Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 4 December 2012

Paying the Price for BYOD and Social Media

Posted on 13:32 by Unknown
We always return to work after a holiday with a little trepidation because over the years we have grown accustomed to expecting anguished calls for help as soon as we walk in the door from clients who have just discovered some major problem that jumped up to bite them when no one was looking.  This Thanksgiving was no exception.   Two network clients discovered a brand new malware variant that appeared to be erasing their network data right before their eyes.  Calls like that get the blood flowing even before the morning coffee has a chance to kick in.

This new malware also appeared to propagate itself across networks and infect multiple drives and users which was something new and different from typical infections that tend to stay localized.

To make matters worse, the anti-virus/malware industry was way behind in developing a solution to neutralize and/or remove this culprit.  It took 4 days before it was released to the public by any of the major A/V players.

The malware propagated itself across workstations and network drives through a tiny autorun module that would cross infect other devices and drives whenever a network user accessed a local or network drive.  In this manner it spread rapidly across the networks.

What made the battle even worse was the wide spread use of flash drives and portables at one client so even when we shut down the entire network and cleaned every infected PC, some user would bring an infected device from home and the process of infection would start anew.  Because there was no effective solution to keep the unit clean once the technicians finished re-infection was a constant battle.

Luckily for our clients, our Lead Engineer discovered the malware in this instance was not really erasing their data, it was hiding it using the ATTRIB command on files and folders which just gave the appearance of deletion.  As a little extra bonus, the malware also created new replacement files with sex related names that further spooked one client which was a private elementary school.  At the start, as fast as we'd clean one computer another user would log in and totally re-infect those drives and folders on the network that we had just cleaned.

I'm very fortunate to have a really talented tech team that was able to diagnose and clean the networks of both clients quickly and efficiently without much assistance from the Anti-virus industry for the first 4 days of the outbreak.  Now the other companies are caught up and the malware won't be able to re-infect but it was really hairy for awhile there!

If you're wondering about the original source of the infections,  Facebook was the source for one client and the flash drive of a staff member was the source for the other.  How many computers did we have to inspect?  About 120 PCs, 8 servers and 30 flash drives.  The number of infected computers?  About 85 PC's, 3 servers and 2 flash drives across both clients.  How much time was involved?  About 65 unanticipated work-hours.

Forgive us if we tend to cringe when people ask us how we plan to spend our holidays!

Happy Holidays Everyone!  Oh, and leave that @#$% flash drive at home!

*  BYOD stands for Bring Your Own Device and represents a growing trend of employees introducing personal devices into company networks and there is a growing concern about the vulnerability of company information assets to risks brought to work by employees on poorly protected devices like smart phones, tablets, notebooks and flash drives.  This combined with unregulated access to at-risk social media sites like Facebook and others greatly increase the risk of loss to organizations like those discussed in this post.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ►  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  January (2)
  • ▼  2012 (12)
    • ▼  December (2)
      • Let's Review Some Basic Tablet Security Tips
      • Paying the Price for BYOD and Social Media
    • ►  November (8)
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile