Spud in the News

Backdoor Vulnerability - Is Your System At Risk?

Backdoor Vulnerability - Is Your System At Risk? - Spud in the News | Spud Software - backdoor_vulnerabilityWhen it comes to backdoor hacking, how secure is your system?

News of yet another security breach spread over the internet Monday morning. Researchers discovered that the Avast-owned security application CCleaner for Windows had been compromised by hackers who had installed a vulnerability in the malware removal tool. This vulnerability opened up millions of users to further malware downloads, including ransomware and keyloggers that could be used to hold data hostage or access sensitive information.

Since approximately August 15th, this threat has been spreading to 2.27 million computers via legitimate security software. The infected computers then send the computer's name, what software is installed and which processes are running to the hacker's server. Avast has already released an update to the CCleaner software that is meant to resolve the threat, but as cybercrime seems to be a growing threat, it leaves users, both corporate and individual, wondering if their systems are at risk.

The hackers in the CCleaner breach used a method known as backdoor hacking to gain access to millions of machines. In computing, a backdoor is an undocumented portal that allows administrators to access the system for troubleshooting or maintenance. But backdoors can also be created by hackers to gain illicit access to a server or individual computers. In the case of CCleaner, the hackers exploited backdoor access to spread malware.

Installing backdoor access to systems has been a hot debate in recent years, as some government agencies want the ability to circumvent encrypted protections and access systems and data for local or national security purposes. Software developers have been pushing back on this issue as a matter of privacy for their users. It's a battle that is likely to continue for some time as the questions of security vs. privacy, in light of the cyber warfare now taking place.

And while the debate over security and privacy is an important one, the question most companies are asking is, "Is my system safe from backdoor hacking?" To answer that, it's important to understand how hackers access your system and what you can do to guard against backdoor access.

In most cases, hackers access a backdoor by searching for network vulnerabilities such as unused accounts with easy to crack passwords. (As of 2016, the most common password was still 123456!) Once they've gained access, they change the password to something difficult to break and have open access to everything on the network. The hacker will then mask their activities by hiding files deep within the system directories,using inconspicuous file names to avoid detection. Exploiting system vulnerabilities is especially easy if the manufacturer's default passwords were still left on the network.

Because of the hidden nature of backdoor hacking, it can be difficult to protect your system from cyber criminals looking for a way in, but there are steps any business can take to help protect their data. The very first thing a network administrator should do is ensure that users are not falling back on bad password habits. The most commonly used passwords in 2016 were: 123456, 123456789, qwerty, 12345678, and 111111. The top 25 most commonly used passwords constituted 50% of the 10 million passwords analyzed in 2016. And any hacker would have no problem breaking into an account with such a simple password in seconds.

Once you've implemented secure passwords across your system it's critical to ensure that unused accounts are no longer active. As hackers often use these dormant accounts to gain initial access, you should remove these accounts as they create unnecessary vulnerabilities.

And, finally, it's important to have network administrators who will set up firewalls and monitoring to help prevent or detect unauthorized activity. A solid firewall that blocks entry points from all but authorized users will defend against the execution of a port binding backdoor attack while system monitoring allows network administrators to flag suspicious activity, stop the attack and mitigate any damage that may occur.

If the idea of protecting your systems and applications seems daunting to you, we understand. The good news is that you don't have to figure it all out for yourself. Spud Software is actively engaged in protecting our clients with system and application security solutions, and we'd love the opportunity to work with you. Give us a call or join us at our Lunch & Learn event on October 6th for more information on protecting your company and its data.

Join Spud Software and VioPoint on October 6th from 11:30 am - 1:00 pm  for a Lunch & Learn Panel Discussion on the importance of application security.

We'll be answering the questions most business owners ask about the risks of web-based applications and the benefits of application security. For more information or to register for the event, visit our event registration page.

Backdoor Vulnerability - Is Your System At Risk? - Spud in the News | Spud Software - 12a660dc-62ba-4fcb-96f0-567eda4aa590
Backdoor Vulnerability - Is Your System At Risk? - Spud in the News | Spud Software - Screen_Shot_2017-09-06_at_11


 We'd like to introduce you to adorable Miss Bonnie. She is actually one of two Bonnies staying at Lucky Day Animal Rescue. (The other one is a sweet senior dog.) She would love to become a member of your forever family. 
Backdoor Vulnerability - Is Your System At Risk? - Spud in the News | Spud Software - unnamed_(3)(1)
If you're interested in adopting Bonnie (either one of them!) or any of the other residents at Lucky Day Animal Rescue, visit their website and fill out an adoption form.  You can make it some animal's Lucky Day!


Backdoor Vulnerability - Is Your System At Risk? - Spud in the News | Spud Software - Screen_Shot_2017-09-06_at_11
Backdoor Vulnerability - Is Your System At Risk? - Spud in the News | Spud Software - unnamed_(4)(1)

Spud was spotted out playing with the dogs just outside of Shields, Michigan. At least, we think those are dogs. Some people insist they're horses. But they're clearly Spud fans either way!

Have you seen a Spud shirt lately? Send us a picture to be featured in our newsletter!


October Is National Cyber Security Month

Does your cyber security plan make you more than a statistic? In the wake of multiple data breaches, ransomware attacks and backdoor hacking incidents, it seems like National Cyber Security Awareness month couldn't have come at a better...

Encryption: The Best Defense for Your Data

Do you know why encryption should be your first line of defense? Encryption is one of those words we use a lot in the software industry, and for good reason. When it comes to protecting your data, it is our first, and best, security solution....

Have You Prioritized Your Processes?

Does your company have a road map to success? Just as the choices we make day-to-day determine our course as individuals, the processes you follow as a company determines your organization's success. And the efficiency and effectiveness...

Domain Shadowing: The Hidden Threat to Your Domain

Is your domain safe from shadowing? Your business thrives on its reputation, and we know that you work hard to build a positive name in your community and your field. But maybe you've never considered your cyber reputation, or more aptly,...
Page: 12345 - All
Spud Software, Inc. BBB Business Review