Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

ShadowBrokers: The Group Behind WannaCry

ShadowBrokers: The Group Behind WannaCry

The WannaCry ransomware attack was created by hacking amatures who copied from a famous hacker group known as the shadow brokers. While WannaCry is no longer a threat with the latest security update, a recent announcment shows that the hacker group is going to continue to release dangerous security exploits for anyone to use, at the right price.

Who are the ShadowBrokers?

There are a few theories about who makes up the membership of the ShadowBrokers group. These theories range from official National Security Agency employees to Russian spies. However, all these theories are based on unreliable information, so not much is actually known about the group. The only thing known for certain is that the ShadowBrokers use social media to sell cybersecurity secrets to amatures.

What do they sell?

The ShadowBrokers’ first started to auction off security secrets in August of 2016. They promised the highest bidder would receive cycbersecurity vulnerabilities that work just as well as government cyber weapons. Over the next year, the ShadowBrokers used a variety of different means to sell their secrets: auctions, crowdfunding, and direct sales. In April of 2017, their fifth release of information went public, which included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day.

The Latest Release

The ShadowBrokers have recently announced a subscription service that would include access to bi-monthly security exploit releases in early September 2017. The first package they sold included an NSA exploit titled UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any Microsoft OS between Windows XP and Windows 8.The exploit can also discreetly record audio from your microphone, video from your webcam and anything that is typed on the keyboard. It can also remotely remove itself from the target computer, leaving no signs of a breach.

How to protect yourself from ShadowBrokers releases

Luckily, all the security exploits that the ShadowBrokers have released targeted older, outdated versions of software.The best way to protect your computers is make sure your operating system is properly upgraded and patched. Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT knowledge, making it difficult for small- to medium-sized businesses who usually don’t have the resources to handle around-the-clock maintenance. This is where Info Advantage can help.

If you are worried about the ShadowBrokers releases, or have any other cyber security concerns, contact Info Advantage today at (585) 254-8710 today to learn more about how we can help keep your network safe.

4 Rules Every Remote-Worker Should Follow
VoIP: Cloud vs On-Site Hosting


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Privacy Best Practices Current Events Hackers malware backup technology solutions Productivity Software cyber attacks Business Management Business practice Ransomware cloud Disaster Recovery Microsoft Innovation Business Continuity Mobility Computer Avoiding Downtime hardware solutions Internet business Quick Tips Hardware Office tips Business Computing Efficiency Network Security Windows 10 Mobile Devices Health voip Law Enforcement Flexibility data breach email Social Operating System Education cyber criminals Laptop Wi-Fi internet user Communication Passwords Miscellaneous Humor Personal Information cloud capabilities Mobile Computing Money phone systems Information Technology IT Saving Money Identity Theft IT Services Smartphone Facebook History Antivirus Small Business Upgrade Risk Management servers IT Support Office 365 data Application Video Games Recovery holiday Battery business continuity plan Remote Computing ATMs Reputation Point of Sale HaaS downtime Password content Virtualization Marketing Automobile Legal Search Windows Software-based phone systems Alert Hosted Solutions BDR byod cars Virtual Reality Apps Wireless Scalability Automation Internet Protocol Workplace Tips Encryption Text Messaging Data recovery Update spam Employer-Employee Relationship Net worth How To hardware refreshes Artificial Intelligence Managed IT Services ecommerce Microsoft Office Server time threats Gadgets Managing Stress Cybercrime Router iPhone virtualized servers Government Google Touchpad Telephone Systems Black Market PDF User Tips Telephony Google Drive Entertainment USB End of Support Worker Commute VoIP right Instant Messaging Work/Life Balance Internet Exlporer Robot Advertising Hosted Solution Relocation VPN Smartphones Private Cloud computer network Users Social Media

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name