<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ransomware Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/ransomware/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 27 Jan 2023 12:25:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Ransomware Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/ransomware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Concerns and Fun with ChatGPT</title>
		<link>https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 25 Jan 2023 23:13:06 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5368</guid>

					<description><![CDATA[<p>If you’ve not tried Open AI ChatGPT yet, you must. It has changed the world forever and the sooner you try it, the better. You can go to the web address: chat.openai.com/chat. Read the privacy warnings and, if you agree, sign up. When you start having conversations, prepare to be amazed. Most people I encounter [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/">Cybersecurity Concerns and Fun with ChatGPT</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you’ve not tried Open AI ChatGPT yet, you must. It has changed the world forever and the sooner you try it, the better. You can go to the web address: <a href="http://chat.openai.com/chat" target="_blank" rel="noopener">chat.openai.com/chat</a>. Read the privacy warnings and, if you agree, sign up. When you start having conversations, prepare to be amazed.</p>
<p>Most people I encounter talk about their fun with ChatGPT, and I can relate. Type “Write a Valentine’s day note to my lover who likes (activities). I’m attracted to their (attractions) and want them to know (details).” Keep adding details. And, of course, you can say, “Make it rhyme” or “write it like Shakespeare.” You’ll have a smile on your face.</p>
<p>Be sure to select “New chat” whenever you change topics. After you get a surprisingly fun Valentine’s message, open a new chat to ask, “Remind me of the Excel formula to return the first twenty characters of a string.” ChatGPT remembers conversations in chat segments, so avoid mixing topics to get the best results.</p>
<p>AI has given a new meaning to the term Virtual Assistant. Sometimes I compose long email messages and want to shorten them. I first compose the message with no sensitive information, give it to ChatGPT, and say, “Write this shorter.” It is stunning how capable it is at combining sentences and summarizing ideas while mostly keeping the whole meaning. Sometimes it elaborates and incorporates new ideas into the message. I find that amusing and occasionally helpful. I must re-read the output carefully and often make changes since ChatGPT is not perfect at knowing precisely what I mean, but for long messages, it sometimes helps me make them concise, saving the recipient time.</p>
<p>Do not be duped – AI does not know everything and can accidentally produce inaccurate information that sounds very convincing.</p>
<p>When I hear people discussing the risks of ChatGPT, they usually focus on students using it to write their essay assignments for them. They have not considered more severe concerns. If you are interested, search the web for: chatbot ai can be used to create ransomware video.</p>
<p>Fortunately, ChatGPT is implementing safeguards to help prevent malicious use, and there are ways to trick it. Values and ethics vary from person to person, and some people, or governments, might feel justified in using AI to help create weapons, influence elections, or help them with strategies to harm.</p>
<p>Before his death, the famous physicist Stephen Hawking warned that AI could “end mankind.” Elon Musk has donated millions of dollars to OpenAI but intensely voiced concerns about the dangers of AI.</p>
<p>Some of our clients now block access to ChatGPT on company networks and devices. Some won’t.</p>
<p>Please forward this to your friends so they will consider the risks and enjoy AI-related fun. ChatGPT is impressive, and the business world will never be the same.</p>
<p>The post <a href="https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/">Cybersecurity Concerns and Fun with ChatGPT</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</title>
		<link>https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 10 Jan 2023 16:52:41 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5361</guid>

