Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

ShadowBrokers: The Group Behind WannaCry

ShadowBrokers: The Group Behind WannaCry

The WannaCry ransomware attack was created by hacking amatures who copied from a famous hacker group known as the shadow brokers. While WannaCry is no longer a threat with the latest security update, a recent announcment shows that the hacker group is going to continue to release dangerous security exploits for anyone to use, at the right price.

Who are the ShadowBrokers?

There are a few theories about who makes up the membership of the ShadowBrokers group. These theories range from official National Security Agency employees to Russian spies. However, all these theories are based on unreliable information, so not much is actually known about the group. The only thing known for certain is that the ShadowBrokers use social media to sell cybersecurity secrets to amatures.

What do they sell?

The ShadowBrokers’ first started to auction off security secrets in August of 2016. They promised the highest bidder would receive cycbersecurity vulnerabilities that work just as well as government cyber weapons. Over the next year, the ShadowBrokers used a variety of different means to sell their secrets: auctions, crowdfunding, and direct sales. In April of 2017, their fifth release of information went public, which included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day.

The Latest Release

The ShadowBrokers have recently announced a subscription service that would include access to bi-monthly security exploit releases in early September 2017. The first package they sold included an NSA exploit titled UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any Microsoft OS between Windows XP and Windows 8.The exploit can also discreetly record audio from your microphone, video from your webcam and anything that is typed on the keyboard. It can also remotely remove itself from the target computer, leaving no signs of a breach.

How to protect yourself from ShadowBrokers releases

Luckily, all the security exploits that the ShadowBrokers have released targeted older, outdated versions of software.The best way to protect your computers is make sure your operating system is properly upgraded and patched. Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT knowledge, making it difficult for small- to medium-sized businesses who usually don’t have the resources to handle around-the-clock maintenance. This is where Info Advantage can help.

If you are worried about the ShadowBrokers releases, or have any other cyber security concerns, contact Info Advantage today at (585) 254-8710 today to learn more about how we can help keep your network safe.

4 Rules Every Remote-Worker Should Follow
VoIP: Cloud vs On-Site Hosting
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Privacy Best Practices Current Events technology solutions Hackers malware Productivity Software Business Management backup Ransomware cloud cyber attacks Business practice Microsoft Innovation Hardware Network Security Mobility Computer Disaster Recovery Avoiding Downtime Internet business Efficiency Quick Tips Mobile Devices hardware solutions Office tips Business Computing Windows 10 Business Continuity Health Law Enforcement Education cyber criminals Wi-Fi voip email Social Operating System Flexibility Laptop data breach Communication Antivirus Passwords Miscellaneous Humor Personal Information Risk Management servers Mobile Computing Money IT Support Information Technology Office 365 Saving Money data Application Automation internet user IT Services Smartphone Facebook History Small Business Upgrade cloud capabilities phone systems IT Identity Theft Workplace Tips Encryption Update spam Google Net worth hardware refreshes Reputation How To emails HaaS ecommerce Microsoft Office time Marketing intel threats Search Managing Stress Windows Hosted Solutions Alert Cybercrime Apps Wireless virtualized servers Video Games Text Messaging Recovery holiday Battery Employer-Employee Relationship Remote Computing business continuity plan ATMs Point of Sale Password downtime Artificial Intelligence Managed IT Services content Virtualization Automobile Server Legal Gadgets Software-based phone systems BDR byod Router cars iPhone Virtual Reality Internet Protocol Government Scalability Data recovery Worker Commute VoIP right Instant Messaging Touchpad PDF Work/Life Balance Google Drive VPN computer network End of Support Telephone Systems Black Market User Tips Internet Exlporer Robot Telephony Entertainment Advertising Hosted Solution Relocation USB Smartphones Private Cloud Users Social Media

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name