Data Unit Blog

Unprecedented Office 365 Ransomware Attack Strikes Millions


Microsoft Office productivity tools have long been established as the gold standard for business around the world. They hold a significant presence in the market, with an estimated 80 million users using Office 365, the cloud subscription service providing Office applications.

The sudden emergence of Office 365 ransomware puts those users – and their enterprises – at risk. On June 22 at 6:44 a.m., IT security blogger Steven Toole reported the first attack, which was detected by cloud security firm Avanan.

The attack continued for a week, with Microsoft moving to block the malicious attachment on June 23. At least 57% of all Office 365 customers were hit with at least one phishing attempt.

Topics: Security ransomware

Zap Zcryptor: Ways to Fight Back


Viruses. Adware. Spyware. Trojan horses. Botnets. Browser hijacking software. Known as malware, all hit today's computers and other devices with a vengeance to cause the maximum damage possible.

Call them what you will, but they all serve a malicious purpose:

  1. They install themselves on computers without approval.
  2. They damage computers in other to steal data, personal or confidential information, passwords, files and Internet traffic. They even go so far as to cause a computer to stop working.
  3. They require IT staff to spend valuable time — time they can't afford to give up — to remove the villain and then fix the damage it's caused.

Plus, they bring in significant profits to their creators. For example, a 2015 Angler exploit kit made an average of $5 million every month they struck.

However, another type of malware is rapidly evolving — and fast. Analysts and researchers are now pinpointing ransomware as the next major threat, and it's going to hit with even more power and efficiency of its cousins.

Topics: Security ransomware

How Does Ransomware Work?


Access to information on your company's computer networks is essential for daily operation, and any downtime can be crippling to sales and productivity. Criminals know this, and they exploit this vulnerability with a type of malware known as ransomware.

While the inner workings of this attack may seem complicated, the goal is simple: lock you out of your own system until you pay. The first step to preventing this type of attack is knowing how it works. 

 

Topics: Security How to's ransomware

The relationship between TOR and ransomware

During your travels around the World Wide Web (or if you’re a House of Cards fan), you may have heard the TOR (The Onion Router) network of servers mentioned. This network was initially developed by the U.S. Navy as a way to anonymously browse the Internet. When used in that manner, the TOR network is a great concept and a lifeline for some users. However, for others, TOR is an enigmatic network with suspected links to hackers and other illegal activities.

Topics: Security ransomware

Is Ransomware a Virus?

What's the true nature of the so-called ransomware virus? Is ransomware really a virus?

 

Topics: Security ransomware

What is Ransomware?

Ransomware is one of the most serious security threats of 2016, and it shows no sign of going away soon. Ransomware is a type of malware that applies powerful encryption to files on a target network, then demands a payment to restore access to the files.

Topics: Security ransomware

Data Unit named as the EMEA Storage Specialist of the Year 2016


We are proud to yet again receive an EMEA Award, this time for our expertise in storage products & services.

We herewith would like to share this fantastic news with you first. You can find the official press release in this post. We would like to thank everyone who helped us to achieve this.

Topics: Corporate news