					<description><![CDATA[<p>Verizon&#8217;s 2022 Data Breach Investigation Report reveals some interesting information from extensive worldwide research. In North America, System Intrusion (Now up to 80%) attacks surpass Social Engineering (down to 20%). System Intrusion is when attackers gain access to networks, plant ransomware, establish remote access, and otherwise compromise data and processes in a network. 90% of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/">Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Verizon&#8217;s 2022 Data Breach Investigation Report reveals some interesting information from extensive worldwide research.</p>
<p>In North America, System Intrusion (Now up to 80%) attacks surpass Social Engineering (down to 20%). System Intrusion is when attackers gain access to networks, plant ransomware, establish remote access, and otherwise compromise data and processes in a network.</p>
<p>90% of system intrusion attacks in North America were performed by threat actors external to the company. But the 10% of internal attacks highlights the concern of insider threats. Insider threat is when someone working for an organization accidentally or intentionally gives attackers access.</p>
<p>In North America, the motivation for attacks are:<br />
For financial gain: 96%<br />
Espionage and spying: 3%<br />
Grudges and anger: 1%</p>
<p>Of attacks in North America, 14% were caused Primarily by Cloud Security Misconfigurations, highlighting the need to ensure IT professionals are familiar with the complex security settings related to cloud services. An excellent resource for Microsoft Cloud Security is <a href="https://learn.microsoft.com/en-us/microsoft-365/solutions/setup-secure-collaboration-with-teams?view=o365-worldwide#securing-teams-for-sensitive-and-highly-sensitive-data" target="_blank" rel="noopener">https://learn.microsoft.com/en-us/microsoft-365/solutions/setup-secure-collaboration-with-teams?view=o365-worldwide#securing-teams-for-sensitive-and-highly-sensitive-data</a></p>
<p>To see statistics in other parts of the world and overall, you can find the report at <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">https://www.verizon.com/business/resources/reports/dbir/</a></p>
<p>The post <a href="https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/">Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</title>
		<link>https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 22:57:37 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5319</guid>

					<description><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific experiences. 99% of the time, organizations are better off sticking with their existing provider, and here are some reasons.</p>
<p>An exception will be if you feel held hostage by them, or if there is some other outstanding reason they’ve failed you. Yes, we&#8217;ve seen horror stories. In those extreme cases, the executives had already decided to fire their outsourced firm.</p>
<p>When we perform cybersecurity consulting, unless the executives ask us to approach it differently, we give the outsourced firm the benefit of the doubt that their intentions are always to provide you with the best service possible. If we encounter a grave security mistake, that&#8217;s one purpose of the audit – for us to catch things like that so your IT providers can fix it. We almost always find at least one gaping hole, which is our specialty. After all, third-party IT companies are responsible for many aspects of your IT operations, while our focus is cybersecurity. Once outsourced IT firms realize we&#8217;re there to help and not replace them or their services, they relax, welcome input, and ask questions about the best way to protect you.</p>
<p>If you move to a new provider, there could be a steep learning curve before they can serve you at the same level. Keep in mind that your IT provider is already familiar with your systems and understands the unique challenges you face. Unless their turnover is high, the professionals that serve you know your team members and maintain a friendly, professional working relationship with them.</p>
<p>If you consider changing providers because some well-meaning person says you have the wrong brands of products, find out if their personal bias is evidence-based. If the specific solution your provider prefers meets all the functionality criteria, it is almost always best to allow your IT Professionals to select brands and vendors they like. They typically prefer particular brands and solutions for important reasons.</p>
<p>For example, their engineers might be most familiar with Cisco, Juniper, SonicWALL, WatchGuard, or one of the many other firewall brands. Most brands, if configured properly, will serve you well. As with automobile repairs, you want a technician familiar with your car&#8217;s brand. If you ask your outsourced IT company to support an unfamiliar product, you&#8217;re putting them in an uncomfortable position. They want to consistently produce excellent outcomes for you, and if you insist that they support a brand they are unfamiliar with, you could be setting them up for failure.</p>
<p>Your outsourced IT firm almost certainly has you set up with specific vendors for your anti-virus, anti-spam, backup solution, etc., because they have automated tools that allow them to monitor and manage your solutions. That efficiency of scale facilitates them taking optimum care of you. Deviating from their standard brands creates unnecessary expense and frustration. For this reason, if you do decide to change providers, prepare yourself for needing to replace some of your software and hardware to conform to the new IT provider&#8217;s preferred configuration.</p>
<p>If your provider is too slow to respond, perhaps they&#8217;re understaffed but have an expedited service option you could invest in to get priority access to their best engineers. Or maybe they have a different brand or product solution that permits them to use streamlined tools, but you&#8217;re still using products a previous IT firm installed.</p>
<p>Without knowing the brands you are using, I cannot say if you&#8217;ve got great ones. I can share that most brands have excellent products and solutions that work well when appropriately configured by knowledgeable professionals who&#8217;ve proven their proficiency by earning certifications on those brands.</p>
<p>Executives sometimes ask if they should seek a cheaper provider. We rarely see third-party IT companies overcharging for services. They are aware of the competitive nature of their business. Consider how much it would cost you if all your systems were down, and the investment you pay your IT support firm is probably worth it.</p>
<p>Yes, your IT provider might be priced higher, but consider their level of professionalism too. Are they quick to reply when you need them? Do they fix issues the first time?</p>
<p>It can be an excellent sign if you feel you don&#8217;t need your provider because you never have any problems. That can indicate that your IT firm is taking such good care of the inner workings of your systems that everything runs smoothly for you. If you did terminate your IT provider, things could start falling apart slowly, without being observable, until everything stacks up to the point when you suffer a disaster.</p>
<p>If you wonder if they are competent, consider asking them for a list of certifications they&#8217;ve earned from Microsoft, Cisco, or the brands and technologies they provide and support for you. If they&#8217;re not certified, encourage them to take the training and pass the tests. Certifications often involve significant expense and time, so don&#8217;t expect them to earn the credentials overnight. Passing the certificate will be a breeze if they&#8217;re already knowledgeable about the products they support. And during the training, they might find new ways to help your organization without you needing to buy more stuff. Everyone benefits.</p>
<p>Your firm may not have top-level cybersecurity certifications. Cybersecurity is a complicated and rapidly evolving field that requires intense specialization. We never have expectations that third-party computer services companies know everything there is to know about cybersecurity. We expect them to be open to cybersecurity recommendations. We&#8217;re thrilled to discuss and answer their questions as they tune the solutions from brands they sell and support.</p>
<p>As cybersecurity advisors, it is rewarding to see and facilitate, if necessary, our customers strengthening their relationship with their MSPs and other third-party IT firms. Sometimes it is a matter of us helping you identify the pros and cons of the add-on cybersecurity packages your provider offers. Or, if their package isn&#8217;t the perfect fit, sometimes you can negotiate the offerings to get the best solution.</p>
<p>Please forward this to your friends if they wonder if they should change to a new outsourced IT consulting firm. As long as they&#8217;re well-staffed, competent, and professional, there are many advantages to staying with the company with whom they have an established working relationship.</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Next Time You&#8217;re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone</title>
		<link>https://fosterinstitute.com/the-next-time-youre-bored-or-waiting-delete-some-unused-apps-from-your-android-or-iphone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 23:05:21 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5265</guid>

