization can quickly restore its systems and data without paying any ransom.</li>



<li><strong>Business Continuity</strong>: With data and systems restored from immutable backups, the company can resume normal operations with minimal downtime and data loss.</li>



<li><strong>Post-Incident Analysis</strong>: The organization conducts a thorough investigation to understand how the attack occurred and implements additional security measures to prevent future incidents.</li>
</ol>



<p>Example: Gladstone Institutes, a research organization, implemented immutable backups using cloud storage solutions. When faced with a ransomware attack, they were able to quickly restore their critical research data from these backups, avoiding significant delays in their scientific work and potential loss of valuable research findings.</p>



<h2 class="wp-block-heading">Recovering from a Ransomware Attack: Without Backups</h2>



<p>For businesses without proper backup systems in place, recovering from a ransomware attack can be a nightmare scenario. Here&#8217;s what the ransomware recovery process often looks like for these businesses:</p>



<ol class="wp-block-list">
<li><strong>Panic and Assessment</strong>: Upon discovering the attack, the organization frantically tries to determine the extent of the damage and which systems are affected.</li>



<li><strong>Limited Options</strong>: Without backups, the company faces two unappealing choices: pay the ransom or lose the data permanently.</li>



<li><strong>Ransom Negotiation</strong>: If the organization decides to pay, they must negotiate with cybercriminals, often through cryptocurrency transactions, with no actual guarantee of data recovery.</li>



<li><strong>Lengthy Decryption Process</strong>: Even if the ransom is paid and decryption keys are provided, the process of decrypting and restoring data can take days or weeks, resulting in extended downtime and loss of revenue.</li>



<li><strong>Data Loss and Integrity Issues</strong>: There&#8217;s a high risk of permanent data loss, as not all files may be recoverable even after paying the ransom. Additionally, there&#8217;s no way to verify the integrity of the recovered data.</li>



<li><strong>Financial and Reputational Damage</strong>: The organization suffers significant financial losses due to extended downtime, potential ransom payments, and damage to its reputation.</li>



<li><strong>Rebuilding from Scratch</strong>: In worst-case scenarios, the company may need to rebuild its entire IT infrastructure and recreate lost data, a process that can take months and incur substantial costs.</li>
</ol>



<p>Example: A small manufacturing company without proper backups fell victim to a ransomware attack. Unable to access their production schedules, customer orders, and financial records, they were forced to halt operations for weeks. The company ultimately paid the ransom but still lost several days of recent data and spent months rebuilding customer trust and catching up on delayed orders.</p>



<h2 class="wp-block-heading">Best Practices for Ransomware-Resilient Backups</h2>



<p>To ensure effective protection against ransomware, businesses should implement the following backup strategies:</p>



<ol class="wp-block-list">
<li><strong>Implement the 3-2-1 Backup Rule</strong>: Maintain at least three copies of data on two different media types, with one copy stored offsite. This is the bare minimum backup rule that ATYXIT offers as part of its <a href="https://atyxit.com/data-backup-disaster-recovery/">Data Backup and Disaster Recovery services</a>.</li>



<li><strong>Use Immutable Storage</strong>: Leverage immutable storage solutions to prevent unauthorized modifications to backup data.</li>



<li><strong>Regular Testing</strong>: Frequently test backup and recovery processes to ensure they work as expected.</li>



<li><strong>Offline Backups</strong>: Keep at least one backup copy offline or air-gapped to prevent ransomware from accessing it.</li>



<li><strong>Encryption</strong>: Use strong encryption for both data in transit and at rest to protect against unauthorized access.</li>



<li><strong>Versioning</strong>: Maintain multiple versions of backups to increase the chances of having a clean, pre-attack copy.</li>



<li><strong>Employee Training</strong>: Educate staff about ransomware threats and proper data handling procedures to reduce the risk of successful attacks or enroll staff into cyber security training like the one ATYXIT offers as part of its <a href="https://atyxit.com/chicago-managed-it-services/">Managed IT Services</a>.</li>
</ol>



<p>In conclusion, data backups, especially immutable backups, play a crucial role in protecting businesses from the devastating effects of ransomware attacks. Organizations that implement robust backup strategies can recover quickly and efficiently, minimizing downtime and financial losses. In contrast, those without proper backups face a much more challenging and costly recovery process. By following best practices and investing in modern backup solutions, businesses can significantly enhance their resilience against ransomware and other cyber threats and make ransomware recovery the easiest it can be.</p>



<p><em>ATYXIT is a security-first Business IT Solutions Provider and <a href="https://chicagocloud.net">Chicago Cloud Provider</a>. We excel in supporting and evolving company networks. Our technical support, technology consulting, project management, cyber security and IT strategy services make us the ideal IT resource for small and medium sized businesses looking to leverage enterprise-grade technology solutions.</em></p>



<p><strong><a href="https://atyxit.com/contact-us">Reach out today</a> if you need any assistance with your business technology!</strong></p>
<p>The post <a href="https://atyxit.com/ransomware-recovery-guide/">Ransomware Recovery Guide</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding the Fortigate Vulnerability</title>
		<link>https://atyxit.com/understanding-fortigate-vulnerability/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Thu, 24 Oct 2024 10:48:16 +0000</pubDate>
				<category><![CDATA[Business IT Tips]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[fortigate]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207969</guid>

					<description><![CDATA[<p>In today&#8217;s digital landscape, cybersecurity threats are evolving at an unprecedented pace, posing significant risks to businesses of all sizes. Recently, a critical vulnerability in Fortinet&#8217;s FortiManager, identified as CVE-2024-47575, has highlighted the urgent need for small to medium-sized businesses (SMBs) to prioritize cybersecurity. This article will delve into the specifics of the Fortigate vulnerability, [&#8230;]</p>
<p>The post <a href="https://atyxit.com/understanding-fortigate-vulnerability/">Understanding the Fortigate Vulnerability</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today&#8217;s digital landscape, cybersecurity threats are evolving at an unprecedented pace, posing significant risks to businesses of all sizes. Recently, a critical vulnerability in <a href="https://www.fortinet.com/products/management/fortimanager">Fortinet&#8217;s FortiManager</a>, identified as <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47575">CVE-2024-47575</a>, has highlighted the urgent need for small to medium-sized businesses (SMBs) to prioritize cybersecurity. This article will delve into the specifics of the Fortigate vulnerability, its implications for businesses, and why partnering with a local IT provider like ATYXIT can be crucial for safeguarding your business technology.</p>



<h2 class="wp-block-heading">The FortiManager Vulnerability Explained</h2>



<p>Fortinet&#8217;s FortiManager is a network management solution widely used by businesses to manage their Fortinet security infrastructure. On October 23, 2024, a zero-day vulnerability was disclosed in FortiManager, which has been actively exploited in the wild. This vulnerability stems from a missing authentication mechanism in the fgfmd daemon, allowing remote attackers to execute arbitrary code or commands without needing authentication (see: <a href="https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575">Google explanation</a>). The vulnerability carries a CVSS v3 score of 9.8, indicating its critical severity. Exploitation of this flaw can lead to unauthorized access and control over FortiManager devices, potentially allowing attackers to exfiltrate sensitive data such as IP addresses, credentials, and configurations of managed devices. This can have severe consequences, including data breaches and further attacks on connected systems.</p>



