Category

thinkCSC Security Alert

Security Alert: Xerox WorkCentre

By | thinkCSC Security Alert | No Comments

We have received several reports from clients who are receiving suspicious emails from Xerox WorkCentre, whether or not they actually use the device.

If you receive a message with “Scanned Image from a Xerox WorkCentre” as a subject and a zip file as an attachment, DO NOT OPEN IT FOR ANY REASON.

As a general practice, no company or device (copier, fax machine, scanner) will ever send you a zip file. You may receive zip files from individuals, but companies and services will not typically send zip files; always proceed with caution.

The Service Desk is always available to answer questions if someone is unsure of a file or attachment. Please contact us if you have opened the email or receive suspicious emails in the future.

Security Alert: VoIP Users Targeted in Email Message Attack

By | thinkCSC Security Alert | No Comments

thinkCSC is urging all VoIP users to take precautions when receiving voicemail to email services, as thinkCSC has identified a new security risk targeting VoIP users. The attack sends a voicemail to email with a .zip or .exe attachment that, when opened, can infect the user’s system and network.

The voicemail to email message will look like it comes from your messaging system but will be from an unknown number. thinkCSC urges VoIP users to proceed with caution when receiving a message from an unknown number. Do not open any .zip or .exe files. Legitimate voicemail to email message formats are .wav or ,mp3 files; if you receive any other type of file, you should assume it is a fake voicemail to email message.

These harmful messages are typically from numbers using non-existent area codes. A listing of all U.S. and Canadian area codes can be found here.

What To Do If You Have Received a Fake Voicemail to Email Message on Your VoIP Service:

  • Do not open any message that is not in .wav or .mp3 format
  • If you receive a message with a .exe or .zip file attached, DO NOT open it
  • If you believe your system has already been compromised, or if you have already opened the file, contact thinkCSC right away.

If you have any questions or believe you have been a target of this threat, please contact our team at your earliest convenience.

thinkCSC security alert

Security Alert: Do Not Open .TIFF Files from Unrecognized Sources

By | thinkCSC Security Alert | No Comments

thinkCSC is issuing a security alert regarding .TIFF files. Zero-Day attacks targeting Windows users has been detected by Microsoft and is already affecting people in Asia an the Middle East. It is expected to spread to the U.S. and Europe very quickly. This vulnerability enters your system when you open a .TIFF file and allows the attacker (potentially on a remotely hosted computer) to gain administrative access to your system and network.

Security Alert

It is imperative that you refrain from opening any questionable .TIFF file, as the messages are often constructed to make the user believe they are coming from a trusted choice.

While Microsoft is working to develop a patch to protect users, at this time, current antivirus and firewall solutions are unable to prevent infection. Most vulnerable are Microsoft Office users who are running Windows Vista or Windows Server 2008. Microsoft Office 2003 through Office 2010 are impacted in this zero-day attack.

What Are .TIFF Files?

From Adobe: TIFFs are a file format popular with graphic designers and photographers for their flexibility, high quality, and near-universal compatibility. Learn more about these raster graphic files and how you can put them to use in your next project.

If you have any questions or believe you have been a target of this threat, please contact our team at your earliest convenience.

thinkCSC security alert

Security Alert – Installing OS X Mavericks

By | thinkCSC Security Alert | No Comments

thinkCSC is issuing an urgent security alert regarding OS X Mavericks updates.

We are receiving a number of reports from clients that the latest updates are creating major compatibility, hardware driver, file sharing, and printing compatibility issues, as well as other problems. We recommend that you refrain from installing the OS until you check with us in order to avoid downtime. Apple is providing OS X Mavericks under the normal updates section with no cost associated with the update.

Because of the issues we’re seeing, we believe the wisest approach is to contact our tech team first and make sure you will not experience any of the compatibility issues being reported. If you have already run the update and you’re experiencing problems, please let us know. If you have any questions or need assistance with your update, please contact our team at your earliest convenience.

You can see all of our security alerts by visiting thinkCSC security alerts.

What Is OS X Mavericks?

From Wikipedia: It is the 10th major release of macOS, Apple Inc.’s desktop and server operating system for Macintosh computers. It was announced on June 10, 2013, at WWDC 2013, and was released on October 22, 2013, worldwide.

