{"id":179460,"date":"2018-10-16T10:50:00","date_gmt":"2018-10-16T15:50:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/"},"modified":"2018-10-16T10:50:00","modified_gmt":"2018-10-16T15:50:00","slug":"infections-that-can-survive-the-most-extreme-cleaning","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/","title":{"rendered":"Infections That Can Survive The Most Extreme Cleaning\u00a0"},"content":{"rendered":"

Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it\u2019s common knowledge that computers are susceptible to viruses, today\u2019s breed of hackers are more creative than ever. They\u2019re utilizing new, innovative techniques to infiltrate systems of businesses big and small.<\/p>\n

\"Ransomware\"<\/p>\n

Not all malware is created equal. Just like infectious disease, there are different strains of malware, many with the potential to wreak havoc on your business network. In today\u2019s business landscape, tech departments are faced with the task of not only stopping these attacks before they happen, but with quickly repairing networks in the event that an attack has hit.<\/p>\n

The Problem With LoJax<\/strong><\/p>\n

One recent attack has IT departments up in arms. A Russian hacking group created the Rootkit, named \u201cLoJax\u201d. According to ESET, a leader in IT security, the campaign delivering LoJax targeted certain organizations in the Balkans and other countries throughout Central and Eastern Europe.<\/p>\n

The problem with LoJax is that it isn\u2019t just any ordinary malware. It\u2019s used to gain persistent access to a computer, and with its reputation for being hard to detect, it\u2019s causing quite the problem for users. Much to the horror of IT professionals, this hacking technique is so complex that it can withstand a variety of common fixes. Some of these include a reformat, a complete OS reinstall and a hard-disk swap.<\/p>\n

This unique type of malware lives in a system\u2019s flash RAM, meaning the only way to clear it is to over-write the infected machine\u2019s flash storage. This presents its own set of challenges, and isn\u2019t even a guaranteed fix unless you\u2019re armed with the right code.<\/p>\n

What Is Spectre?<\/strong><\/p>\n

Spectre is the name of an underlying vulnerability affecting the vast majority of computer chips manufactured within the last two decades. If this vulnerability is exploited within a system, it could enable attackers to gain access to data that was previously deemed protected. Lojax directly leverages this vulnerability, making it all the more difficult to detect before it hits.<\/p>\n

If attackers are successful, they can they utilize LoJax to access systems remotely, and on a constant basis. This allows them to inject it with additional malware. This type of malware can also be utilized to track a particular system\u2019s location, and potentially the owner\u2019s location. <\/strong><\/p>\n

What\u2019s At Risk?<\/strong><\/p>\n

UEFIs are particularly at risk. UEFI, Unified Extensible Firmware Interface, is a specification for the interface between a computer\u2019s operating system and its firmware. It runs pre-boot apps and is responsible for booting the OS. By re-writing the rootkit, the malware is able to stay hidden within the computer\u2019s flash memory, making it difficult to repair.<\/p>\n

How To Protect Your Network<\/strong><\/p>\n

Businesses can implement a series of additional security measures to minimize the risk of a cyber attack on their network, especially one as severe and unpredictable as LoJax.<\/p>\n

One of the single biggest mistakes businesses are making is running their operations on old, outdated equipment. Not only can this hinder productivity, but it can also leave businesses more susceptible to a cyber attack. Investing in new equipment that runs the latest and most improved hardware means security measures are often built in.<\/p>\n

Keeping equipment up-to-date can become costly, but it can also minimize the chances of an even costlier network revamp in the event that a catastrophic cyber attack takes place and compromises everything a company has worked so hard to build.<\/p>\n

Exercise Caution With Emails<\/strong><\/p>\n

Malware can gain access to your system through one of several ways. One of the most common methods is e-mail. It\u2019s wise to take a cautionary approach to e-mail when utilizing your work network. Be wary of e-mails from strange e-mail addresses and also be cautious of what websites you are visiting, taking care to only visit safe, reliable sites.<\/p>\n

Implement A Secure Boot<\/strong><\/p>\n

While malware like LoJax are especially hard to combat, IT departments can take comfort in the fact that not all hope is lost. One method of prevention is Secure Boot. This mechanism ensures that only securely signed firmware are able to boot up and run on a particular system. With signature verification required, Secure Boot makes it possible to prevent uniquely complex malware like LoJax from successfully infecting a system. Businesses are encouraged to review the Secure Boot configuration throughout the entirety of their hardware.<\/p>\n

Malware Cleaning <\/strong><\/p>\n

Once you suspect a computer within your network is infected, it\u2019s important to take action immediately. Be sure to back up your files before you attempt any type of intensive cleaning. Also, don\u2019t attempt to repair complex computer issues alone. Your IT department can help you create a comprehensive game plan to address the problem and prevent similar incidents in the future.<\/p>\n

Your system can come under attack when you least expect. Given that phishing is still a go-to strategy for hackers to penetrate systems, security awareness is more important than ever. Create a solid line of defense, and an effective response strategy, to ensure an attack doesn\u2019t compromise your business. Security awareness training can serve an important role in helping your organization stay protected from hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"

Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it\u2019s common knowledge that computers are susceptible to viruses, today\u2019s breed of hackers are more creative than ever. They\u2019re utilizing new, innovative techniques to infiltrate systems of businesses big and small. Not…<\/p>\n","protected":false},"author":5,"featured_media":158980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-179460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nInfections That Can Survive The Most Extreme Cleaning\u00a0 - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infections That Can Survive The Most Extreme Cleaning\u00a0 - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it\u2019s common knowledge that computers are susceptible to viruses, today\u2019s breed of hackers are more creative than ever. They\u2019re utilizing new, innovative techniques to infiltrate systems of businesses big and small. Not…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-16T15:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/\",\"url\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/\",\"name\":\"Infections That Can Survive The Most Extreme Cleaning\u00a0 - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg\",\"datePublished\":\"2018-10-16T15:50:00+00:00\",\"dateModified\":\"2018-10-16T15:50:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg\",\"width\":493,\"height\":349},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infections That Can Survive The Most Extreme Cleaning\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infections That Can Survive The Most Extreme Cleaning\u00a0 - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/","og_locale":"en_US","og_type":"article","og_title":"Infections That Can Survive The Most Extreme Cleaning\u00a0 - IT Services in Virginia","og_description":"Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it\u2019s common knowledge that computers are susceptible to viruses, today\u2019s breed of hackers are more creative than ever. They\u2019re utilizing new, innovative techniques to infiltrate systems of businesses big and small. Not…","og_url":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/","og_site_name":"IT Services in Virginia","article_published_time":"2018-10-16T15:50:00+00:00","og_image":[{"url":"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/","url":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/","name":"Infections That Can Survive The Most Extreme Cleaning\u00a0 - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg","datePublished":"2018-10-16T15:50:00+00:00","dateModified":"2018-10-16T15:50:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/10\/GettyImages-870901960.jpg","width":493,"height":349},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/infections-that-can-survive-the-most-extreme-cleaning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Infections That Can Survive The Most Extreme Cleaning\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=179460"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/158980"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=179460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=179460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=179460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}