					<description><![CDATA[<p>You see the headlines: &#8220;App discovered to be spying on you,&#8221; or &#8220;App removed from the store because it was downloading private information.&#8221; Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and tablet are more secure the fewer apps you have. Most people only use 20% [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-next-time-youre-bored-or-waiting-delete-some-unused-apps-from-your-android-or-iphone/">The Next Time You&#8217;re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You see the headlines: &#8220;App discovered to be spying on you,&#8221; or &#8220;App removed from the store because it was downloading private information.&#8221;</p>
<p>Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and tablet are more secure the fewer apps you have. Most people only use 20% of their apps.</p>
<p>On an iPhone, press on the app&#8217;s icon and hold your finger down. Follow the prompts to remove and delete the app.</p>
<p>In Android, there are a few ways to delete apps as described in this article: <a href="https://www.lifewire.com/delete-apps-on-android-phone-5271421" target="_blank" rel="noopener">https://www.lifewire.com/delete-apps-on-android-phone-5271421</a></p>
<p>Please forward this to your friends, so they know to delete old applications too. If they’re waiting for something anyway, it will make the time pass quicker, and they&#8217;ll be more secure.</p>
<p>The post <a href="https://fosterinstitute.com/the-next-time-youre-bored-or-waiting-delete-some-unused-apps-from-your-android-or-iphone/">The Next Time You&#8217;re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tell People about Covering Cameras, and You Might Save a Life</title>
		<link>https://fosterinstitute.com/tell-people-about-covering-cameras-and-you-might-save-a-life/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 26 May 2022 21:33:27 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5249</guid>