<h2 class="wp-block-heading">Implications for Small to Medium-Sized Businesses</h2>



<p>For SMBs, the implications of such vulnerabilities are profound. Unlike larger enterprises, SMBs often lack the robust cybersecurity infrastructure and dedicated IT teams needed to defend against sophisticated cyber threats. This makes them attractive targets for cybercriminals who exploit vulnerabilities like CVE-2024-47575. A successful cyberattack can result in significant financial losses, reputational damage, and even business closure. </p>



<p>According to recent data, small businesses are increasingly targeted by cyberattacks due to their perceived vulnerabilities. Therefore, addressing cybersecurity proactively is not just a defensive measure but a strategic necessity for business continuity and growth.</p>



<h2 class="wp-block-heading">The Importance of Trustworthy IT Partners</h2>



<p>Given the complexity and ever-evolving nature of cybersecurity threats, it is crucial for SMBs to partner with reliable IT service providers who specialize in cybersecurity. Companies like <a href="https://atyxit.com">ATYXIT</a> offer tailored solutions that can help businesses navigate challenges such as this Fortigate vulnerability effectively.</p>



<h2 class="wp-block-heading">Why Choose ATYXIT?</h2>



<ul class="wp-block-list">
<li><strong>Expertise in Cybersecurity</strong>: ATYXIT specializes in providing enterprise-level technology solutions at affordable prices for SMBs. Their expertise includes implementing robust cybersecurity measures that protect against threats like the FortiManager vulnerability.</li>



<li><strong>Local Presence</strong>: Being a local provider means we can offer personalized service and rapid response times. This is critical when dealing with urgent security threats that require immediate attention.</li>



<li><strong>Comprehensive IT Solutions</strong>: Beyond cybersecurity, ATYXIT provides a range of IT services including <a href="https://atyxit.com/data-backup-disaster-recovery/">data backups</a>, <a href="https://atyxit.com/chicago-cloud-services/">cloud services</a>, <a href="https://atyxit.com/complete-workstation-server-management/">patch management </a>and much more. This holistic approach ensures that all aspects of your business technology are secure and optimized.</li>
</ul>



<h2 class="wp-block-heading">Staying Ahead of Cyber Threats</h2>



<p>To effectively combat cyber threats like the FortiManager vulnerability, SMBs should adopt a proactive approach to cybersecurity:</p>



<ul class="wp-block-list">
<li><strong>Regular Updates and Patching</strong>: Ensure that all software and systems are regularly updated to mitigate known vulnerabilities. For FortiManager users affected by CVE-2024-47575, updating to the latest patched version is critical or disabling port 541 from accepting public connections.</li>



<li><strong>Employee Training</strong>: Educate employees on cybersecurity best practices to prevent common attack vectors such as phishing and social engineering.</li>



<li><strong>Robust Security Policies</strong>: Implement strong security policies that include multi-factor authentication, data encryption, and regular security audits.</li>



<li><strong>Incident Response Planning</strong>: Develop an incident response plan that outlines steps to take in the event of a security breach. This should include communication strategies and recovery procedures.</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The recent Fortigate vulnerability serves as a stark reminder of the cybersecurity challenges facing SMBs today. By understanding these risks and taking proactive measures, businesses can protect themselves from potentially devastating cyberattacks. </p>



<p>Partnering with a trusted IT provider like ATYXIT can provide the expertise and support needed to navigate this complex landscape effectively. Investing in cybersecurity is not just about protecting your business; it&#8217;s about ensuring its long-term success and sustainability in an increasingly digital world. </p>



<p>As threats continue to evolve, staying informed and prepared is your best defense against malicious actors seeking to exploit vulnerabilities like those found in FortiManager.</p>



<p><em>ATYXIT is a security-first Business IT Solutions Provider and <a href="https://chicagocloud.net">Chicago Cloud Provider</a>. We excel in supporting and evolving company networks. Our technical support, technology consulting, project management, cyber security and IT strategy services make us the ideal IT resource for local small and medium sized businesses.</em></p>



<p><strong><a href="https://atyxit.com/contact-us">Reach out today</a> if you need any assistance with your business technology!</strong></p>



<p></p>
<p>The post <a href="https://atyxit.com/understanding-fortigate-vulnerability/">Understanding the Fortigate Vulnerability</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The White House on BGP Security</title>
		<link>https://atyxit.com/white-house-bgp-security/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Fri, 06 Sep 2024 12:12:00 +0000</pubDate>
				<category><![CDATA[Business IT News]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[bgp]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[chicago managed it services]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207965</guid>

					<description><![CDATA[<p>Recognizing the urgent need to address these vulnerabilities, the Biden administration has unveiled a comprehensive strategy to enhance BGP security. </p>
<p>The post <a href="https://atyxit.com/white-house-bgp-security/">The White House on BGP Security</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In an era where cybersecurity threats loom larger than ever, <a href="https://whitehouse.gov">The White House</a> has taken a significant leap forward in addressing one of the Internet&#8217;s most critical vulnerabilities. The Border Gateway Protocol (BGP), the backbone of internet routing, has long been a source of concern for security experts. Now, the Biden administration is rolling out comprehensive measures to fortify this essential component of our digital infrastructure. Let&#8217;s explore what this means for the future of internet security and why it matters to everyone who relies on the web.</p>



<h2 class="wp-block-heading">Understanding BGP: The Internet&#8217;s Hidden Highway</h2>



<p>Before we delve into the White House&#8217;s initiatives, it&#8217;s crucial to understand what BGP is and why it&#8217;s so important. Think of BGP as the traffic cop of the internet. It&#8217;s responsible for directing data packets across the vast network of networks that make up the global internet. When you send an email, stream a video, or browse a website, BGP is working behind the scenes to ensure your data reaches its destination efficiently. However, BGP was designed in a time when trust was assumed, and security was an afterthought. This has left it vulnerable to various attacks, including route hijacking, where malicious actors can redirect traffic, potentially leading to data theft or network outages. The consequences of BGP security can be far-reaching, affecting everything from personal communications to critical infrastructure.</p>



<h2 class="wp-block-heading">The White House&#8217;s Multi-Pronged Approach</h2>



<p>Recognizing the urgent need to address these vulnerabilities, the Biden administration has unveiled a comprehensive strategy to enhance BGP security. </p>



<p>Here&#8217;s a breakdown of the key components:</p>



<h2 class="wp-block-heading">1. Mandating Federal Agency Compliance</h2>



<p>The White House is taking a lead-by-example approach by requiring all federal agencies to implement BGP security best practices. This mandate includes:</p>



