VPNFilter Malware attacks Linksys, Netgear, TP-Link, Asus, D-Link and more

Linksys, Netgear, TP-Link, Asus, D-Link, Ubiquiti are vendors whose routers have been found targeted by malware called VPNFilter. This is a story that initially broke in May 2018, but more routers have been found to be affected since.

Researchers at Cisco Talos report that VPNFilter allows attackers to listen on traffic and steal website credentials; as well as remotely brick the user's router. Initially, at least 500 thousand routers were estimated to be infected; but the list of devices known to be targeted has since increased and is currently shown on the screen.

If your router is affected, Anti-Virus4U,com recommends you to reboot it, and work with your router manufacturer to check if the device is up to date. If your router is issued by your Internet Service Provider, we recommend you to contact support to check if your device is affected.


Bitdefender 2019 Beta Release Date: June 14

Bitdefender 2019 Beta release date is Thursday 14th June.

Bitdefender, the Romanian cyber security vendor is planning to release the official beta version of Bitdefender 2019 (Bitdefender Total Security 2019 Multi-Device) by middle of this month.

Bitdefender accepting only 150 beta testers, to subscribe to the beta program visit: https://www.bitdefender.com/site/view/beta2019.html 

Joining the Bitdefender 2019 beta test gives you the chance to test the up to date version, give feedbacks and help improve the next edition of Bitdefender’s security solutions.

NOTE: You shouldn't use the Bitdefender 2019 Beta version as your main security protection. 
Exclusive Offer: Save up to 75% off The New Bitdefender products line


7-Zip 18.05 Vulnerability

A recent report from CIS, Center for Internet Security, has revealed that all versions of 7zip prior to 18.05 allow for arbitrary code execution, which means that depending on the privileges given to the user running the executable, it was possible to “install software; view, change or delete data; or create new accounts with full user rights”. User accounts with low privileges would be less affected than those with administrative rights.

The vulnerability has already been fixed and an update is available on the official website of the software. Antivirus4u would also like to inform you that 7zip is an open source project with forks existing for operating systems other than Windows; for example, Keka is a Mac OS archiver that is based on 7zip. It is yet unclear if 7zip forks have the same vulnerability, so we recommend you to update any archiving software you have on your computer. And subscribe to our YouTube channel for more news about software vulnerabilities and insights about computer security.

Twitter Password Change Required

Twitter’s Support is advising users to change their passwords after it was revealed that a bug caused “unmasked passwords” to be stored in internal logs.

It was specified in a series of tweets that after an internal investigation, Twitter found no reason to believe any sensitive information ever left their servers or was misused internally; still, the social network advised all users to change their passwords.

Anti-Virus4U.com would like to remind you that similar password-related security oversights tend to happen to a lot of tech companies, but are rarely shared publicly – thus, it is recommended to never reuse passwords, as that can lead to a domino-like effect if one of your accounts gets exposed. Antivirus4u also recommends investing in a password manager and subscribing to our YouTube channel to get latest internet safety news and announcements.


Fake adblocker apps and plugins - warning!

With AdBlocking becoming more accessible with each passing day, fake adblocking apps and plugins are an increasing risk. After a report from AdGuard Research, Google deleted 5 malicious extensions from it’s Chrome Web Store. AdGuard reports that as many as 20 million users have been affected.

The extensions communicated with their head servers and had access to the websites users visited; they could also execute any code sent by the head server in a privileged context, which meant the user’s browser behavior could be controlled by the extension owners in any way. Getting users to install the plugins was easy, it seems the only method the developers used, was optimizing the keywords to get to the top of the search results. The five extensions reported are now listed on the screen.

Anti-Virus4U.com advises you to never install unknown browser extensions; if you are unsure about the legitimacy of an addon, simply googling whether or not it’s safe to use is often enough. You can also subscribe to our YouTube channel to get latest computer security news and announcements.



New Android Security Patches Vulnerability

Today I’m here to bring you an important update regarding your Android device security.

A report from Security Research Labs showed, that some smartphone manufacturer’s haven’t kept their phone’s operating systems up to date with Google’s latest security patches.

The extent of the issue depends on the manufacturer, some skipped 1 update, some skipped up to a dozen. What’s problematic, is that customers were not made aware of the issues; usually the release date of the security patch is displayed in the Settings app, but some manufacturers went as far as fabricating that release date, thus, effectively deceiving customers about the security state of their device. Keep in mind, that applying these security patches is something only the manufacturer can do.

So, what can you personally do to protect your Android smart device? 
First of all, only install software from trusted sources, like “Google Play”, the “Galaxy Apps” store or the “Amazon Appstore”. Most vulnerabilities get exploited by rogue apps, so limiting your exposure to those uncertified apps will mostly keep you safe.

Also, consider using your PC or Mac antivirus license for your Android phone, most security solutions offer their software for both computers and mobile devices. If you don’t have an Android antivirus, you can visit Anti-Virus4U.com, we offer a number of Android security solutions, like Bitdefender Mobile Security, or Kaspersky Mobile Antivirus.


Mobile phishing links attacks has grown

As per the report published by Lookout, the universal leader in mobile security, there has been an ever-increasing growing risk of phishing on mobile devices. Since 2011, Lookout has been observing the increasing rate as 85% per year at which users are clicking on phishing links on their mobile phones.

Another serious concern is that about 56% of users who got phishing links clicked on the URL unintentionally. Evidently, this lapse on the part of users has sidestepped the accessible protection offered by mobiles. Typically, a user clicked on a mobile phishing link as a minimum six times per year.