					<description><![CDATA[<p>Have you ever noticed you are in a video conference call and did not realize your camera was capturing you? Or maybe you have two cameras, and your software unexpectedly selected the wrong one and broadcast an unflattering camera angle or showed something in the background you thought was out of frame? Embarrassing. Cover up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/tell-people-about-covering-cameras-and-you-might-save-a-life/">Tell People about Covering Cameras, and You Might Save a Life</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Have you ever noticed you are in a video conference call and did not realize your camera was capturing you? Or maybe you have two cameras, and your software unexpectedly selected the wrong one and broadcast an unflattering camera angle or showed something in the background you thought was out of frame? Embarrassing. Cover up cameras when you aren&#8217;t using them.</p>
<p>A young adult received an extortion email claiming to have taken humiliating photos through his laptop&#8217;s webcam. The message threatened to send the images to friends and relatives and post them on social media. The youngster felt so distressed that he took his life. All people, including young people, need to know the risk, and please spread the word.</p>
<p>The letters are almost always fake. Executives call us after receiving similar messages. You will know the extortionist is bluffing if you keep your camera covered.</p>
<p>Even a non-technical person could spy on you through your computer, laptop, tablet, or phone, by running typical remote access applications or launching web meeting programs in the background without your knowledge. A bad actor could use advanced techniques to spy on you by remotely activating cameras, and they might disable the camera indicator light.</p>
<p>The most significant danger of covering your camera on a laptop is that if your cover is thicker than a piece of paper, your screen might crack if you stack something on top or compress the closed laptop. The thinner the camera cover, the better.</p>
<p>If you want to use the feature that adjusts the screen brightness based on the ambient light around you, consider using a translucent cover but be sure it blurs the image enough.</p>
<p>You can purchase re-usable peel-and-stick covers for cameras. Remember that sliding covers are risky for laptops and tablets that close. You could trim a part of a sticky note to be your cover for laptops and desktops. Avoid anything that will leave a sticky residue if you peel the tape off later.</p>
<p>If it is impractical to cover your device&#8217;s camera, at least check the privacy settings on your phone to control what apps can access your camera. A cover is more secure.</p>
<p>Remember to cover webcams built into some monitors, video game consoles, VR headsets, televisions, and other devices when you&#8217;re not using them.</p>
<p>If you have been thinking about covering your cameras, but have not gotten around to it yet, today might be your day. Please spread the word that the extortion letters are almost always fake, and covering a camera is a way to remove all doubt that an unauthorized person took pictures or recorded videos of them. Ensure that youngsters know too; you could save a life.</p>
<p>The post <a href="https://fosterinstitute.com/tell-people-about-covering-cameras-and-you-might-save-a-life/">Tell People about Covering Cameras, and You Might Save a Life</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Place Malicious Ads at the Top of Search Engine Results</title>
		<link>https://fosterinstitute.com/beware-attackers-place-malicious-ads-at-the-top-of-search-engine-results/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 01 Apr 2022 14:52:43 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5221</guid>

					<description><![CDATA[<p>OpenOffice is a free program that allows you to create documents and spreadsheets. Right now, attackers are buying ads so that, if you search for OpenOffice and are a lucky searcher, an ad appears at the top of your search. Clicking on the ad could take you to a site to download a malicious program [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-place-malicious-ads-at-the-top-of-search-engine-results/">Beware: Attackers Place Malicious Ads at the Top of Search Engine Results</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>OpenOffice is a free program that allows you to create documents and spreadsheets. Right now, attackers are buying ads so that, if you search for OpenOffice and are a lucky searcher, an ad appears at the top of your search. Clicking on the ad could take you to a site to download a malicious program rather than OpenOffice.</p>
<p>To help protect yourself, when you search, click on the organic search results rather than the ads. That behavior can be safer if the advertisers are bad actors trying to lure you to a malicious site or download.</p>
<p>Malicious advertising is not limited to search engines. Advertisements on websites can be just as dangerous. These attacks are called malvertising and trick millions of users each year.</p>
<p>Please forward this to your friends so they know online advertisements, even search engine results, might take them to dangerous sites that attack their computers. The sites could offer downloads that, while the programs might seem legitimate, are tainted executable files infested with malware to attack their computer, encrypt files, steal their information including keystrokes and passwords, and provide remote access to unauthorized bad actors.</p>
<p>Note: We are not endorsing or advising you to use or not use OpenOffice. We use their name as an example because this incident is a current event. This does not indicate that OpenOffice is hacked; if anything, it suggests that the program is attractive enough that users eagerly seek it. Attackers use many famous brands and products. Being selected as a keyword can be flattering. Malvertising is unrelated to companies having security weaknesses.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-place-malicious-ads-at-the-top-of-search-engine-results/">Beware: Attackers Place Malicious Ads at the Top of Search Engine Results</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Watch for Threatening Email and Social Media Messages Saying You’re Hacked</title>
		<link>https://fosterinstitute.com/watch-for-threatening-email-messages-that-contain-your-actual-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 25 Mar 2022 09:58:00 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2657</guid>