<ul class="wp-block-list">
<li>Implementing Resource Public Key Infrastructure (RPKI) to validate route origins</li>



<li>Deploying route filtering mechanisms to prevent the propagation of illegitimate routes</li>



<li>Regular audits and updates to ensure ongoing compliance</li>
</ul>



<p>By setting a high standard for federal networks, the administration aims to create a model for the private sector to follow.</p>



<h2 class="wp-block-heading">2. Incentivizing Private Sector Adoption</h2>



<p>Recognizing that government action alone is not enough, the White House is also introducing incentives for internet service providers (ISPs) and other private sector entities to adopt similar security measures. These incentives may include:</p>



<ul class="wp-block-list">
<li>Tax breaks for companies that invest in BGP security upgrades</li>



<li>Preferential treatment in government contracts for compliant organizations</li>



<li>Public recognition and certification programs for companies that meet high security standards</li>
</ul>



<p>The goal is to create a market-driven push towards better BGP security practices across the entire internet ecosystem.</p>



<h2 class="wp-block-heading">3. Investing in Research and Development</h2>



<p>To stay ahead of evolving threats, the administration is allocating increased funding for research and development of new BGP security technologies and protocols. This investment aims to:</p>



<ul class="wp-block-list">
<li>Foster innovation in routing security</li>



<li>Develop more robust authentication mechanisms for BGP</li>



<li>Create tools for real-time detection and mitigation of BGP-related attacks</li>
</ul>



<p>By supporting cutting-edge research, the White House hopes to ensure that the U.S. remains at the forefront of internet security technology.</p>



<h2 class="wp-block-heading">4. International Collaboration</h2>



<p>Recognizing that the internet is a global resource, the Biden administration is also reaching out to international partners to promote BGP security on a global scale. This includes:</p>



<ul class="wp-block-list">
<li>Engaging in diplomatic efforts to establish international norms for secure routing practices</li>



<li>Sharing best practices and technologies with allied nations</li>



<li>Collaborating on joint research initiatives to address common challenges</li>
</ul>



<p>By fostering international cooperation, the U.S. aims to create a more secure global internet infrastructure.</p>



<h2 class="wp-block-heading">Challenges and Opportunities</h2>



<p>While the White House&#8217;s initiatives are a significant step forward, implementing these changes across the vast and complex landscape of internet routing will not be without challenges. Some of the key hurdles include:</p>



<ul class="wp-block-list">
<li>Legacy Systems: Many organizations still rely on older networking equipment that may not support the latest security features.</li>



<li>Cost Concerns: Upgrading to more secure BGP practices can be expensive, particularly for smaller ISPs and organizations.</li>



<li>Technical Complexity: Implementing BGP security measures requires specialized knowledge and skills that may be in short supply.</li>
</ul>



<p>However, these challenges also present opportunities for innovation and growth in the cybersecurity sector. We may see:</p>



<ul class="wp-block-list">
<li>A surge in demand for networking professionals with BGP security expertise</li>



<li>The emergence of new tools and services to simplify BGP security implementation</li>



<li>Increased collaboration between public and private sectors to address common challenges</li>
</ul>



<h2 class="wp-block-heading">What This Means for Internet Users</h2>



<p>While much of the discussion around BGP security may seem technical, the implications for everyday internet users are significant. A more secure BGP infrastructure means:</p>



<ul class="wp-block-list">
<li>Reduced risk of service outages due to routing attacks</li>



<li>Greater protection against certain types of phishing and man-in-the-middle attacks</li>



<li>Increased confidence in the integrity of online transactions and communications</li>
</ul>



<p>In essence, these initiatives aim to make the internet a safer and more reliable place for everyone.</p>



<h2 class="wp-block-heading">Looking Ahead: The Future of Internet Security</h2>



<p>The White House&#8217;s focus on BGP security is part of a broader trend towards treating cybersecurity as a critical national security issue. As we move forward, we can expect to see:</p>



<ul class="wp-block-list">
<li>Continued emphasis on securing fundamental internet protocols and infrastructure</li>



<li>Greater integration of security considerations into the design of new technologies</li>



<li>Increased public awareness of cybersecurity issues and best practices</li>
</ul>



<p>The initiatives around BGP security serve as a reminder that the internet, despite its ubiquity, is a complex and evolving system that requires ongoing attention and investment to remain secure and reliable.</p>



<h2 class="wp-block-heading">Conclusion: A Step Towards a More Secure Digital Future</h2>



<p>The White House&#8217;s BGP security initiatives represent a significant milestone in the ongoing effort to secure the internet&#8217;s core infrastructure. By addressing vulnerabilities in how data is routed across the global network, these measures aim to create a more resilient and trustworthy internet for all users. While challenges remain, the comprehensive approach taken by the Biden administration—combining regulatory mandates, private sector incentives, research investment, and international collaboration—provides a strong foundation for progress. As these initiatives unfold, we can look forward to a future where the internet&#8217;s hidden highways are not just efficient, but also secure and reliable. In an interconnected world where digital security is more critical than ever, these steps towards securing BGP are not just technical upgrades—they&#8217;re investments in the future of our digital society.</p>



<p><em>ATYXIT is a security-first Business IT Solutions Provider and <a href="https://chicagocloud.net">Chicago Cloud Provider</a>. We excel in supporting and evolving company networks. Our technical support, technology consulting, project management, cyber security and IT strategy services make us the ideal IT resource for local small and medium sized businesses.</em></p>



<p><strong><a href="https://atyxit.com/contact-us">Reach out today</a> if you need any assistance with your business technology!</strong></p>
<p>The post <a href="https://atyxit.com/white-house-bgp-security/">The White House on BGP Security</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>YubiKey Vulnerability Discovered</title>
		<link>https://atyxit.com/yubikey-vulnerability-discovered/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Wed, 04 Sep 2024 12:03:00 +0000</pubDate>
				<category><![CDATA[Business IT News]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[2fa]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[business IT tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207962</guid>

					<description><![CDATA[<p>A YubiKey vulnerability discovered! YubiKeys, popular security devices used for two-factor authentication, have been found to be vulnerable to cloning attacks. This discovery was made by researchers from the NinjaLab in France. </p>
<p>The post <a href="https://atyxit.com/yubikey-vulnerability-discovered/">YubiKey Vulnerability Discovered</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A <a href="https://www.yubico.com/">YubiKey</a> vulnerability discovered! YubiKeys, popular security devices used for two-factor authentication, have been found to be vulnerable to cloning attacks. This discovery was made by researchers from the <a href="https://ninjalab.io/">NinjaLab</a> in France. </p>



<h2 class="wp-block-heading">What are YubiKeys?</h2>



<p>YubiKeys are small USB devices that provide an extra layer of security when logging into accounts. They&#8217;re widely used by companies and individuals to protect sensitive information. </p>



<p><strong>The YubiKey Vulnerability:</strong><br>The researchers found a way to potentially clone these keys by exploiting a weakness in how the devices process information. This weakness is called a &#8220;side-channel vulnerability.&#8221; </p>



