Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Looking at FoggyWeb to Better Understand Malware Attacks

Looking at FoggyWeb to Better Understand Malware Attacks

The cyberattack on SolarWinds was devastating for many reasons, and Microsoft has officially uncovered yet another type of malware used in the attack on the software provider. This time, it is a backdoor threat they have named FoggyWeb. What does this threat do and why is it so important to look at this incident even now?

Back in April, security researchers laid the blame for the SolarWinds attack on the Russian Foreign Intelligence Service. Microsoft has discovered that there are various modules used by the attack group, a collective referred to as Nobelium. Nobelium includes other malware such as GoldMax, GoldFinder, and Sibot. Other types of malware that were previously known to researchers include Sunburst/Solorigate, Teardrop, and Sunspot. In the case of FoggyWeb, it is a malware which installs a backdoor on an already compromised server.

Backdoors themselves allow hackers to pull off all sorts of nasty tricks. Hackers can use the backdoor to access a network at any given time in the future, and they can use the backdoor to install malware, access sensitive data, spy on users, and so much more. It’s safe to say that backdoors are dangerous for businesses to contend with.

As for FoggyWeb, the backdoor itself is used to steal credentials and configurations from compromised servers. With these credentials in hand, hackers can remain on the infrastructure even after they have been purged from it. Hackers can also use these credentials to control access to important assets or other tasks that demand authentication. As with other backdoor threats, FoggyWeb can also receive commands remotely to pull off even more dangerous stunts.

To ensure that your business does not fall victim to these types of threats, you should take a multi-faceted approach to your network security. This includes monitoring your network for suspicious activity, ensuring that user access controls are in effect, and deploying comprehensive security solutions that can keep your infrastructure safe.

Thankfully, these solutions are more accessible than ever with the help of managed service providers like Jackson Thornton Technologies. We can help arm you with the tools to protect your business from any type of threat. To keep your business secure from all sorts of threats, reach out to Jackson Thornton Technologies at (877) 226-9091.

Is the VPN My Office Uses a Public VPN?
3 Reasons to Consider a Private Cloud Solution
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Friday, 15 November 2024

Captcha Image

Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...