Report: Brute Force Attacks on our servers April 2016

Report: Brute Force Attacks on our servers April 2016

As we already wrote, one of the attack target on any WordPress web hosting data center it is the Brute Force Attack, when the intruder try to check even 1000 password per minute in order to hack a web site.

brute_force_attacks_may_2016As our policy it is not only to stop, but also to ban completely the IPs where from come the attacks, we reduce the risks that your website hosted in Custom Cloud Servers to be hacked. Read more

May 2016 come with a more user friendly LOCKY ransomware

May 2016 come with a more user friendly LOCKY ransomware

On 6th of may our mailbox received a very nice email apparently from a Gmail account with an invoice zip file. ¬†The single text found it was ‘Sent from my Samsung device’

But as we are searching for new viruses we just stopped on the sender IP (187.141.53.xxx) which doesn’t belong to Gmail servers.

Anyway who is looking at email sources after all.

To view the video please just switch in full screen.

Read more

Last 10 days Brute Force Attacks in our Data Center Report

Last 10 days Brute Force Attacks in our Data Center Report

We already explained the Brute Force Attack in a previous article http://customcloudservers.xyz/wordpress-brute-force-attack/

Our Data Center it is also the target of such attacks, as it is normal. We counter only new attacks each day as the old one are already banned, so we are not interested on that ones.

Last 10 days new Brute Force Attacks statisticsSeries1 represent the total number of new attacks in our data center. (click the pic to enlarge it) Read more

Inside the brain of a Black Hat hacker: the making of ransomware distribution

Inside the brain of a Black Hat hacker: the making of ransomware distribution

If you think that you will find here how to create a ransomware it is better to search another source than us.

For the users protection we didn’t show even the whole source of the Office Macro. Moreover after we decrypted the password of the macro (in order to view it) we unprotected the macro in order to not know the numbers of the characters of the original virus macro.

Now let’s start to view first the 4 minutes video made by us. Please DO NOT TRY ON YOUR PERSONAL computer to ‘play’ with viruses because it exist a very big possibility to get your computer harmed by the virus. Read more

DNS Windows hosts file hijack

DNS Windows hosts file hijack

Today we present you another way for hackers to hijack your data.

Using a malware from an email or from an infected webpage, the intruders simply modify your hosts file (from /windows/system32/drivers/etc)

By making some changes here the intruder will have a few choices on what to do next. Now all depends on what did he need.

The most common intrusion on the hosts file it is combined with another changes made in your registry and your browsers. But simply modifying this small file could divert your request to another web sites.

Read more

WordPress Brute Force Attack

WordPress Brute Force Attack

Unlike other method of hacking which means more elaborate methods, when we think about WordPress web sites our minds of security stuff go directly to Brute Force Attacks.

loginFrom the early years of WP there it is a wp-login.php file on the root directory and a folder /wp-admin.

Also there are thousand of user which are using as administrator user name ‘admin’ with very simple passwords like admin123 or other simple to guess passwords. Read more

What about antivirus on ransomware war?

What about antivirus on ransomware war?

First of all please do not try in any way this on your computer!

One of the best methods to keep far from your computer any malware and viruses it is to use an anti virus program.

There are a few very good, some of them free or free to test.

Some of the best include (alphabetical order) Avira, ESSET or Malwarebytes

But you have to pay a lot of attention on the updates. Read more

Ransomware, the new generation

Ransomware, the new generation

Click on images for zoom in!

 

Starting with February, 2016 a new generation of ransomware started, changing the usual files extension in .LOCKY, encrypting all your images, documents, excel files, databases, JavaScript and more. From your harddisk, from your memory USB stick if it is connected and even spreading on your network if there are any saved access to different folders.

As you will see, the virus is very fast, encrypting your data in seconds.

How did it arrive at your computer?

Read more