About Company

  • - Home
  • - Why Us
  • - Mission & Vision

Type of Products

Services & Support

Contact Us

 

Ransomware Warning, is your data safe?

Security Software
1 - Eset Protect Advanced (contact us for a quote)
     
Proactive cloud-based defense against Zero-day and never-before-seen threats
2 - Eset Protect Complete (contact us for a quote)
    
 Advanced protection for Microsoft 365 apps with added proactive threat defense

Recovery from ransomware
1 - If you search the internet you will find that most suggest not dealing with hackers directly. From a client's experience
     hackers will try and milk more money from you. They rarely show good faith.
2 - We found
ransomwarehelp.com that helped our client recover their data very well. (Let them know we sent you ;-)

 

Hacking Info
Searching on YouTube.com I found the following.

This Insane Virus Trick Would Have Fooled Me - Watch Out

**Using hidden (invisible) characters things like reading left to right (U+202E) which allows an executable to look like a Word document (they even add the Word icon)
Unicode U 202E - Right-to-Left overrides (RTLO) take advantage of a special Unicode character [U+202e], which flips characters. The legitimate use for this Unicode character is to support languages like Arabic and Hebrew, which are read from right to left instead of left to right. Hacker use this code to create a hidden executable (virus).

**What is a Right-to-Left Override attack?
Some malicious actors have picked up on the potential for mischief with this character, and use it to enhance their phishing campaigns. When we first saw this trick being used,
we wrote it off as a one-off campaign done by some malicious actor who has been reading some very old forum posts. During the last few months however, we’ve seen more and more examples of this being used in the wild.

Staying safe from this type of attack is not too tricky when keeping in mind some basic rules of internet safety.

Have you received messages from  a server or someone you don't or wasn't expecting? Think whether your company actually uses the service
in question. If the service is something you use, you should check the service directly to see if the notification is real rather than clicking the link or downloading an attachment.
Using known service notifications is an efficient way for the attacker to lure you to a fake website pretending to be the real one to get you to enter your user credentials.
Be very cautious with HTML attachments! When you open a malicious HTML, the attacker might be able to access everything
you do. For instance, read your keystrokes, meaning that you don't even have to submit the password for it to be readable for the attacker.
**When opening an attachment make sure the file icon matches the file type in the attachment name. Our operating systems are not fooled by this trick and will display the correct icon. In this case a blank page which is commonly used at the .html file type icon instead of a note often seen in audio file icons.

****Windows 10 red
X in icons can also be caused by virus attack. So, you can download and install dedicated antivirus software on your computer to full scan and kill the detected viruses.

We hope the info helpful to fix your Windows 10 red X on icons issue.

Contact Information:
CompSysGrp
3883 Buchanan St Spc87
Riverside CA 92503
USA
> Phone: (310) 977 5924
Fax: (928) 395 6812
Website: www.medicalofficesolutions.biz
Email: compsysgrp@gmail.com