MSPs need to be on the frontline of any ransomware defense

Posted by Mike Vizard on Jun 29, 2017 6:48:43 AM

While there is still much unknown about the latest wave of Petya/GoldenEye ransomware attacks, it's all too clear that organizations that don’t keep pace with the latest patches are being targeted faster than ever. It used to take cybercriminals a fair amount of time to develop the malware required to take advantage of a specific exploit. Now thanks to access to advanced tools developed by intelligence agencies that make it possible for cybercriminals to weaponize malware faster, this latest series of ransomware is targeting an exploit that Microsoft made patches available for just over a month ago in the wake of the WannaCry ransomware attack. Given the rate at which most organizations roll out patch updates, it’s a wonder more systems haven't been affected.

Microsoft says it's continuing to investigate the extent of the most recent threat, so it’s unclear whether additional emergency patches will be forthcoming or not. Either way, many organizations have a pressing need to apply available patches immediately. Because the patch management processes in place within most organizations are inherently flawed, however, there will continue to be organizations that fall victim to these types of ransomware attacks.

Read More

Topics: Ransomware

Threat Watch: NotPetya ransomware

Posted by Anne Campbell on Jun 27, 2017 4:19:51 PM

Update: As researchers learn more about the malware that quickly spread around the world earlier this week, it has become clear the malware wasn't what it first appeared to be. According to Forbes, multiple security researchers have uncovered flaws in the code that indicate the ransomare now known as NotPetya was designed to cause destruction, not make money. Infected computers become unrecoverable due to the faulty encrpytion, and BleepingComputer reports that victims have stopped paying the ransom. Because Ukraine was a primary target in the attack, a popular theory now suggests that the attack could have been politically motivated



Have you and your customers started to rest easy now that it's been a month since the WannaCry ransomware attack hit more than 100 countries around the globe? Well, a new strain of Petya ransomware wants to change that.

And, let's hope you and your customers all learned your lesson and got around to patching the EternalBlue vulnerability because this new strain is picking up where WannaCry left off. 

Read More

Topics: Ransomware

Carrie Simpson: How to use WannaCry to sell your MSP Services

Posted by Carrie Simpson on May 24, 2017 10:20:04 AM

Aren’t you tired of seeing every second post on LinkedIn being about how none of so-and-so’s clients got hit with WannaCry ransomware and how so-and-so can help protect from it? Are you bored of reading about it by now? I am. You are. And so are your prospects. There comes a point when the market is saturated with messaging, and we’ve reached that point. So, here you go. Here’s one more WannaCry post, and then please go on about your business.

Here’s why you’re not going to build a whole sales campaign around WannaCry (or any other media-saturated event for that matter). First, you appear opportunistic, not helpful. Think, for example, about a company pitching prospects in a city that was just hit with a major natural disaster. Would you consider them clever sales executives or vultures? If you approach companies immediately following a major event, you can be seen as exploitative, not professional. 

Read More

Topics: Ransomware

WannaCry ransomware should eventually blow some good for MSPs

Posted by Mike Vizard on May 16, 2017 12:10:14 PM

While the fallout from the WannaCry ransomware attack will reach into the billions of dollars, the one positive outcome should be a wave of upgrades for millions of older Windows PCs that unfortunately are still widely deployed. The malware employed to perpetrate the WannaCry attack largely targeted older Windows XP and some Windows 8 systems. Despite previous pledges to the contrary, over the past weekend Microsoft made available a patch for Windows XP and Windows 8 systems designed to eliminate the vulnerability being exploited by WannaCry. But the existence of additional variants of WannyCry should serve as a warning that similar attacks against older versions of Windows are in the offing.

Read More

Topics: Ransomware

Which Data Loss Gremlin Is Targeting You
MSP Health Check
MSP Phishing Quiz

Our Most Recent Posts

Intronis Local Lunches
MSP Marketing Assessment