<p>How the Attack Works:</p>



<ol class="wp-block-list">
<li>An attacker would need physical access to the YubiKey in question.</li>



<li>They would use special equipment to measure tiny changes in the device&#8217;s power consumption.</li>



<li>By analyzing these changes, they could potentially figure out the secret key stored in the YubiKey.</li>



<li>With this information, they could create a clone of the original key.</li>
</ol>



<p>Important Points:</p>



<ul class="wp-block-list">
<li>This attack is complex and requires specialized knowledge and equipment.</li>



<li>It&#8217;s not something that can be done remotely or easily.</li>



<li>The researchers notified Yubico (the company that makes YubiKeys) about this issue.</li>
</ul>



<p>Yubico&#8217;s Response:</p>



<ul class="wp-block-list">
<li>Yubico acknowledged the research but stated that the risk to users is low.</li>



<li>They emphasized that an attacker would need prolonged physical access to the key to carry out this attack.</li>



<li>Yubico is working on updates to address this vulnerability in future products.</li>
</ul>



<p>What Users Should Do:</p>



<ul class="wp-block-list">
<li>Continue using your YubiKeys as they still provide strong security.</li>



<li>Be cautious about who has physical access to your YubiKey.</li>



<li>Consider using the YubiKey&#8217;s touch-required feature for added security.</li>
</ul>



<h2 class="wp-block-heading">The Bigger Picture:</h2>



<p>This research highlights that even highly secure devices can have vulnerabilities. It&#8217;s a reminder of the ongoing challenge in cybersecurity to stay ahead of potential threats. In conclusion, while this vulnerability is concerning, YubiKeys remain a strong security tool when used properly. Users should stay informed but don&#8217;t need to panic about this specific discovery.</p>



<p><em>ATYXIT is a security-first Business IT Solutions Provider and <a href="https://chicagocloud.net">Chicago Cloud Provider</a>. We excel in supporting and evolving company networks. Our technical support, technology consulting, project management, cyber security and IT strategy services make us the ideal IT resource for local small and medium sized businesses.</em></p>



<p><strong><a href="https://atyxit.com/contact-us">Reach out today</a> if you need any assistance with your business technology!</strong></p>



<p></p>
<p>The post <a href="https://atyxit.com/yubikey-vulnerability-discovered/">YubiKey Vulnerability Discovered</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fake Email Orders and How to Stop Them</title>
		<link>https://atyxit.com/fake-email-orders-how-to-stop/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 13:53:09 +0000</pubDate>
				<category><![CDATA[Business IT Tips]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[managed IT Services]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207820</guid>

					<description><![CDATA[<p>A concerning trend that has gained momentum is the proliferation of fake email orders. This phenomenon is not just a nuisance; it's a sophisticated scam operation designed to deceive individuals and businesses alike, often with significant financial consequences.</p>
<p>The post <a href="https://atyxit.com/fake-email-orders-how-to-stop/">Fake Email Orders and How to Stop Them</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Email still remains a critical artery for the flow of information, business transactions, and personal interactions. However, this ubiquity has also painted a target on email&#8217;s back, making it a favored avenue for scammers aiming to exploit unsuspecting victims. A concerning trend that has gained momentum is the proliferation of fake email orders. This phenomenon is not just a nuisance; it&#8217;s a sophisticated scam operation designed to deceive individuals and businesses alike, often with significant financial consequences.</p>



<h4 class="wp-block-heading">The Anatomy of Fake Email Order Scams</h4>



<p>The modus operandi of these scammers is alarmingly simple yet effective. Individuals or businesses receive an email that appears to be a confirmation of an order they never placed. These fake email orders are meticulously crafted to mimic the correspondence from reputable companies, with <a href="https://www.bestbuy.com/site/computer-tablet-services/geek-squad-24-7-support-welcome/pcmcat748300520360.c?id=pcmcat748300520360">GeekSquad</a> being one of the most commonly impersonated brands. The goal? To sow enough confusion and concern that the recipient feels compelled to act.</p>



<p>Embedded within these emails is the bait: a customer support number that the recipient is urged to call if they have any questions or wish to cancel the purported order. However, this number doesn&#8217;t connect to the legitimate customer service of the impersonated company but rather to the scammers themselves. Once on the phone, the scammers deploy a variety of tactics to extract personal information, financial details, or direct payment to &#8220;cancel&#8221; the non-existent order.</p>



<h4 class="wp-block-heading">Recognizing and Reacting to Fake Email Orders</h4>



<p>The key to not falling victim to these scams lies in vigilance and a critical eye. Here are some red flags to watch for:</p>



<ul class="wp-block-list">
<li><strong>Unexpected Order Confirmations</strong>: If you receive an order confirmation for a purchase you didn&#8217;t make, it&#8217;s a significant warning sign.</li>



<li><strong>Generic Greetings</strong>: Scammers often use generic greetings like &#8220;Dear Customer&#8221; instead of your name.</li>



<li><strong>Inconsistencies and Errors</strong>: Look out for typos, grammatical errors, and inconsistencies in the email address or domain.</li>



<li><strong>Unsolicited Contact Numbers</strong>: Legitimate companies will not pressure you to call an unsolicited number for order disputes.</li>
</ul>



<p>Upon spotting a suspicious email, the best course of action is to directly contact the company allegedly sending the email through their official website or customer service number. Do not use any contact information provided in the suspicious email.</p>



<h4 class="wp-block-heading">The Crucial Role of Anti-Spam Solutions</h4>



<p>In the fight against fake email order scams, anti-spam solutions are your first line of defense. These tools are designed to filter out potential scam emails before they even reach your inbox, using sophisticated algorithms to detect the hallmarks of spam and phishing attempts. By utilizing a robust mail anti-spam solution, you significantly reduce the risk of these scams reaching you or your employees, protecting both personal and business assets.</p>



<h4 class="wp-block-heading">The Importance of Local IT Support</h4>



<p>While individual vigilance and anti-spam solutions play a critical role in safeguarding against fake email orders, the value of professional IT support cannot be overstated. A local IT provider, such as <a href="https://atyxit.com">ATYXIT</a>, brings a wealth of knowledge and experience in dealing with these scams. They can offer customized solutions tailored to your specific needs and vulnerabilities, ensuring an added layer of protection. We stay abreast of the latest scam trends and tactics, enabling us to implement proactive measures to prevent these scams from impacting your operations.</p>



<p>Choosing a local IT partner like ATYXIT means having a dedicated team that understands the unique threats faced by businesses and individuals in your area. They can offer immediate, on-the-ground support and advice, helping to mitigate any potential damage from fake email orders and other cyber threats via our <a href="https://atyxit.com/chicago-cyber-security/">cyber security solutions</a>.</p>



