Attention March 13th, 2024 Webinar Attendees, please click here to complete our Survey or Attendance Verification and Credit Request Form. (required for CLE credit)

New Malware Threatens Windows Users

Last update

at

by:

by:

Share

Print Friendly, PDF & Email
Ever heard of Reductor malware?

Guest Post by Craig Petronella, President of Petronella Technology Group

Encryption of sensitive emails and web communications is an effective way to protect yourself against a cyber event.

But cyber thieves always seem to be a step ahead of the game. Even as you read this, they’re working on ways to crack encrypted code.

And they’re enjoying some success. An example: a recent outbreak of de-encryption malware has put anyone who uses Windows at risk.

For detail on this new threat, we turn to Craig Petronella, CEO of Petronella Technology Group Inc., a cyber-security expert who posted this recent blog:

“Researchers at Kaspersky have uncovered a new highly sophisticated, high impact malware threat that breaks encryption: Reductor. According to the researchers, the malware ‘compromises encrypted web communications in an impressive way’ and gives the threat actors behind it ‘capabilities that few other actors in the world have.’”

Want to learn more about cyber safety and social engineering trends? Attend our free one-hour CLE webinar coming up in December. Free webinars are just one of the many benefits of belonging to Alta Pro Lawyers RPG. You also get access to the Pro Practice Playbook, Reminger ProLink, Ask the Risk Pro and more. Here’s how to join.

Insidious New Reductor Malware
From Petronella: “Reductor compromises the encrypted HTTPS communication, which enables the attacker to see all information and actions carried out by the web browser while leaving the victim completely unaware of the invasion.

According to the Kaspersky researchers, Reductor avoids touching any network packets, which would raise a red flag with security protections in place, and instead patch the PRNG functions of your Chrome or Firefox browser in the process memory. It also installs rogue digital certificates. ‘This is another particularly clever move by the attackers, to mark the packets with a signature of their own but without touching the network packets at all,’ tweets John Opdenakker, Ethical Hacker. ‘It’s very hard to detect that the victims PRNG is manipulated by the attacker.’

Using the Kaspersky Attribution Engine, the researchers feel there is some evidence that Reductor uses the COMPfun Trojan as a downloader, and they have tentatively linked Reductor to Turla, an advanced espionage threat group also known as Venomous Bear or Snake. The group is known to target high profile groups such as government, military and large commercial targets.

Internet Download Manager, Office Activator and WinRAR, as well as other Windows products, have all been mentioned as being used as vehicles to distribute the malware.”

To minimize your risk:

  • Only install what you need
  • Only get your software directly from the vendor, developer or official market store
  • Use antivirus protection software (Windows Defender is recommended)

Read Petronella’s original post here.

Are you a member of Alta Pro Lawyers RPG? If so, you get a 10% discount on Clio software and cloud-based products, not to mention free CLE webinars and 24/7 access to the Pro Practice Playbook. Not a member? Learn how to join here.

About the Author

Craig A. Petronella is the CEO of Petronella Technology Group Inc, a cybersecurity group that specializes in helping law firms with security and compliance. With 30 years of experience, he is the author of “How Hackers can Crush your Law Firm,” Peace of Mind Computer Support” and other titles. MIT Certified: AI, Blockchain & Hyperledger. Phone 919-601-1601; Helpdesk support 919-422-2607 or 877-468-2721.

Share

Print Friendly, PDF & Email

Related Posts on Altaprorpg.com!

Alta Pro Logo Icon

About the Editorial Staff

In an age of consolidation where increasingly impersonal transactions have made customer service an oxymoron, we bring together independent agents, insurance companies, and other industry specific service providers to develop and deliver insurance products and risk management solutions that benefit our insurance customers.

May 22, 2024 1:00 pm EST
1.0 Regular Credit
June 12, 2024 1:00 pm EST
1.0 Ethics Credit

Join Our Newsletter

Occasional newsletters and CLE invites

Find Us on Social

Upcoming CLE Webinar: Essential Business Skills for Busy Lawyers Part 1 – Communicate Like A Pro

May 22, 2024 1:00 pm EST
CLE Credit: 1.0 Regular

Colleen L. Byers

Colleen Byers Mediation, LLC

Archives

Latest Videos

1 Hour

Creating an Attorney Compensation Plan That Will Build Firm Culture and Attract Top Talent

1 Hour

Ethical Uses of Generative AI in the Practice of Law

1 Hour

Four “Ds” of Client Relations: Dabbling, Documentation, Difficult Clients, Don’t Do it!

Need Help?

Visit our Frequently Asked Questions page. 

Or email us directly at info@altaprorpg.com

Or submit your issue in the comment form below and we will respond as soon as possible.