Elevated Online Threat Alert Warning

by

January 21, 2016

Elevated Threat Alert: Watch Out for the Latest Imminent Cryptolocker Campaign!

Integris is issuing this urgent warning to all of our clients that we have caught wind of a new imminent cryptolocker threat that is out there now with the means of wreaking havoc on your business. Not to fear, though, we are here with the insightful information you need to combat this new threat by telling you what to look out for to keep your valuable data secure.

cryptolocker

Usually arriving through emails with .zip extensions, JS/Nemucod is a JavaScript Downloader Trojan that uses malicious campaigns to target users. It also downloads additional malware and executes it without the user’s consent and usually arrives through emails with .zip extensions.

Cryptolocker Virus

Here are just some examples of what you need to look out for when it comes to malicious campaigns via emails with attachments:

We want to ensure the safety and security of your valuable company data. If an email looks strange, do the following:

  • Do not open it.
  • DELETE it.
  • Never open attachments or click on URLs, especially from the unknown.

We urge you to take this security advisory and use it to inform your staff of what they need to be on the lookout for and what not to do if they receive one of these suspicious emails. Multiple individuals have already been impacted and it’s spreading incredibly fast. Forward this email to all members of your company, as well as your friends and family, immediately.

Protect against further threats using our managed IT services, which keeps you protected through various steps – from an initial risk assessment to managed security services. Contact Integris at (888) 330-8808 or email us at [email protected] to find out more.

We're Integris. We're always working to empower people through technology.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...