					<description><![CDATA[<p>Someone contacted me to explain that attackers hacked a family member&#8217;s Instagram account and threatened to expose some embarrassing photographs unless they paid the bad actor more than a thousand dollars. I told them: What he is experiencing is a common ploy. The bad actors probably didn’t hack his account, and I’m sure he reset [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/watch-for-threatening-email-messages-that-contain-your-actual-passwords/">Watch for Threatening Email and Social Media Messages Saying You’re Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Someone contacted me to explain that attackers hacked a family member&#8217;s Instagram account and threatened to expose some embarrassing photographs unless they paid the bad actor more than a thousand dollars. I told them:</p>
<p><span id="more-2657"></span>What he is experiencing is a common ploy. The bad actors probably didn’t hack his account, and I’m sure he reset his password just in case. The chances are that they don’t have any pictures. They certainly don’t have photos if whatever they claim happened didn’t happen.</p>
<p>The bullies are adept at social engineering, and their goal is to be terrifying. They’re incentivized because they make more money.</p>
<p>They commonly send information to make their messages look legitimate. They find passwords on the dark web and send those, where someone works, where they went to school, date of birth, and the names and ages of family members. That information is often easy to find, and bad actors having those details doesn’t mean they hacked an account. Often the entire information gathering process is automated. <a href="https://fosterinstitute.com/why-phishing-messages-contain-such-accurate-information/" target="_blank" rel="noopener">https://fosterinstitute.com/why-phishing-messages-contain-such-accurate-information/</a></p>
<p>The best thing is to avoid communicating with the bad actors and act like you never receive the messages. The bad actors will pick on someone else to try to get money from them.</p>
<p>I wouldn’t be surprised if he starts getting email messages from them.</p>
<p>Do this now: Be sure none of your email programs displays graphics or images when you open a message. On your iPhone or iPad, go to Settings &gt; Mail and turn off “Load Remote Images.” If you don&#8217;t see that option, look under Settings &gt; Mail &gt; Privacy Protection &gt; and choose &#8220;Block all Remote Content.&#8221; In Outlook, select File &gt; Options &gt; Trust Center &gt; Automatic Downloads and choose: Don&#8217;t download pictures automatically. Note that the setting can move around, but a quick search engine search for &#8220;how to block email tracking&#8221; and the name of your device or application will produce fast results. Take similar steps for every device you use to check your email. This step will usually prevent the attacker from knowing you opened the email message, but you must change the setting before receiving the message.</p>
<p>Cover up the cameras on your computers, tablets, and phones if you do not use the camera often.</p>
<p>If you do receive one of these messages, print it out and save it in case you need it for evidence in the future. Do not forward the message unless you are confident that the transmitted message contains no graphics.</p>
<p>It is up to you to decide if you want to warn family, friends, and everyone else in your address book in case the attacker follows through with their threat. Reassure your contacts that the contents of the message are false.</p>
<p>Make a detailed log, and make copies of all email messages, phone calls, and text messages you receive from them. Submit a complaint at <a href="http://ic3.gov" target="_blank" rel="noopener">ic3.gov</a>. Contact the police if you fear that your life is in danger. If the email message came from Gmail, notify Google, and they can investigate.</p>
<p>Visit <a href="http://www.haveibeenpwned.com" target="_blank" rel="noopener">www.haveibeenpwned.com</a> to see if there is evidence that your password has shown up posted on the dark web.</p>
<p>Reset sensitive passwords and enable two-step verification on websites where you log in. Be sure you are current on all security patches on your devices.</p>
<p>Please forward this to everyone you know so that they will prepare for threatening social media and email messages.</p>
<p>The post <a href="https://fosterinstitute.com/watch-for-threatening-email-messages-that-contain-your-actual-passwords/">Watch for Threatening Email and Social Media Messages Saying You’re Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tech Support has been Helping my Relatives, and How to Protect Your Workers</title>
		<link>https://fosterinstitute.com/tech-support-has-been-helping-my-relatives-and-how-to-protect-your-workers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 23:38:58 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5201</guid>

					<description><![CDATA[<p>My wife came to tell me a story. She received a call from some of her relatives whose computer started making noises and behaving terribly. A window popped up over all the other flashing error windows saying that they&#8217;d been infected by a horrible virus and needed to call tech support immediately to solve the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/tech-support-has-been-helping-my-relatives-and-how-to-protect-your-workers/">Tech Support has been Helping my Relatives, and How to Protect Your Workers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>My wife came to tell me a story. She received a call from some of her relatives whose computer started making noises and behaving terribly. A window popped up over all the other flashing error windows saying that they&#8217;d been infected by a horrible virus and needed to call tech support immediately to solve the problem.</p>



<p>They called the emergency support line and followed the representative&#8217;s instructions to install a program that gave the technical expert access to the computer. When the tech support person asked them to log in to their bank account to confirm a $1 charge, my relatives knew the whole thing was a scam and hung up. They&#8217;ve decided to throw away the computer and get another because they don&#8217;t know what else the program did to their computer. It probably included a keylogger that would capture their username and password when they logged into the bank so the bad actors could log in too. It might have included ransomware and likely a backdoor so the attackers would have continued access to the computer.</p>



<p>Her relatives are knowledgeable people who know to be wary of computer scams. But the alert screen was so convincing that they felt compelled to call. The bad actor posing as a support agent was highly skilled at social engineering. These people are artists at tricking the savviest users.</p>



<p>This is a way to protect your users without preaching to them. Tell them this or another story of a tech support scam. Please forward this to your friends and encourage them to share a story as a simple way to remind their workers to be wary. You might have an even better story to share!</p>
<p>The post <a href="https://fosterinstitute.com/tech-support-has-been-helping-my-relatives-and-how-to-protect-your-workers/">Tech Support has been Helping my Relatives, and How to Protect Your Workers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 Things Every Organization Can Do Right Now to Protect Themselves from State-Sponsored Foreign Attacks!</title>
		<link>https://fosterinstitute.com/10-things-every-organization-can-do-right-now-to-protect-themselves-from-state-sponsored-foreign-attacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Feb 2022 01:50:20 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5141</guid>

					<description><![CDATA[<p>Help protect your organization from attacks related to possible cyber-warfare. Ask your IT pros, in-house or outsourced, to: If your network firewall supports blocking data traffic by country, restrict all connections from all non-essential countries. You might need to allow traffic from specific addresses if one of your providers has a data center in another [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/10-things-every-organization-can-do-right-now-to-protect-themselves-from-state-sponsored-foreign-attacks/">10 Things Every Organization Can Do Right Now to Protect Themselves from State-Sponsored Foreign Attacks!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Help protect your organization from attacks related to possible cyber-warfare. Ask your IT pros, in-house or outsourced, to:</p>



<ul class="wp-block-list"><li>If your network firewall supports blocking data traffic by country, restrict all connections from all non-essential countries. You might need to allow traffic from specific addresses if one of your providers has a data center in another country.</li><li>If you use Office 365, configure Conditional Access by Country to only accept users logging in from countries where your users will be when they access Office 365. You might need to upgrade your O365 license to enable conditional access by country.</li><li>Configure firewalls on your websites and web applications to only accept connections from countries where you do business. Before limiting countries, ask your web developers if they use tools hosted in other countries. You’ll need to allow connections from those specific companies; else, your web application might malfunction.</li><li>Block your users, in case they get fooled by a fraudulent email message, from accessing websites in countries and categories except those essential for business. When you configure web content filtering, you might be surprised to find out that some of the sites you use must connect to other countries to work correctly. Your team can allow those specific sites without enabling the entire country. Be careful not to overload your IT team with this recommendation.</li><li>If you haven&#8217;t already, be sure to implement multi-factor authentication for your VPN, Microsoft Office 365, your privileged user accounts, social media accounts including LinkedIn, and anywhere attackers could inflict damage if they gain access.</li><li>Shut down any unnecessarily exposed ports on your firewall, including remote management. If you must leave ports open, filter by the source address to prevent connections from anywhere except authorized static addresses.</li><li>Configure your spam filter to block email messages from all countries except for those from which you wish to receive messages.</li><li>Implement the email protection features SPF, DKIM, and DMARC to help block fraudulent emails and messages that someone tampered with. There are services to help IT departments accomplish this.</li><li>Discuss Distributed Denial of Service (DDOS) attacks with your Internet provider and web hosting companies and ways they can protect you in case an attacker floods your network, your phone systems, or your websites with so much traffic that it shuts down your systems.</li><li>Uninstall all the programs you do not use. If foreign attackers take over a software company, as they have recently, you won&#8217;t be affected if those programs are not installed.</li></ul>