Windows XP Faces Extinction

By | thinkCSC Security Alert | No Comments

extinctWindows XP, like the dinosaur, the Dodo Bird, and the Sabre Tooth Tiger before it, will be extinct by next April. There is no saving it – it’s doomed to be another relic in a museum. Because Microsoft support for Windows XP will end in April 2014.

Software can be a lot like a comfortable pair of boots. You like how it looks and feels. It’s comfortable. And because of that, you may hesitate to upgrade when you should. But like those broken-in, worn-out boots that leave you with at least a bruised ego, choosing not to upgrade your software can leave you with much more painful damage. Regardless of which platform you choose, upgrading your Windows operating system is crucial if you want to receive Microsoft support and protect your business systems from vulnerability. The risks of using extinct, unsupported software include:

  • Potential security breaches
  • Reduced functionality
  • Incompatibility with other programs
  • Increased downtime

There are two options for replacing your Windows XP system: Windows 7 and Windows 8. While Windows 8 is the most recent Windows version, Windows 7 may be the better choice for some businesses.

For those businesses in which the computer is a way to track invoices, send a few emails and occasionally update a website, Windows 7 may be the preferred choice. Windows 7 allows for a variety of customizations to the look and feel of your computer yet remains a basic tool for one-clicking your way to the programs and files you use most often.

For those businesses with a mobile workforce, and for those who work as much from a tablet or phone as they do a desktop or laptop, Windows 8 is designed to be a mobile-friendly operating system. Windows 8 is for people who embrace change and already spend more time using touchscreens than they do typing.

Now is the time to let go of your broken-in, worn-out operating system. It’s moved to the top of the endangered species list. And whether you choose Windows 7 or Windows 8, each platform offers better collaboration, performance and security than sticking with one that is on the extinction list. We recommend upgrading as soon as possible to ensure ongoing security and stability. If you’re not sure where to start, thinkCSC can facilitate the ordering and implementation of the new operating system. We can assess your current infrastructure to ensure its compatibility with new software. Contact us today for more information.

Crypto Locker Malware – Act Now

By | thinkCSC Security Alert | No Comments

cryptolockerRecently, several of our clients have been exposed to a new variant of malware which is becoming known as Crypto Locker. Antivirus vendors are working diligently to combat the virus. However, it is still possible for the malware to infect the machine even if it has current, up-to-date antivirus protection.

Crypto Locker specifically targets Word, Excel, PDF and possibly other file types. It encrypts the files and makes them unusable. Typically, a single machine (or more) on a network becomes infected. The malware proceeds to modify all of the specific files on that machine, as well as any files that machine has access to on its network, including mapped drives to shared servers. One infected machine can quickly spread, making nearly all company files stored on the network unusable.

On the machine that is actually infected, you will likely see a pop-up called CryptoLocker stating that your files have been encrypted and try to ransom you to pay hundreds of dollars to have them unencrypted.

thinkCSC would advise you to not pay them any money or give them any information.

It is unlikely that paying them will result in fixing your issue and this will likely result in fraud and other problems. It is important that these issues be reported as quickly as possible. The infected machine should be shut down and removed from the network.

On machines that are uninfected but trying to access files that have been changed by Crypto Locker, you may receive errors like ‘File is not in a recognizable format,’ ‘<Filename> cannot be opened because it is an unsupported filetype or has been damaged,’ and other variations of those messages.

The fix? In most cases, there is not one. The only tried and true solution, until Antivirus vendors are able to adapt, is to restore from backups. If you have an antiquated or untested backup system, possibly including tape backups, this could become quite problematic and lead to extensive downtime.

There are several lessons to learn from this. First, it is important to have a strong, automated backup solution that runs on a regular basis. Second, that backup solution should have monitoring and be tested on a regular basis. Third, point in time and time to restore need to be taken very seriously. If you only backup once day, you will likely lose an entire day or more of data should you need to restore. Time to restore is another important consideration. If you have to bring in tapes from offsite and then perform a restore, it will take longer before you and your data will be on working terms again. Fourth, it is always important to have currently licensed, updated Antivirus. This is a first line of defense and not a perfect solution that will stop 100% of all threats, so it is also important to have a complete protection system including email security, strong firewall, antivirus, and a comprehensive automated backup solution and patch management.

If you have been infected by this malware or would like to discuss thinkCSC’s Managed Services Program, Backup & Disaster Recovery (BDR) Solution, or any other concerns, please contact your account executive or contact us today.