<h4 class="wp-block-heading">Conclusion</h4>



<p>The trend of fake email orders is a stark reminder of the ingenuity and persistence of online scammers. These scams represent a significant threat, exploiting the trust individuals and businesses place in digital communication. However, by staying informed, exercising caution, and leveraging the right tools and support, it&#8217;s possible to navigate these hazardous waters safely. Remember, in the digital age, knowledge and preparedness are your best allies against the cunning of cybercriminals.</p>
<p>The post <a href="https://atyxit.com/fake-email-orders-how-to-stop/">Fake Email Orders and How to Stop Them</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Rising Threat of CEO Fraud</title>
		<link>https://atyxit.com/the-rising-threat-of-ceo-fraud/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Fri, 05 Apr 2024 12:57:38 +0000</pubDate>
				<category><![CDATA[Business IT Tips]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[business IT tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[managed IT Services]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207815</guid>

					<description><![CDATA[<p>In today's fast-paced business world, the threat of cyber crime looms larger than ever, with CEO fraud emerging as one of the most sophisticated and financially damaging scams. CEO fraud, also known as Business Email Compromise (BEC), targets businesses of all sizes</p>
<p>The post <a href="https://atyxit.com/the-rising-threat-of-ceo-fraud/">The Rising Threat of CEO Fraud</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today&#8217;s fast-paced business world, the threat of cyber crime looms larger than ever, with CEO fraud emerging as one of the most sophisticated and financially damaging scams. CEO fraud, also known as Business Email Compromise (BEC), targets businesses of all sizes, siphoning off millions of dollars each year from unsuspecting companies. Understanding CEO fraud, its implications, and implementing robust defenses against it is not just recommended; it&#8217;s essential for the security of your business.</p>



<h2 class="wp-block-heading">What is CEO Fraud?</h2>



<p>CEO fraud involves cybercriminals impersonating senior executives, often the CEO, to deceive employees, customers, or vendors into transferring money or sensitive information to fraudulent accounts. These scammers employ sophisticated social engineering tactics, combined with detailed research on their targets, to create emails that appear legitimate, making the scam difficult to detect.</p>



<h2 class="wp-block-heading">The Mechanics of an Attack</h2>



<p>The process begins with the attacker gaining access to a senior executive&#8217;s email account through phishing or other means. They may also create a lookalike domain that closely resembles the target company&#8217;s, using it to send deceptive emails. For example, if your business domain is wayneaccounting.tld, a scammer will purchase wayneaccounling.tld or wayneaccountling.tld and use the new domain to send out emails. The fraudster, posing as the CEO or another top executive, then instructs an employee to perform an urgent transfer of funds or to send confidential information, often with the pretext of closing a confidential deal or resolving a purported emergency.</p>



<h2 class="wp-block-heading">The Financial Toll</h2>



<p>The financial impact of CEO fraud is staggering. According to the <a href="https://fbi.gov">Federal Bureau of Investigation</a> (FBI), businesses worldwide have lost billions of dollars to BEC scams over the past few years. In just one year, reported losses exceeded $1.8 billion, a testament to the effectiveness of these scams and the importance of vigilance.</p>



<h2 class="wp-block-heading">Protecting Your Business</h2>



<h3 class="wp-block-heading">Third-Party Mail Filtering Tools</h3>



<p>One of the first lines of defense against CEO fraud is implementing <a href="https://atyxit.com/?p=207809">third-party mail filtering tools.</a> These tools scrutinize incoming emails for signs of phishing, such as suspicious attachments or links, and inconsistencies in email addresses that could indicate a spoofed domain. By filtering out potentially harmful emails, these tools significantly reduce the risk of an employee accidentally engaging with a fraudulent request.</p>



<h3 class="wp-block-heading">Employee Training</h3>



<p>Equally important is the ongoing education and training of employees. They should be made aware of the tactics used by fraudsters and taught to recognize the signs of a phishing email. Regular training sessions can help instill a culture of security awareness, ensuring employees think twice before responding to email requests for fund transfers or sensitive information, especially when such requests deviate from standard procedures.</p>



<h3 class="wp-block-heading">Collaborating with a Local IT Provider</h3>



<p>Partnering with a local IT provider like <a href="https://atyxit.com">ATYXIT</a> can offer personalized support and training tailored to your business&#8217;s specific needs is invaluable. As part of our <a href="https://atyxit.com/chicago-cyber-security/">cyber-security services</a> we conduct regular security assessments, implement effective cybersecurity measures, and provide cyber security training to your employees. This hands-on approach ensures that your team is not only aware of the risks but also equipped with the knowledge to combat threats effectively.</p>



<h2 class="wp-block-heading">Key Takeaways for Business Leaders</h2>



<ul class="wp-block-list">
<li><strong>Be Proactive, Not Reactive</strong>: Implementing preventative measures before an attack occurs is crucial. This means investing in the right technology and training to protect your business.</li>



<li><strong>Foster a Culture of Security</strong>: Encourage employees to question unusual requests, even if they appear to come from senior executives. A healthy level of skepticism can prevent fraud.</li>



<li><strong>Regularly Update Security Measures</strong>: Cyber threats evolve rapidly, and so should your defense strategies. Regular updates and training sessions are essential.</li>



<li><strong>Collaborate with Experts</strong>: A security conscious provider like ATYXIT can offer invaluable insights and support tailored to your business&#8217;s unique vulnerabilities and needs.</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>CEO fraud represents a significant threat to businesses worldwide, but with the right strategies in place, it&#8217;s a threat that can be effectively mitigated. By understanding the mechanics of these scams, implementing advanced mail filtering solutions, providing comprehensive employee training, and partnering with a local IT provider, businesses can protect themselves against the financial and reputational damage caused by CEO fraud. In the digital age, where cyber threats are constantly evolving, staying informed, vigilant, and proactive is the key to safeguarding your business&#8217;s future.</p>



<p>ATYXIT is a security-focused Business IT Solutions Provider based out of Streamwood, Illinois. We excel in supporting and evolving company networks. Our technical support, technology consulting, project management, cyber security and IT strategy services make us the ideal IT resource for local small and medium sized businesses. </p>



<p><a href="https://atyxit.com/contact-us">Reach out today</a> if you need any assistance with your business technology.</p>
<p>The post <a href="https://atyxit.com/the-rising-threat-of-ceo-fraud/">The Rising Threat of CEO Fraud</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Recovery: Safeguarding Your Business</title>
		<link>https://atyxit.com/ransomware-recovery-safeguarding/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Fri, 01 Mar 2024 13:22:40 +0000</pubDate>
				<category><![CDATA[Business IT Tips]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207768</guid>

					<description><![CDATA[<p>Understanding the gravity of this threat and taking proactive measures for ransomware recovery is paramount in safeguarding your business against potential devastation.</p>
<p>The post <a href="https://atyxit.com/ransomware-recovery-safeguarding/">Ransomware Recovery: Safeguarding Your Business</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity threats are ever-evolving and ransomware stands out as one of the most pernicious and financially damaging threats. With its ability to encrypt sensitive data and the demand of hefty ransoms for decryption keys, ransomware has wreaked havoc on businesses worldwide. Understanding the gravity of this threat and taking proactive measures for ransomware recovery is paramount in safeguarding your business against potential devastation.</p>