<p>All of these are in addition to the other protections you should already have, including double-checking that all the critical security updates from Microsoft and your browsers are installed on all of your systems, using anti-virus and Endpoint Detection and Response tools, making sure no users are local administrators to make it difficult for attackers to install malware on their computers, using application control, and other recommendations you read in these blogs.</p>



<p>Alert your users to the heightened threat and tell them to be wary of fake news. Remind them never to enter their usernames and passwords when prompted, no matter how convincing a site appears. If they read something that seems scary and instructs them to do something urgently, they must pause before acting. They should ask the IT department if they have the slightest suspicion. If they spot something fraudulent, you might tell them to send an alert to your other users to know the message is fake. They should remove links before they forward the message.</p>



<p>If you have an on-prem Exchange server, attackers will target the server relentlessly. Immediately ensure the Exchange server is patched with all critical updates. Be sure your firewall is configured to block all traffic except specific IP addresses. Talk to your executives about fast-tracking your migration to hosted Exchange if migration is possible.</p>



<p>While the following won&#8217;t prevent an attack, you want to be prepared:</p>



<ul class="wp-block-list"><li>Confirm that the backups of your cloud data function correctly in case attackers delete your Office 365 or other cloud data and render the cloud provider&#8217;s backups useless.</li><li>After ransomware attacks, many organizations&#8217; executives are shocked at how long it takes to restore. Be sure your whole disaster recovery process is quick enough to meet your return to operations (RTO) requirements. You might prioritize which services need to be running soonest and make recovery point objectives (RPOs). Practice restoring and measure the time it takes to restore and recover.</li></ul>



<p>Make contingency plans for what you’ll do if the power goes out for an extended time. Consider how you’ll respond if you’re unable to use your online banking. What is your plan if one of your vendors or SaaS providers shuts down for an extended period? Make contingency plans in case your Internet Service Provider goes down. What will you do if fuel becomes unavailable as it was to some regions after the Colonial Pipeline attack? What if your shipping companies cannot deliver packages to you or your customers? Should you take out enough cash to make payroll for your next pay cycle? Planning for these and other risks will allow you to have systems in place in the unlikely event they occur.</p>



<p>You can find additional guidance at <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-011a" target="_blank" rel="noreferrer noopener">https://www.cisa.gov/uscert/ncas/alerts/aa22-011a</a></p>
<p>The post <a href="https://fosterinstitute.com/10-things-every-organization-can-do-right-now-to-protect-themselves-from-state-sponsored-foreign-attacks/">10 Things Every Organization Can Do Right Now to Protect Themselves from State-Sponsored Foreign Attacks!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Scan Your Network for These Folder Names</title>
		<link>https://fosterinstitute.com/attackers-scan-your-network-for-these-folder-names/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 22:04:45 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4919</guid>

					<description><![CDATA[<p>Attackers Scan Your Network for These Folder Names Once attackers gain access to a network, before they make themselves known, they explore your files to Locate cyber insurance policies to determine what your coverage limits are. Find financial statements to determine how much ransom you can afford to pay. Look for the most sensitive files [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-scan-your-network-for-these-folder-names/">Attackers Scan Your Network for These Folder Names</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers Scan Your Network for These Folder Names</p>



<p>Once attackers gain access to a network, before they make themselves known, they explore your files to</p>



<ul class="wp-block-list"><li>Locate cyber insurance policies to determine what your coverage limits are.</li><li>Find financial statements to determine how much ransom you can afford to pay.</li><li>Look for the most sensitive files they can download and threaten to release if you do not pay them.</li><li>And watch to see if you&#8217;ve discovered, or suspect, that they&#8217;ve gained access to your compute</li></ul>



<p>Do you have folder names that contain these letters in a row?</p>



<p>bank<br>Bank*Statement<br>budget<br>HR<br>Insurance<br>IRS<br>password<br>SSN</p>



