Your Tech Story

malware

firefox etp

Mozilla Turns the ETP (Enhanced Tracking Protection) By Default On for Every Users

The users’ privacy has always been the biggest concern of all the browsers working out there. Safari from Apple has been at the top when it comes to maintaining the user’s privacy, and slowly, the other browsers are also taking a step forward in the same regard.

Another browser maker, Mozilla, has also announced that the Firefox will now have by default privacy from the third-party tracking software, through its Enhanced Tracking Protection (ETP) feature. Though the company had introduced the very privacy feature last year in October, and even, made it official in June this year, the users had to manually turn on the feature. But from today onwards, the feature will be by default on for everyone.

The feature is integrated with the new version of Firefox, i.e. Firefox version 69. And, users who will upgrade their browser, whether on desktop or over their Android smartphones, they will also get the feature turned on by default. With ETP, the browser will also be blocking the cookies that are set by websites that want to steal the information, like user behaviour to send ads to the users or to sell the information further to other companies.

firefox etp
Image Source: mozilla.org

The new ETP feature will also take an action on the crypto mining or cryptojacking by blocking it by default for every user. Cryptomining is a type of malware that is capable of taking over the resources of a computer, draining the CPU as well as the battery. Cryptomining that runs in the background is responsible for ruining the user experience.

The company announced the news through a blog post, where it also said, “Currently over 20% of Firefox users have Enhanced Tracking Protection on. With today’s release, we expect to provide protection for 100% of ours users by default. Enhanced Tracking Protection works behind-the-scenes to keep a company from forming a profile of you based on their tracking of your browsing behaviour across websites — often without your knowledge or consent.”

Since the release of the feature in June, the company have been testing it in different use cases, and according to it, the feature is ready to provide complete protection to its users. From now on, with the latest version of Firefox, the users will see a shield icon beside the address bar on the left. By clicking on the shield they can see which of the companies have been blocked by ETP.

ASUS Released the Fix for ShadowHammer Malware Pushed on Thousands of Computers

According to a recent report from Kaspersky, more than a million Asus computers running on Windows operating systems are under a malware threat. A malware named ShadowHammer has been injected to a pre-installed Asus utility software by some unknown hackers, making the software vulnerable to hack attacks.

asus malware

According to the Kaspersky, over 57000 Asus laptop and desktop users reported the issue, and the attack took place between the month of July and November, last year. However, Asus denied the number of reported issues saying that the number of affected laptops is lesser and now, it has finally developed the fix for the malware.

As per the reports, the hacker planted the malware through a back door to the Asus Live Update Utility software, such that whenever there is a new update for the system, the malware is pushed into the system as a new update itself. The size of the malware has also made equal to the utility software.

The company has released a patch in the form of an actual security update, which the users can download through a Live Update software tool. The Live Update software tool has also been updated to the V3.6.8 version. Also, the company has rolled out an online security diagnostic tool that can be used to scan the system for any malicious software.

“We have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future,” stated Asus in a statement.

Though the Taiwanese laptop maker Asus unknowingly pushed the malware to the systems of its customers, it was expected from the company to be apologetic about the matter. The company stated in the news post, “Asus customer service has been reaching out to affected users and providing assistance to ensure that the security risks are removed.”

Asus has also asked the ones with the infected Asus systems to take the backup of their data on the computer. They can fix their systems by simply resetting the system or reinstalling the Window to their computers, as it’s a software-level malware attack.

The Impact Of WannaCry Or WannaCrypto Ransomware

WannaCry or WannaCrypto ransomware attack took the world by storm this year taking down more than 230,000 computers within a day! The attack was reported on 12th May, 2017 and since then, the malware has spread globally affecting organizations, banks and services all over the world. NHS or British National Health Service has been compromised due to the attack. They are not even able to accept patients or perform operations due to the damage done to their systems. Starting with NHS the attack didn’t stop there. Other companies affected by the attacks included the Spanish telecommunications company, Telefonica, Gas Natural and electricity provider Iberdrola. Add FedEx in the U.S. and Renault in France to the list as well.

Those who still don’t know, Ransomware is a malware that causes data unavailability either by completely locking a computer or encrypting a part of the data storage. All this in order to pull a ransom out of your pockets in exchange of providing the access again. But, there is no guarantee whatsoever that you are going to get your confidential data back once you pay the money, which makes it even more haunting.

WannaCry affects PCs in a similar fashion. When it successfully hacks the storage, that is within seconds, a pop up comes up demanding a ransom of $300 in Bitcoins to restore access. The payment has to be done within three days of the attack or the amount doubles. That said, if one fails to pay even in a week’s time, data is permanently deleted, according to the pop up.

Recently came into light, WannaCry was first reported in March being leaked from NSA (National Security Agency), USA. It utilizes a flaw in Microsoft OS (named EternalBlue) discovered by NSA which hackers converted into a ransomware. Although, Microsoft was quick enough to release the patches for Windows OS, even for the outdated ones to provide overall safety, within the month of March itself, but not everyone was aware of what’s coming and didn’t provide the much-needed update to their system.

According to Microsoft’s president and chief legal officer Brad Smith, government agencies are to blame for the massive cyber attack. He clearly spoke his heart out through a post on Microsoft’s website about it. He wrote:

Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cyber security threats in the world today – nation-state action and organized criminal action.

As of now, a so called “kill switch” has been discovered accidentally, by a cyber security specialist, which has halted the spread, but that’s not the end in any sense. Ransomware attacks form a really good business by the way (if you got the skills) and people are willing to pay for their private data. Considering how convenient it has become to launch an attack like that in this era of internet, there will be many more ransomware attacks in near future. Coming to prevention, it’s the same for any virus attack and most probably you know what you have to do to stay protected. Don’t be lazy! Take the measures and remain safe.