Here comes God Father of WANNACRY

love to Share

Tech Stuffs - Eternal Rocks Wannacry

Eternal Rocks - The God Father

So at ths moment everyone shouting out wannacry, wannacry wannacry, that too almost 150 countries being affected by wannacry, Here comes the God Father of Wannacry - "EternalRocks"

So what is this?

We all know Wannacry is a frightening trojan, an ransomeware which is spreading around. So what is this EternalRocks?

Read: WannaCry - All you need to know

EternalRocks - The BiG Boss

This EternalRocks is similar to Wannacry but this is more frightening than that. Yes!! This eternalrocks is a new malware which exploits same vulnerability as Wannacry and it is very stronger than the latter. 
boss of wannacry - eternalrocks

This EternalRocks as similar to wannacry, uses "EternalBlue" a tool from NSA to spread itself from one computer to another. In addition to that it also utilizes other NSA tools to make it spread faster than wannacry.

So how to protect from it? Here are few tips from our side.

Share and Care!!

WannaCry - All you need to know

love to Share

This malware strike that was unprecedented started last week, crossing the world, and security researchers estimated that of the day on Friday. Almost 57,000 computers in more than 150 nations were infected. It was barely stopped while the spread of the terrifying ransomware was impeded on Saturday.

WannaCry is far and away the most serious malware attack up to now in 2017, as well as the spread of the ransomware that is troubling is far from over. In this post, we’ll tell you what WannaCry, the best way to guard yourself, and what found in the last eight days.

What's WannaCry?

Above all, let’s clarify just what WannaCry is. This malware is a frightening sort of trojan virus

Just what does WannaCry do?

By encrypting most or even all the files on a user’s computer RansomWare like WannaCry operates. Subsequently, the application's requires a ransom be paid so that you can get the files. In case the user does pay the ransom ain't the amount doubles to $600. After seven days without payment, WannaCry will delete every one of the files that are encrypted and all information is going to be lost.

Was WannaCry created?

When a band of hackers called Shadow Brokers released the information on the exploit to people, the security hole was subsequently made.

Is the strike over?


European nations were hit the hardest, and company ground to some halt at organisations and several big businesses, including government agencies, and banks, hospitals.

On Saturday, a 22-year old security researcher named the spread of the WannaCry virus accidentally impeded when he filed a domain name concealed inside the virus’ code in an endeavour to monitor the spread of WannaCry, unintentionally discontinuing its advancement in the procedure. It's possible for you to read Hutchins’ narrative in his blog post titled to Unintentionally Quit a Worldwide Cyber Attacks.”

Sadly, the spread of WannaCry wasn’t really quit, but instead impeded.

How to shield myself?

Especially, Windows users with machines that run Windows Server 2003, Windows 8, or Windows XP should promptly install this security update.  Also, read How to protect yourself from viruses?

If my computer is infected with WannaCry exactly what do I do?

Unfortunately, there isn't any confirmed fix for WannaCry accessible only at that time. Cybersecurity specialists and antivirus businesses are hard at work seeking approaches to decrypt files on computers that are infected, but no means of third party decryption are accessible now. Hopefully, users that are affected have back-ups in their data accessible, as the sole other choices right now which is proven to operate would be to follow along with the directions offered in the application to cover the ransom.

Want to decrypt the encrypted files?

Researchers have released tools to help people hit by the global WannaCry ransomware. The researchers have released a key to unlock their computers without paying the ransom. The tools, called 'WannaKey' and 'WanaKiwi,' extract the keys to WannaCry encryption codes using prime numbers. However, the tools work only if the affected computers have not been rebooted since being infected with the malware.
Download Wannakey here: WANNAKEY

Hope this is helpful. Share it to world!!

How to avoid Computer Viruses on your Windows PC?

love to Share
How to avoid Computer Viruses on your Windows PC?

Guide on avoiding computer Viruses on your Windows PC

So have you experienced your computer slowing down or recurring shortcuts or popups when plugged in? This may be because of the viruses. So how to save yourself from viruses in your PC?
Here are few tips..

1. Never click on a link or attachment in an email that you are not positive that it's from a trusted source. If you think the e-mail looks suspicious, it may probably be. It never hurts to send an email to verify that it is legitimate.
If you use an email retrieving program, disable the image previews option. Email applications like Outlook, Thunderbird, and others often automatically load attachments for your convenience, but this takes away your ability to decide whether a file is safe to open or not. Check your preferences to disable these settings.