<h2 class="wp-block-heading">What is Ransomware?</h2>



<p>Ransomware is a type of malicious software designed to deny access to a computer system or data until a ransom is paid. Typically, cyber-criminals infiltrate a network through phishing emails, compromised websites, or exploiting vulnerabilities in software. Once inside, ransomware encrypts files, rendering them inaccessible to the rightful owners. The attackers then demand payment, often in cryptocurrency, in exchange for decryption keys.</p>



<h2 class="wp-block-heading">Impact on Businesses</h2>



<p>The impact of ransomware on businesses cannot be overstated. According to recent studies, the number of businesses impacted by ransomware surged dramatically in 2022 and 2023. Reports indicated that tens of thousands of businesses fell victim to ransomware attacks during these years, causing significant financial losses, operational disruptions, and reputational damage.</p>



<h2 class="wp-block-heading">Financial Costs</h2>



<p>The financial costs associated with ransomware attacks are staggering. Not only are businesses forced to pay hefty ransom demands to regain access to their data, but they also incur additional expenses related to downtime, recovery efforts, legal fees, and damage to their brand reputation. On average, the cost of recovering from a ransomware attack can run into hundreds of thousands or even millions of dollars, depending on the scale and severity of the incident.</p>



<p>Moreover, the average ransom payment demanded by cyber-criminals has also been on the rise. In 2022 and 2023, ransomware gangs demanded increasingly exorbitant sums, further exacerbating the financial burden on affected businesses.</p>



<h2 class="wp-block-heading">Why Paying Ransom is Not the Solution</h2>



<p>While it may be tempting for businesses to consider paying the ransom to quickly regain access to their data, doing so only perpetuates the cycle of cyber crime. There is no guarantee that paying the ransom will actually result in the full restoration of data, and it emboldens attackers to target more organizations in the future. Additionally, complying with ransom demands may violate legal and regulatory requirements, further complicating the situation for businesses.</p>



<h2 class="wp-block-heading">The Importance of Preparation and Prevention</h2>



<p>Instead of succumbing to ransom demands, businesses should focus on preparing themselves to mitigate the impact of ransomware attacks. This entails implementing robust cybersecurity measures, including regular data backups, network segmentation, employee training on cybersecurity best practices, and deploying advanced threat detection and prevention solutions.</p>



<p>Partnering with a knowledgeable IT partner such as <a href="https://atyxit.com/chicago-cyber-security/">ATYXIT</a> that specializes in cybersecurity and ransomware recovery is crucial for businesses looking to fortify their defenses against cyber threats. A reputable IT partner can assess the organization&#8217;s vulnerabilities, develop a comprehensive cybersecurity strategy, and deploy backup solutions that are immune to ransomware attacks.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Ransomware poses a significant threat to businesses of all sizes, with the potential to cause irreparable harm to operations and finances. However, by understanding the nature of ransomware, its impact on businesses, and the importance of proactive measures for recovery and prevention, organizations can better safeguard themselves against this insidious threat. By investing in robust cybersecurity measures and partnering with experienced IT professionals, businesses can bolster their defenses and minimize the risk of falling victim to ransomware attacks.</p>



<p><strong>ATYXIT consists of a group of specialists specializing in supporting and evolving company networks in industries such as Legal, Construction, Logistics, Medical, and more. From technical support to high level consulting services, project management, cyber security, and IT strategy, we’re no match for any other IT providers.</strong></p>



<p><strong>While the majority of our services are provided to small and medium sized businesses in Illinois, we can assist anyone in the United States thanks to the very same technology we provide to our clients. See just some of the&nbsp;<a href="https://atyxit.com/areas-served">Areas We Service</a>.</strong></p>



<p><strong><a href="https://atyxit.com/contact-us/">Reach out today to secure your business</a> with no commitment required.</strong></p>



<p></p>
<p>The post <a href="https://atyxit.com/ransomware-recovery-safeguarding/">Ransomware Recovery: Safeguarding Your Business</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rise in USB drive malware attacks</title>
		<link>https://atyxit.com/rise-in-usb-drive-malware-attacks/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Thu, 13 Jul 2023 14:06:05 +0000</pubDate>
				<category><![CDATA[Business IT News]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[chicago business IT]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207659</guid>

					<description><![CDATA[<p>In the first half of 2023, there has been a notable resurgence of USB drive malware distribution, demonstrating that what's old is new again. Researchers have witnessed a threefold increase in this method, revealing the persistence and detection evasion techniques employed by cybercriminals.</p>
<p>The post <a href="https://atyxit.com/rise-in-usb-drive-malware-attacks/">Rise in USB drive malware attacks</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In the first half of 2023, there has been a notable resurgence of USB drive malware distribution, demonstrating that what&#8217;s old is new again. Researchers have witnessed a threefold increase in this method, revealing the persistence and detection evasion techniques employed by cybercriminals.</p>



<h2 class="wp-block-heading">Security Reports</h2>



<p><a href="https://www.mandiant.com/" target="_blank" rel="noreferrer noopener">Mandiant</a>, a leading cybersecurity company, has released a report outlining two prominent USB drive malware campaigns observed this year. The first campaign, named &#8216;Sogu,&#8217; has been attributed to a Chinese espionage threat group called &#8216;TEMP.HEX.&#8217; Sogu is currently the most aggressive USB-assisted cyber-espionage campaign, targeting industries worldwide with the primary objective of stealing valuable data. The victims of Sogu malware are located in a wide range of countries, including the United States, France, the UK, Italy, Poland, Austria, Australia, Switzerland, China, Japan, Ukraine, Singapore, Indonesia, and the Philippines. The sectors affected vary from pharmaceuticals and IT to energy, communications, health, and logistics.</p>



<p>Sogu malware achieves persistence through various means, including the creation of a registry Run key and the utilization of Windows Task Scheduler to ensure regular execution. It employs a payload called &#8216;Korplug,&#8217; which loads C shellcode into memory via DLL order hijacking, necessitating the victim&#8217;s execution of a legitimate file. Once established, Sogu conducts system reconnaissance by dropping a batch file onto &#8216;RECYCLE.BIN,&#8217; scanning for valuable data contained in MS Office documents, PDFs, and other text files. The discovered files are encrypted using base64 and copied to both the host&#8217;s C:\ drive and the working directory on the flash drive. The exfiltration of these document files to the command-and-control (C2) server occurs over TCP or UDP using HTTP or HTTPS requests.</p>



<p>Sogu&#8217;s capabilities extend beyond data theft, with support for command execution, file execution, remote desktop access, screenshot capturing, establishing reverse shells, and keylogging. Notably, any connected drives automatically receive a copy of Sogu&#8217;s initial compromise file to facilitate lateral movement within the network through USB drive malware.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="832" height="290" src="https://atyxit.com/wp-content/uploads/2023/07/sogu-usb-drive-malware-chain.png" alt="Sogu USB Drive Malware Attack Chain" class="wp-image-207660" srcset="https://atyxit.com/wp-content/uploads/2023/07/sogu-usb-drive-malware-chain.png 832w, https://atyxit.com/wp-content/uploads/2023/07/sogu-usb-drive-malware-chain-480x167.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 832px, 100vw" /><figcaption class="wp-element-caption">Sogu USB Drive Malware</figcaption></figure>



