Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

ShadowBrokers: The Group Behind WannaCry

ShadowBrokers: The Group Behind WannaCry

The WannaCry ransomware attack was created by hacking amatures who copied from a famous hacker group known as the shadow brokers. While WannaCry is no longer a threat with the latest security update, a recent announcment shows that the hacker group is going to continue to release dangerous security exploits for anyone to use, at the right price.

Who are the ShadowBrokers?

There are a few theories about who makes up the membership of the ShadowBrokers group. These theories range from official National Security Agency employees to Russian spies. However, all these theories are based on unreliable information, so not much is actually known about the group. The only thing known for certain is that the ShadowBrokers use social media to sell cybersecurity secrets to amatures.

What do they sell?

The ShadowBrokers’ first started to auction off security secrets in August of 2016. They promised the highest bidder would receive cycbersecurity vulnerabilities that work just as well as government cyber weapons. Over the next year, the ShadowBrokers used a variety of different means to sell their secrets: auctions, crowdfunding, and direct sales. In April of 2017, their fifth release of information went public, which included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day.

The Latest Release

The ShadowBrokers have recently announced a subscription service that would include access to bi-monthly security exploit releases in early September 2017. The first package they sold included an NSA exploit titled UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any Microsoft OS between Windows XP and Windows 8.The exploit can also discreetly record audio from your microphone, video from your webcam and anything that is typed on the keyboard. It can also remotely remove itself from the target computer, leaving no signs of a breach.

How to protect yourself from ShadowBrokers releases

Luckily, all the security exploits that the ShadowBrokers have released targeted older, outdated versions of software.The best way to protect your computers is make sure your operating system is properly upgraded and patched. Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT knowledge, making it difficult for small- to medium-sized businesses who usually don’t have the resources to handle around-the-clock maintenance. This is where Info Advantage can help.

If you are worried about the ShadowBrokers releases, or have any other cyber security concerns, contact Info Advantage today at (585) 254-8710 today to learn more about how we can help keep your network safe.

4 Rules Every Remote-Worker Should Follow
VoIP: Cloud vs On-Site Hosting
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 27 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events technology solutions Hackers malware backup Software Business Management Ransomware cyber attacks Business practice Productivity Disaster Recovery Microsoft Innovation Hardware cloud Network Security Business Continuity Mobility Computer Avoiding Downtime Internet business Efficiency Quick Tips Mobile Devices hardware solutions Office tips Business Computing Windows 10 Health Law Enforcement Passwords Education cyber criminals Wi-Fi voip email Social Operating System Flexibility Laptop data breach Communication Antivirus Miscellaneous Humor Personal Information Risk Management servers Mobile Computing Money IT Support Information Technology Saving Money Office 365 Application Automation data internet user Smartphone IT Services Facebook History Small Business Upgrade cloud capabilities phone systems Identity Theft IT Workplace Tips Encryption Data recovery spam Update Google Net worth emails hardware refreshes HaaS How To Reputation ecommerce Microsoft Office Marketing intel time Managing Stress Search Windows threats Alert Cybercrime Apps virtualized servers Wireless Text Messaging Video Games Recovery Battery Employer-Employee Relationship holiday business continuity plan Remote Computing ATMs Point of Sale downtime Artificial Intelligence Password content Managed IT Services Virtualization Automobile Server Gadgets Software-based phone systems Legal BDR byod Router iPhone cars Virtual Reality Internet Protocol Scalability Government Worker Commute VoIP right Instant Messaging Touchpad Work/Life Balance PDF Google Drive VPN Hosted Solutions computer network End of Support Telephone Systems Black Market Internet Exlporer Robot User Tips Telephony Advertising Entertainment Hosted Solution Relocation USB Smartphones Users Private Cloud Social Media

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name