<p>See below for the complete list of 123 groups of characters.</p>



<p>The security group MalwareHunterTeam obtained the Pysa ransomware operation&#8217;s attack script and shared the list with Bleeping Computer.</p>



<p>Hopefully, we don&#8217;t reach a point of needing to name folders, not using descriptive names, but the names of sections of parking lots at major amusement parks. A better strategy is to do everything possible to prevent the attackers&#8217; access. Rather than terrify you, use any concern you feel to redouble your efforts to implement robust cybersecurity controls, including but not limited to:</p>



<ul class="wp-block-list"><li>Utilize application control features of operating systems. Consider Microsoft AppLocker but consider keeping the implementation less complex by not verifying hashes.</li><li>Apply critical security updates to operating systems, applications, and infrastructure devices such as firewalls.</li><li>Eliminate local administrative rights for all users.</li><li>Have both online and offline backups. Offline backups are disconnected from your network so that if an attacker gets into your network, they cannot alter your backups.</li><li>Even though it can be a monumental task, practice a complete system restore into a test environment so you can rest more confidently that you can get your data back in the event it is encrypted during a ransomware attack.</li><li>Use a two-step login feature for online programs, VPNs, and remote desktop connections.<br>If you still have a local Exchange server, migrate it to Office 365 ASAP. Exchange mail servers are the target of successful attacks.</li></ul>



<p>Please communicate with your IT professionals and support them by providing time to focus on implementing security controls. Help them with automation and delegation of daily tasks.</p>



<p>Please forward this to your friends, so they see this example and appreciate the level of sophistication of ransomware tools.</p>



<p>Here&#8217;s a full list of text the ransomware program will look for automatically in your folder names:</p>



<p>941<br>1040<br>1099<br>8822<br>9465<br>401K<br>4506-T<br>ABRH<br>Addres<br>agreem<br>Agreement Disclosure<br>ARH<br>Assignment<br>Audit<br>balanc<br>bank<br>Bank Statement<br>Benef<br>billing<br>Brok<br>budget<br>bureau<br>card<br>cash<br>CDA<br>checking<br>claim<br>clandestine<br>compilation<br>compromate<br>concealed<br>confid<br>confident<br>Confidential Disclosure<br>contact<br>contr<br>CPF<br>CRH<br>Crime<br>DDRH<br>Demog<br>Detail<br>Disclosure Agreement<br>Disclosure Confidential<br>DRH<br>emplo<br>Enrol<br>federal<br>Finan<br>finance<br>Form<br>fraud<br>government<br>hidden<br>hir<br>HR<br>Human<br>i-9<br>illegal<br>important<br>Info<br>insider<br>Insurance<br>investigation<br>IRS<br>ITIN<br>K-1<br>letter<br>List<br>Login<br>mail<br>NDA<br>Numb<br>Partn<br>passport<br>passwd<br>password<br>pay<br>payment<br>payroll<br>person<br>Phone<br>privacy<br>privat<br>pwd<br>Recursos Humanos<br>report<br>Resour<br>resurses human<br>RHO<br>routing<br>RRHH<br>saving<br>scans<br>sec<br>secret<br>security<br>seed<br>Signed<br>sin<br>soc<br>SS-4<br>SS#<br>SSA<br>SSN<br>Staf<br>statement<br>Statement Bank<br>studen<br>SWIFT<br>tax<br>Taxpayer<br>Terror<br>Transact<br>unclassified<br>Vend<br>W-2<br>w-4<br>W-7<br>W-8BEN<br>w-9<br>W-9S</p>



<p>Source of the list of filenames, used with permission:<span style="text-decoration: underline;"><a href=" https://www.bleepingcomputer.com/news/security/ransomware-gangs-script-shows-exactly-the-files-theyre-after"> https://www.bleepingcomputer.com/news/security/ransomware-gangs-script-shows-exactly-the-files-theyre-after</a></span> from  <span style="text-decoration: underline;"><a href="https://twitter.com/malwrhunterteam">https://twitter.com/</a><a href="https://twitter.com/malwrhunterteam" target="_blank" rel="noreferrer noopener">malwrhunterteam</a></span></p>
<p>The post <a href="https://fosterinstitute.com/attackers-scan-your-network-for-these-folder-names/">Attackers Scan Your Network for These Folder Names</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