<h2 class="wp-block-heading">Snowydrive</h2>



<p>Another campaign highlighted by Mandiant is &#8216;Snowydrive,&#8217; attributed to UNC4698, which specifically targets oil and gas firms in Asia. Snowydrive infects computers through a backdoor mechanism that enables attackers to execute arbitrary payloads, modify the registry, and perform file and directory actions. Similar to Sogu, Snowydrive relies on deceiving victims into launching what appears to be a legitimate executable on a USB drive. This action triggers the extraction and execution of the malware components stored within a folder named &#8216;Kaspersky.&#8217; The backdoor, which is based on shellcode, loads into the process of a legitimate archive unzip software called &#8216;CUZ.exe.&#8217;</p>



<p>Snowydrive&#8217;s backdoor offers various commands for file operations, data exfiltration, reverse shell setup, command execution, and reconnaissance. To evade detection, the malware utilizes a malicious DLL side-loaded by a legitimate Notepad++ updater named &#8216;GUP.exe.&#8217; This technique allows Snowydrive to conceal file extensions and protect specific files labeled as &#8220;system&#8221; or &#8220;hidden.&#8221;</p>



<h2 class="wp-block-heading">USB Drive Malware Traction</h2>



<p>These USB-based attacks continue to gain traction in 2023 due to their ability to bypass security mechanisms, remain stealthy, gain initial access to corporate networks, and even infect air-gapped systems that are isolated from unsecured networks for enhanced security. Mandiant&#8217;s investigation reveals that print shops and hotels often serve as infection hotspots for USB malware. It is essential to recognize that given the random and opportunistic nature of these backdoors, any system equipped with a USB port becomes a potential target.</p>



<p>Moreover, it is worth noting that in November 2022, Mandiant had already highlighted a USB-based campaign originating from China, which utilized USB devices to infect entities in the Philippines with four distinct malware families. Additionally, in January 2023, the Unit 42 team from Palo Alto Networks uncovered a variant of PlugX malware capable of hiding within USB drives and infecting connected Windows hosts. These reports further emphasize the growing threat posed by USB-delivered malware and the need for robust cybersecurity measures to mitigate these risks.</p>



<p>ATYXIT provides every one of our partners with a <a href="https://atyxit.com/chicago-cyber-security/" target="_blank" rel="noreferrer noopener">Cyber Security stack</a> that outperforms all these viruses and malicious attacks functions and helps ensure the technology in your business continues to function, just like your business.</p>



<p><a href="https://atyxit.com/contact-us/" target="_blank" rel="noreferrer noopener">Contact us</a> to improve the way your business does technology. </p>



<p>We Make IT Easy. See the <a href="https://atyxit.com/areas-served/" target="_blank" rel="noreferrer noopener">areas we service</a>. </p>
<p>The post <a href="https://atyxit.com/rise-in-usb-drive-malware-attacks/">Rise in USB drive malware attacks</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Snake Keylogger Spreading through PDFs</title>
		<link>https://atyxit.com/snake-keylogger-spreading-pdfs/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Tue, 24 May 2022 01:11:58 +0000</pubDate>
				<category><![CDATA[Business IT News]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[business IT tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[managed IT Services]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207241</guid>

					<description><![CDATA[<p>Hackers leverage 22 year-old Office RCE bug in a malicious email campaign to spread Snake keylogger via Microsoft Word alongside PDFs. The majority of malicious e-mail campaigns use Word documents to hide and spread malware, however, a recently discovered campaign uses a malicious PDF file in combination with a 22-year-old Office bug to spread the [&#8230;]</p>
<p>The post <a href="https://atyxit.com/snake-keylogger-spreading-pdfs/">Snake Keylogger Spreading through PDFs</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers leverage 22 year-old Office RCE bug in a malicious email campaign to spread Snake keylogger via Microsoft Word alongside PDFs.</p>



<p>The majority of malicious e-mail campaigns use Word documents to hide and spread malware, however, a recently discovered campaign uses a malicious PDF file in combination with a 22-year-old Office bug to spread the Snake Keylogger malware. A trusted IT partner should utilize and provide your company with a <a href="https://atyxit.com/chicago-cyber-security/" target="_blank" rel="noreferrer noopener">next-generation anti-virus </a>to thwart such common attack methods. </p>



<p>The campaign—discovered by researchers at <a href="https://www.hp.com/us-en/security/endpoint-security-solutions.html" target="_blank" rel="noreferrer noopener">HP Wolf Security</a>—aims to trick victims with via a PDF file purporting to have information about a remittance payment. Instead, it deploys info-stealing malware via an embedded Word document file.</p>



<p>“While Office formats remain popular, this campaign shows how attackers are also using weaponized PDF documents to infect systems,” HP Wolf Security researcher Patrick Schlapfer wrote in the post, which opined in the headline that “PDF Malware Is Not Yet Dead.”</p>



<p>Most attackers to date have preferred to package malware in Microsoft Office file formats, particularly Word and Excel, for the past decade, Schlapfer said. In the first quarter of 2022 alone, nearly half (45 percent) of malware stopped by HP Wolf Security used Office formats.</p>



<p>“The reasons are clear: users are familiar with these file types, the applications used to open them are ubiquitous, and they are suited to social engineering lures,” he wrote.</p>



<p>The new campaign does use PDF in the file lure, however, it later employs Microsoft Word to deliver the ultimate payload—the Snake Keylogger, researchers found. Snake Keylogger is a malware developed using .NET that first appeared in late 2020 and is aimed at stealing sensitive information from a victim’s device, including stored credentials, computer keystrokes, screenshots of the victim’s screen, and clipboard data, <a href="https://www.fortinet.com/blog/threat-research/deep-dive-into-a-fresh-variant-of-snake-keylogger-malware" target="_blank" rel="noreferrer noopener">according to Fortinet.</a></p>



<h2 class="wp-block-heading"><strong>‘Unusual’ Campaign</strong></h2>



<p>The HPW Wolf Security team noted that the new PDF-based threat campaign involved not just a PDF but also “several tricks to evade detection, such as embedded malicious files, loaded remotely-hosted exploits and shellcode encryption,” Schlapfer wrote.</p>



<p>Attackers attempt to target victims with emails that include a PDF document named “REMMITANCE INVOICE.pdf” as an attachment. If someone opens the file, Adobe Reader prompts the user to open a .docx file.</p>



<p>“The attackers sneakily named the Word document “has been verified. However PDF, Jpeg, xlsx, .docx” to make it look as though the file name was part of the Adobe Reader prompt.&#8221;</p>



