Sponsorship – Might Titans

At SwiftLogic, we care about the wellbeing and mental health of our employees, customers and local community which is why we are proud to be a sponsor of the Mighty Titans vs. The Entire Country fundraising challenge in aid of Wiltshire Mind.

On Saturday 28th July 2018, sixteen Mighty Titans of New Era Fitness, based in Melksham, will be running the length of the country. Starting at Land’s End, they will run round the clock for seven days in order to reach the finish line at John O’Groats by Saturday 4 August. The team, including Tiggy Bartholomew, will cover roughly 1,000 miles between them.

The aim of the challenge is to raise vital funds for local mental health charity Wiltshire Mind, as well as awareness for the importance of good mental health. Wiltshire Mind is based at the heart of the Wiltshire community and provide essential services throughout our county. With support groups in Chippenham, Devizes, Malmesbury, Trowbridge, Salisbury and Melksham they play a key role in supporting the safety and wellbeing of our community. Their vision is of a society that promotes and protects good mental health for all and that treats people with experience of mental distress fairly, positively and with respect; helping them to find the support they need and deserve.

We are extremely pleased to be supporting this challenge and excellent cause; playing our part in changing the way we talk about mental health and improving the lives of those in our local community.

For more information and to following the Mighty Titan’s progress, visit www.facebook.com/themightylejog

SPAM – WannaCry – WARNING

SwiftLogic have been made aware of a lot of WannaCry Spam emails over the past few days, please delete any emails stating you have been infected or encrypted.

Or forward them to virus@swiftlogic.co.uk so we can put some permanent blocks on them.

Email Scam / Data Encryption

Please be careful when clicking on attachments in your emails, if you don’t recognise the sender, or your not sure about the attachment, then please don’t click on it. It may contain a virus and could infect all the files on your server.

If you are unsure, please feel free to forward a copy to virus@swiftlogic.co.uk and we can check it over for you.

SECURITY ADVISORY From SwiftLogic: WannaCry Malware

You may be aware that there is a nasty piece of Malware going around this week, I only advise you to be careful on what emails you open and only from people that you are expecting and trust.

 

If anything looks suspicious please don’t click on it, if unsure then please call or email us. Leave a voicemail if Im not available.

Also, if you do get a screen on your computer saying your files are encrypted. TURN OFF YOUR COMPUTER IMMEDIATELY by unplugging the power lead and call us asap.

 

I have forwarded an email from one of our security partners with information which describes the malware below.

 

Note – all servers are patched and updated, however many of your computers are set update automatically. If Microsoft updates are prompting to be installed. please accept and install asap.

Cloud Backup

Looking for a safe secure off-site backup solution? Look no further than SwiftLogics Cloud Backup offering. Our Cloud Backup is a powerful and unobtrusive backup service that ensures any organisation is able to safely backup its data to either a hybrid local/cloud scenario or to our secure UK hosted Cloud. Contact Us for more details.

‘Pacman’ scheme uses Dropbox link to gobble victims

All malware is bad, but ransomware is particularly insidious–ask any ransomware victim. That’s why a new attack scheme called “Pacman” has raised alarms, because it’s even nastier than usual. Think of the classic Pac-Man game’s voracious yellow ball, chomping up all of your files. It takes only one click to infect a vulnerable PC, and the attack gives victims only 24 hours to pay the ransom in Bitcoins or risk losing all of the compromised data.

The current attack is particularly effective because it’s so convincing. Pacman’s first victims have been Danish chiropractors, who received emails with a subject line of “Possible new patient.” Unlike the laughably amateurish writing of some phishing emails, this one was written in perfect Danish and included Dropbox links to MRI and CT scans of the problem for the doctor to review–except the links launched ransomware instead.

When a victim clicks the link, the pacman.exe file is extracted and begins to encrypt data on the infected system. The files are marked with a new file extension of “.ENCRYPTED,” and the Windows desktop is replaced with the ransom demand. Pacman even hedges itself by installing a keystroke logging component and a “kill” process that can shut down Windows operating system functions such as taskmgr, cmd, regedit, making it very difficult to analyze or remove the malware.

The attack is built in Microsoft’s .NET programming framework, so it requires that the target machine have the .NET framework installed as well. Most Windows machines have .NET framework by default.

Pacman’s just getting warmed up

Pacman’s initial victim pool is small, but we can assume it will spread. KnowBe4 CEO Stu Sjouwerman points out that all of the tens of millions of records that have been compromised in data breaches make it significantly easier for attackers to compose more effective spear phishing attacks.

Sjouwerman advises that businesses block access to Dropbox, because the malicious links and ransomware files use the Dropbox domain. Unless a business happens to subscribe to a Dropbox business plan, blocking Dropbox makes sense anyway. From a compliance and data protection perspective, users should not be storing or sharing company data on personal Dropbox accounts.

The most critical thing for individuals is awareness and common sense. Well-executed spear phishing attacks can be very convincing. Be skeptical of emails from unknown sources, or from known sources that don’t typically email you. Think twice (or three times) before you click a link.

If an email appears legitimate, the prudent course is to delete the email and open a separate browser to visit the website directly. You can also pick up the phone and call the alleged source of the email for clarification or more information, rather than risking a ransomware infection with just one click.