Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Fake Email Invoices Contain Ransomware

b2ap3_thumbnail_ransmoware_article_400.jpgRansomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

This malware, Maktub Locker, spreads through an email phishing scam that appears to come from a legitimate email address. In fact, the email itself appears to be relatively clean, raising very few red flags for security-minded users. The email informs the recipient that they owe an organization money and that they’re receiving the notice because their payment is overdue for some type of service rendered.

The email informs users that they have sent a hard copy of the statement to the user’s address, which is included in the message, and that a link to the customer’s copy of the invoice is included in the email for the user’s convenience. Unfortunately, there’s nothing convenient at all about it; downloading the file triggers the ransomware, which encrypts the PC’s files until the user breaks down and pays the ransom. It’s thought that hackers obtain the street addresses of their victims through some sort of free online database, but the fact that they can easily be located has many people spooked.

Incidentally, if the user refuses to pay the ransom as soon as possible, the cost increases until it’s paid. ZDNet, which reported the appearance of the ransomware, reached out to the company whose email address was used to send the message. The answer was expected, and they had nothing to do with the phishing emails. In this sense, the hackers behind Maktub Locker are both damaging the reputations of local business owners, and making substantial threats against others.

The fact that ransomware continues to grow more popular only reinforces the fact that users of technology aren’t safe from hacking attacks. Anyone who makes the simple mistake of downloading the wrong file can instantly be cut off from accessing their important files and information. Ransomware threatens to uproot your entire business infrastructure if you don’t have a solid way to handle this catastrophe.

Ransomware is particularly dangerous for businesses and other organizations that rely on important files to keep operations moving. Some ransomware even has the potential to spread through networks and infect entire infrastructures if left unchecked. Above all else, you need to make sure that you don’t pay the ransom. Doing so might give you a sense of security that your files can be retrieved, but there’s no guarantee that hackers won’t just take your money and run.

While ransomware is next to impossible to remove from your systems, security best practices are a great way to keep your organization secure from threats of all kinds. You should teach your employees about how to identify phishing scams and other online threats. Furthermore, you can implement what’s called a Unified Threat Management (UTM) tool, which takes advantage of multiple enterprise-level solutions to maximize your organization's security. To learn more, give us a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Sunday, 15 September 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Managed Service Provider Productivity Backup Ransomware Innovation Mobile Devices Outsourced IT Data Backup Android Smartphone Managed IT services Social Media Business Continuity Hardware User Tips Google Workplace Tips Disaster Recovery Upgrade Data Recovery Efficiency Data Browser Communication IT Support Managed IT Services Small Business Business Management Cloud Computing Data Management Smartphones App IT Support Holiday Microsoft Office Internet of Things Phishing Office Remote Monitoring Server Network Facebook Paperless Office Office 365 Miscellaneous Windows WiFi Save Money Encryption Password communications VoIP Tech Term Spam Artificial Intelligence Passwords Gmail Big Data Firewall Robot Apps Hosted Solution Recovery Collaboration Saving Money Employer-Employee Relationship Document Management Risk Management Customer Relationship Management Unified Threat Management Bandwidth Apple Avoiding Downtime How To Content Filtering Government Money Mobile Device Management Customer Service Work/Life Balance Downtime Wi-Fi Managed IT Operating System Infrastructure Office Tips Remote Computing Windows 10 Tip of the week Compliance Analytics Vendor Management Cybersecurity Chrome Word Hacker Computing Health Education IT Management Cybercrime Virtual Reality Hacking Training Mobile Computing Mobile Device Antivirus SaaS Tech Support BYOD Social Project Management Data loss BDR Website Business Technology Presentation Business Growth Telephone Systems Two-factor Authentication File Sharing Settings Healthcare Outlook Automation The Internet of Things Going Green Computers Vulnerability Alert Help Desk Printing Data storage Data Security Applications Bring Your Own Device Search Windows 7 Virtual Private Network Smart Technology Best Practice Meetings Consultation Digital Payment Sports Storage Lithium-ion battery HIPAA Business Owner IT service Software as a Service Cortana Router Maintenance Computer Care Virtualization Mobile Security Marketing Administration Safety IT solutions Competition Tablet Wireless Technology Wireless Automobile Upgrades Budget Laptops Information Technology Access Control End of Support Humor Mouse YouTube Analyitcs Unified Communications Legal Display LiFi Twitter Politics Monitors Managed Service Specifications Patch Management Travel Identity Theft Google Drive Scam Websites Augmented Reality Regulations Physical Security User Taxes Running Cable Botnet Proactive IBM VPN Assessment Samsung Net Neutrality Retail Server Management Licensing Remote Monitoring and Management Computer Repair Motherboard Cleaning Notifications Enterprise Resource Planning Undo Techology Internet Exlporer IP Address Conferencing Statistics Relocation Software Tips WPA3 Alt Codes Electronic Medical Records Google Wallet Manufacturing Mail Merge Distributed Denial of Service Webcam data services Crowdsourcing Dark Data Mobile Disaster Resistance Mobile Office IT Technicians Employees Bluetooth Technology Tips Private Cloud Fleet Tracking Typing Drones Modem Proactive Maintenance Address Managed IT Service PowerPoint Point of Sale Corporate Profile Quick Tips User Error Buisness Company Culture Proactive IT Hotspot Mirgation Zero-Day Threat Consumers Comparison Error History Asset Tracking Cryptocurrency Knowledge Cookies Processor Redundancy Break Fix WannaCry Time Management Printer Vulnerabilities IT Consulting Language Migration Backup and Disaster Recovery Mobility Black Friday Cabling Remote Workers Bitcoin Update Staffing Experience Nanotechnology eWaste Dark Web Web Server Network Management IT Sevices Geography Data Breach Computing Infrastructure Chatbots RMM Cyber Monday Administrator 3D Printing Information Windows 8 Chromebook GPS IoT Active Directory Environment Data Warehousing Cameras VoIP Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Cables Domains Technology Laws Alerts 5G Identity Procurement Entrepreneur flu season Disaster Unsupported Software Monitoring Emoji Tracking Utility Computing Windows Server Troubleshooting Application Lenovo Microsoft Excel CCTV Digital Downloads Gadget Users Wires Public Speaking Unified Threat Management Cooperation Hacks Remote Worker Shortcut Fort Worth Uninterrupted Power Supply Mobile Data Electronic Health Records User Management Superfish Blockchain Phone System Spyware Multi-Factor Security business communications systems Staff Cyberattacks Current Events Professional Services flu shot Solid State Drive Processors Laptop Cost Management Batteries Hard Drives Permissions G Suite How To Flexibility Heating/Cooling Google Calendar Virtual Desktop MSP Internet Protocol Virtual Assistant Fort Worth IT Motion Sickness Hard Disk Drive Supercomputer Halloween Google Docs Recycling Remote Work Refrigeration Networking Fraud Firefox VoIP streamlines Operations Bookmarks Servers Legislation Writing Fun Social Networking Voice over Internet Protocol DFW IT Service Deep Learning Personal Information IT Consultant IT Budget Scary Stories Management File Management iPhone business network infrastructure Wearable Technology Favorites Machine Learning Social Engineering

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...