 The global security company in the report examined the current state of mobile phishing. They further gave details that cyber criminals are successfully avoiding the phishing protections, and subsequently, targeting the mobile phones to carry out their illegal activities. As a result, these hackers manage to steal confidential data and personal details at an ever-increasing rate.

As reported, more than 66% of emails that were accessed on mobile device constituted the main point of attack by the hackers. These suspicious and vulnerable emails on a mobile device can easily develop into a new possibility for attack. There are many business organizations that protect their systems for email-based phishing attacks. These establishments make use of customary firewalls and protected email gateways. Besides, nowadays, people are getting more careful so as to recognize and manage phishing attacks. On the other hand, the mobile phones are lacking to recognize and block phishing attacks. Both the users and currently available security technologies are finding it difficult to deal with this situation.

The universal security company also asserts that on hand phishing protections are not sufficient for mobiles. This is due to the fact that mobile phones have small display screens, and so, it becomes somewhat difficult to make out whether it’s a genuine login page or a fake one. As observed, the only possible attack point on mobile phones is an email, in which the malicious links gain entry and when accessed, they lead to compromising the entire secret data.

Another form that offers an opportunity to the hackers to make attacks is SMS and MMS. Also, popular social media apps and messaging platforms such as Facebook, WhatsApp, and Instagram are frequently used by attackers. Unluckily, more than 25% of employees by chance clicked on a link in the mobile’s SMS message and got defrauded.

Even one hacker utilized a non-email way of phishing. He used ViperRAT that permitted him to gain an illegal access to the mobile’s data, including SMS messages. He got himself into conversations with persons after creating fake woman profile on social media platforms. Just the once, he established their faith, the imposter asked the persons to download an app, so as to make communication easier and simplified.

In another instance, one cyber criminal targeted Android and iOS users via Facebook Messenger. He told that a YouTube video features them. When the victims clicked on the link offered, the user was asked to login fraudulent Facebook login page. Actually, this illegal exercise was meant to steal their secret information.

Lookout also revealed that users are three times more prone to click on a doubtful link on a mobile phone in comparison to a computer. It is only due to the fact the mobile’s screen is small, and the user can’t make out the entire link clicked by them. Moreover, there isn’t at all times a firewall to maintain the device protected, as in the case of a computer system.

The phishing attacks on mobile devices are increasing at a higher rate. Some of the most refined attacks appear from mAPTs (mobile advanced persistent threats). The most recent mAPT attacks to mobile have been reported in Pegasus and Dark Caracal.

There are some applications that have links or URLs in the codebase to share information in real-time. Thus, hackers can misuse this links for phishing purposes. In this respect, the corporations should pay more attention to “benign apps” that pose threat as malicious links.

Lookout gave details that the apps that are frequently used for advertising to make revenue money integrate ad SDKs into their code. These SDKs have URLs or links to display ads to the users. If a benign app utilizes an ad SDK run by a cyber criminal; the SDK is made to access malicious URLs or links with the aim of displaying ads, and therefore, the user gets compelled into entering susceptible data.


New Anti-Ransomware for Office 365

New Anti-Ransomware added for Office 365
For the past so many years, ransomware has been targeting big businesses, financial institutions, and individuals worldwide. From small to mid-size businesses, Microsoft Office 365 continues to be the fastest-growing office suite. It comes to no surprise that it has turned out to be a primary target for ransomware, and related scams. Keeping in view the security aspect, Microsoft has formally announced the beginning of latest anti-ransomware features for Office 365.

Features of new ransomware protection:
  • Option of ‘file restore’ from ransomware and malicious attacks. 
  • Facilitates in maintaining you information secure and confidential. 
  • Advanced protection features from viruses and trojans. 
  • Restore back up files from ransomware attacks. 
The newly added ransomware feature for Office 365 is called ‘File Restore’. Being a OneDrive feature, it offers the provision that helps allow users to return back and restore 30 days old files. Furthermore, this feature can be best utilized for unintentional mass deletes, corrupted files, or any other disastrous incident. Marketing it as anti-ransomware protection system tool, Microsoft is emphasizing more on the saving of files inside a OneDrive folder.

There might be some users who were targeted by ransomware and they had destroyed their files. However, once they start using new Microsoft Office 365 File Restore option, they can restore their deleted files efficiently. Microsoft has launched the potent Files Restore feature from OneDrive for Business to your individual OneDrive account. With his feature, all of your confidential files get protected in OneDrive. Moreover, you will be able to restore your complete OneDrive to an earlier point.

Microsoft Office 365 can now spot ransomware attacks and assist in restoring your OneDrive to a point earlier than files were disarranged. As a result, you can keep your files protected, and you don’t have to surrender to hackers’ demands. If a cyber attack is detected, you will be put on maximum alert through an email, desktop or mobile notification. Also, you will be given information about the complete recovery process.

Both the Office 365 Home and Office 365 Personal subscription offer highest-performance apps like Word, Excel, and PowerPoint. In addition, they feature powerful cloud services like OneDrive folder and File Restore option. With the aid of Office 365, you can create, share, and communicate wherever you like, and at whatever device it may be.

As reported in a number of incidents, the cybercriminals are using ransomware to carry out their illegal activities related to system-lockup and stopping access to files in an attempt to ask for ransom from their victims. Microsoft launched new ransomware protection features with the purpose of helping customers, so that they can recover their files, in the event they are affected by a ransomware attack.

As all these threats progress, Microsoft is constantly improving malware detection capabilities, so as to keep you and your system safe from the most highly-developed ransomware.