<p>The .docx file is stored as an EmbeddedFile object within the PDF, which opens the file in Microsoft Word if clicked on. If Protected View is disabled, Word downloads a Rich Text Format (.rtf) file from a web server, which is then run in the context of the open document.</p>



<p>Researchers unzipped the contents of the .rtf—which is an Office Open XML file—finding a URL hidden in the “<em>document.xml.rels” </em>file that is not a legitimate domain found in Office documents.</p>



<h2 class="wp-block-heading"><strong>17-Year-Old Bug Exploited</strong></h2>



<p>The aforementioned URL leads to a redirect and then downloads an RTF document called “<em>f_document_shp.doc.</em> This document contained two “not well-formed” OLE objects that revealed shellcode exploiting  <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2017-11882" target="_blank" rel="noreferrer noopener">CVE-2017-11882</a>, which researchers said is an “over four-years-old” remote code execution vulnerability (RCE).</p>



<p> The bug that attackers leverage in the campaign is actually one that Microsoft patched more than four years ago–<a href="https://threatpost.com/microsoft-patches-17-year-old-office-bug/128904/" target="_blank" rel="noreferrer noopener">in 2017</a>, to be exact—but actually had existed some 17 years before that, making it 22 years old now.</p>



<p>As the final act of the attack, researchers found shellcode stored in the “<em>OLENativeStream” </em>structure at the end of one of the OLE objects they examined. The code eventually decrypts a ciphertext that turns out to be more shellcode, which is then executed to lead to an executable called <em>fresh.exe</em> that loads the Snake Keylogger.</p>



<p>Cyber-attacks are on the rise, and we&#8217;re happy to help you attain the protection your business needs against attacks. Please <a href="https://atyxit.com/contact-us/" target="_blank" rel="noreferrer noopener">contact us</a> if you require IT assistance!</p>
<p>The post <a href="https://atyxit.com/snake-keylogger-spreading-pdfs/">Snake Keylogger Spreading through PDFs</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft issues emergency update for Windows AD Authentication Issues</title>
		<link>https://atyxit.com/microsoft-emergency-update-for-windows-ad/</link>
		
		<dc:creator><![CDATA[atyxadmin]]></dc:creator>
		<pubDate>Fri, 20 May 2022 00:19:22 +0000</pubDate>
				<category><![CDATA[Business IT News]]></category>
		<category><![CDATA[Security Advisories]]></category>
		<category><![CDATA[business it]]></category>
		<category><![CDATA[domain controller]]></category>
		<category><![CDATA[KB5015013]]></category>
		<category><![CDATA[May 2022]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[patch tuesday]]></category>
		<category><![CDATA[patching]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://atyxit.com/?p=207235</guid>

					<description><![CDATA[<p>Microsoft has announced the release of out-of-band updates to address issues with Active Directory authentication issues. These authentication issues occurred as a result of the May 2022 Patch Tuesday updates on domain controllers. Microsoft has worked on issuing an emergency update for Windows AD authentication issues since May 12th. This issue was originally brought to [&#8230;]</p>
<p>The post <a href="https://atyxit.com/microsoft-emergency-update-for-windows-ad/">Microsoft issues emergency update for Windows AD Authentication Issues</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has announced the release of out-of-band updates to address issues with Active Directory authentication issues. These authentication issues occurred as a result of the May 2022 Patch Tuesday updates on domain controllers. Microsoft has worked on issuing an emergency update for Windows AD authentication issues since May 12th.</p>



<p>This issue was originally brought to light after several Windows administrators <a href="https://www.reddit.com/r/sysadmin/comments/um9qur/patch_tuesday_megathread_20220510/i85p2ll/?context=3" target="_blank" rel="noreferrer noopener">started sharing reports on Reddit</a> of some policies failing after installing this month&#8217;s security updates.</p>



<p>Microsoft explained that &#8220;After installing updates released May 10, 2022 on your domain controllers, you might see authentication failures on the server or client for services such as Network Policy Server (NPS), Routing and Remote access Service (RRAS), Radius, Extensible Authentication Protocol (EAP), and Protected Extensible Authentication Protocol (PEAP).&#8221;</p>



<p>The OOB Windows Updates released today (05/19/2022) are available only via the <a href="https://www.catalog.update.microsoft.com/Home.aspx">Microsoft Update Catalog</a> and will not be offered or installed through Windows Update. In the event you are experiencing any issues after the May 2022 Patch Tuesday, it is important that you install the emergency update for Windows AD Authentication issues.</p>



<p>The following cumulative updates have been released for installation on Domain Controllers:</p>



<ul class="wp-block-list"><li>Windows Server 2022:&nbsp;<a href="https://support.microsoft.com/help/5015013" rel="noreferrer noopener" target="_blank">KB5015013</a>&nbsp;</li><li>Windows Server, version 20H2:&nbsp;<a href="https://support.microsoft.com/help/5015020" rel="noreferrer noopener" target="_blank">KB5015020</a>&nbsp;</li><li>Windows Server 2019:&nbsp;<a href="https://support.microsoft.com/help/5015018" rel="noreferrer noopener" target="_blank">KB5015018</a>&nbsp;</li><li>Windows Server 2016:&nbsp;<a href="https://support.microsoft.com/help/5015019" rel="noreferrer noopener" target="_blank">KB5015019</a>&nbsp;</li></ul>



<p>Microsoft also released standalone updates:&nbsp;</p>



<ul class="wp-block-list"><li>Windows Server 2012 R2:&nbsp;<a href="https://support.microsoft.com/help/5014986" rel="noreferrer noopener" target="_blank">KB5014986</a>&nbsp;</li><li>Windows Server 2012:&nbsp;<a href="https://support.microsoft.com/help/5014991" rel="noreferrer noopener" target="_blank">KB5014991</a>&nbsp;</li><li>Windows Server 2008 R2 SP1:&nbsp;<a href="https://support.microsoft.com/help/5014987" rel="noreferrer noopener" target="_blank">KB5014987</a>&nbsp;</li><li>Windows Server 2008 SP2:&nbsp;<a href="https://support.microsoft.com/help/5014990" rel="noreferrer noopener" target="_blank">KB5014990</a>&nbsp;</li></ul>



<p>These updates can be manually imported into Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager.</p>



<p>If you require assistance with preventing the installation of problematic updates, please don&#8217;t hesitate to <a href="https://atyxit.com/contact-us/" target="_blank" rel="noreferrer noopener">reach out to us</a> and we&#8217;ll be happy to help you. As part of our <a href="https://atyxit.com/chicago-managed-it-services/" target="_blank" rel="noreferrer noopener">Managed IT Services</a>, we manage and review all updates and patches before they are installed on your devices. </p>



<p></p>
<p>The post <a href="https://atyxit.com/microsoft-emergency-update-for-windows-ad/">Microsoft issues emergency update for Windows AD Authentication Issues</a> appeared first on <a href="https://atyxit.com">ATYXIT - Illinois IT Services and IT Support</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