2. Beware of files that have double extension such as .txt.vb or .jpg.exe. As a default setting, Windows often hides common file extensions (normally), meaning that a program like Paint.exe will appear to you as simply Paint. Double extensions exploit this. They hide the second and dangerous extension and reassure you with the first, the safe extension – which is utterly meaningless to your computer. Your system recognises only the extension to the extreme right and runs the file as such. If a common file type whose extension you never see normally suddenly becomes visible for no apparent reason, right-click on it, select Properties, and look for the complete file name with extension. You may be surprised to find out what kind of extension it really has.
To make your file extensions visible, find Folder Options in your Control Panel. Under the View tab, scroll down to Hide Extensions for Known File Types and make sure it is unselected. This way you can ensure before opening any program.

3. Use USB drives with caution. Plugging someone else’s USB drive into your computer (or plugging your own into a computer at, say, an internet café/college) can spread an infection via the drive itself, not the file you’re actually trying to share. Whenever possible, try transferring files via email to keep potentially infected hardware out of the equation. Also, check out any shortcuts available when you plug external hardware.

4. Beware of internet pop-ups. The real danger is that some pop-ups are designed to look like they’ve originated from your computer, which makes you click on it. If you see a pop-up that looks like Windows (or another trusted program’s) anti-virus software but warns you of a problem that needs to be fixed with an extreme level of urgency, it may be a scam. (To be sure, simply close the warning, then open that anti-virus software from your computer to see if the warning is still mentioned.) Other programs report false errors and then offer to fix them if you purchase their software. If you see a new type of anti-virus pop-up that you have not seen before, or if it appears to be from an anti-virus program that you did not install, it is fake. Close the pop-up, update your anti-virus program, and run a full scan. Many of these browser-related apps keep some temporary files on your computer and can store a virus there. To avoid this risk, make sure you clear your browser’s cache regularly.
To clear cache Goto Start - Run - type "temp" and click enter. Delete all the files in the temp folder.

5. Beware of unusual emails from companies you do business with. If you receive an email from a company that you otherwise trust requesting information or recommending that you run a particular file, log into your account on that company’s page and see if there’s a notification there as well. Some scammers will get your trust by copying legitimate businesses’ email styles and using a similar-sounding reply-to address to lower your guard.
Note that good businesses will never request sensitive information, transaction details via email, which is one of the least secure ways of communicating.

6. Install an anti-virus program. Paid versions include Norton, McAfee, F-Secure, and Sophos. Free versions include AVG, Avast, Comodo, BitDefender, and Avira AntiVir. You can download the free versions from their official sites. Make sure you keep your virus definitions updated. Run a full system scan/quick scan weekly.

7. Install an anti-spyware program. Ad-Aware SE, Windows Defender, Malwarebytes, and Spybot Search and Destroy operate against internet malware and spyware that anti-virus programs overlook. Just like anti-virus software, keep it updated and do a full system scan weekly. You can also download Malware bytes, hitman, for free from the web which helps you remove malware from your PC.

8. Use a firewall. Make sure your Windows Firewall is turned on (run a search for Windows Security Center on your computer to configure). You can also install a trustworthy firewall program to help block unwanted internet traffic. Windows firewall is mostly preferred.
Note: You should not run two firewalls at the same time, as this will cause errors and can actually make your computer more vulnerable. If you’ve purchased or downloaded another firewall, make sure to disable Windows Firewall.

9. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both Windows and Internet Explorer. These updates will fix security problems and block many spyware programs and viruses. Note that viruses sometimes piggyback onto trusted updates to infect your computer; however, this is much more typical of outdated updates, as they are less closely monitored. Therefore, it’s best to keep your updates as current as possible.

10. Consider switching to a different web browser. Some web browsers are more customizable than others like tor, mozilla etc., allowing you more control over pop-ups, ads, tracking, and other concerns that all of us face on the internet. Firefox, for example, has a large array of privacy- and security-related add-ons that will allow you to reclaim control over your web experience. Additionally, you can use ad blocker extensions on your browser to avoid annoying ads.

11. Google it. When in doubt about an email, file, warning, email address, advertisement, or anything else that seems suspect, do an online search to see what other people are saying. Throw in the word “scam” to weed out results that may have been placed there by the very people who are trying to cheat you.

We hope this article helped you. If you have any questions feel free to comment down.
Share it so this may help few!!