535 Connecticut Ave. Suite 104
Norwalk, CT 06854
Empire State Building
350 Fifth Avenue, 59th fl.
New York City, NY 10118

Featured Article

September 04, 2017

Do Not Click E-mails Titled 'please print', 'documents' or 'scans'

Although a week old, researchers have found over 23 million messages containing Locky were sent in just 24 hours, with the attacks spiking in time to hit US workers as they arrived at their desks last Monday morning. The new campaign was discovered by researchers at AppRiver who say it represents "one of the largest malware campaigns seen in the latter half of 2017".

The titles of these emails are typically 'please print', 'documents' or 'scans.' 

The malware payload was hidden in a ZIP file containing a Visual Basic Script (VBS) file, which if clicked, goes to download the latest version of Locky ransomware -- the recently spotted Lukitas variant- and encrypts all the files on the infected computer.

This past April, we warned Locky is back, in addition  to letting you know Ransomware is increasingly targeting Macs.

This is why cyberscurity training is crucial in creating a cybersecurity culture which is more than just technology - it is the way a company functions.

Moreover, training needs to be done in-person, watching a video just doesn't engage employees the way a live presentation does. Be safe, be secure, ensure your workers are trained and you have the right culture of cybersecurity in your organization.

A new breed of hacktrepeneurs has awoken and they have little to fear and everything to gain by infecting as many companies as possible and extorting money from them. Apex Technology Services stands ready to protect your company regardless of whether it’s located in New York CityWhite Plains, New York; Connecticut; Australia; Europe; or anywhere else. Our full suite of cybersecurity and IT support services is at your disposal, enabling you to spend less time worrying about and more time growing your business.

To ensure your security, consider one of our most popular services — Auditing & Documentation — which pinpoints vulnerabilities in your infrastructure, process flow and internal security procedures.







Comments powered by Disqus

Related Articles