Xopero Blog

Biggest ever cryptocurrency theft / StealthWorker botnet / ProxyShell

Great thefts stir the imagination like no others. The famous D B Cooper’s case, the United California Bank robbery, or the Great Train Robbery from 1963. Do “electronic” thefts stir the same amount of emotions? It’s hard to say, but when over 600 million dollars disappears from one of the financial platforms, it will bring a lot of hype. But let’s keep our feet on the ground and ask really important questions. Namely, how does it happened, was there a way to prevent the theft, is there any chance to get the money back, and what about the victims – BinanceChain, Ethereum, and Polygon miners?

Read more

How to backup Microsoft 365 with Xopero ONE

Microsoft is a leader in the industry of productivity applications suites. And as such is trying to provide as complex security measures as possible. Yet it’s not possible to avoid nor protect from every threat. That is why you should not blindly trust the protection provided by Microsoft in their Office 365 suite, but rather add layers of protection to ensure your data is safe. That layer of protection can be a Microsoft 365 backup. With Xopero ONE Backup & Recovery you can set up Microsoft 365 backup, manage it, and recover data if needed with ease. In this article, we will walk you through the steps you need to take to start backup Microsoft 365 data in your organization with Xopero ONE, and we will go into more detail about setting up a personalized backup plan.

Read more

VMware snapshot technology: what it is and when to use it

In recent years, VMware has put great emphasis on its cloud technologies. Still, you have to remember that estimates show that the company’s solutions are present on about 75% (data for 2019-2020) of physical servers intended for virtualization on our globe. This means that VMware ESXi is still a leading virtualization solution, and one of the most appreciated features of this solution is undoubtedly the snapshot technology. Thanks to snapshots, for example, we can do some “kind of backup” at the moment without stopping the virtual machine, and this is something that everyone loves, but why shouldn’t I use the word “backup” in this sentence?

Read more

Critical VMware vulnerabilities / LockBit 2.0. recruits insiders / Super Duper Secure Mode in Microsoft Edge

Critical VMware vulnerabilities are not the only problem faced by this virtualization software vendor last week. Do you remember the BlackMatter group that proclaimed itself to be the successor of REvil we warned you against in the last issue? It already has an encryption program targeting VMware ESXi. Today we also describe a unique business model of the new LockBit 2.0. and a cyberespionage campaign targeting the largest telecoms. For the sake of balance, we are describing a new project from Microsoft – with “Super Duper Secure Mode” the company wants to change the landscape of exploits and increase the cost of attacks.

Read more

Monthly summary: GitProtect.io on GitHub Marketplace / Online Tour / DigitalAnarchist TV / New distribution

In the last summary, we warned you that here at Xopero a lot will be going on soon. And we were right. This is by far the hottest holiday in the history of Xopero! We managed to set off on a journey – we mean Xopero ONE Online Tour, a series of webinars about our brand new software’s possibilities and features. The timetable includes more stops! In July, we also managed to appear in two large marketplaces – GitHub and Rozetka. Oh, and we give the interview to the DigitalAnarchist broadcasting platform. 

Read more

How to recover deleted emails in Microsoft 365 with Xopero ONE

We live in a world of information and a lot of them circle in our emails. If you are a Microsoft 365 administrator, it’s only a matter of time before you are tasked with restoring deleted emails or other mailbox items. 

Although Microsoft provides you with some basic protection, you should additionally protect your emails by yourself. Email correspondence is an essential aspect of business operations, but an email message can be accidentally deleted. What else does put your Exchange data in danger? Cyberattack and losing email credentials as well as intentional deletion made by former employees.

In this article, we will look closer at what recovery options are provided by Microsoft, and how easily you can recover your email when you have Microsoft Office 365 backup solution.

Read more

BlackMatter & Haron – newborns or rebirths? / Apple urgent update / UBEL is the NEW Oscorp

Last week, the industry media reported on spectacular debuts or rebirths in the cybercriminal world. Do you remember our news from two weeks ago about the end of REvil? Well, we advised you to hold on with popping the champagne … The celebration was interrupted by the news about the emergence of two ransomware groups on the market – BlackMatter and Haron, which may turn out to be successors of REvil and Avaddon. And it’s not the end of big returns – Oscorp Android malware stealing data and funds from banking apps came back even stronger in a form of UBEL botnet. 

What else? If Apple calls for urgent updating of most devices just one week after a series of patches, know something is happening. In addition – a critical Hyper-V vulnerability, which received the infamous rating of 9.9 on a ten-grade threat scale!

Read more

File backup or image backup – what to choose?

Here at Xopero, we divide people and companies into two groups. Those that are aware of the risks awaiting their data, and in conclusion making sure that it is secure by creating regular backups. The second group counts all people that haven’t lost their data yet. This one will shrink over time for sure. How do we know that? Because in today’s world there are countless amounts of risks threatening the security of data. 

Phishing attacks, accidental or intentional deletion, system errors, malicious hacker attacks. And many many more. Researchers point out that the cost of 1-minute downtime costs organizations from $926 to even $17k. That is why having a comprehensive backup solution in place is the best thing you can do for your company. But when it comes to backup, which type to choose? File backup or Image backup? In this article, we will take a closer look at the file and image backup strengths and weaknesses. Finally, I will try to answer which of these two options best fit your business needs.

Read more

Print driver with a 16-year-old bug / Sequoia / MosaicLoader / Malicious ChromePass

Today’s Security Center edition will make the temperature rise not only outside the window … but also among the owners of hundreds of millions of printers. A 16-year-old security bug found in HP, Xerox, and Samsung printers driver allows attackers to gain admin rights. But that’s not the end of the privilege escalation bugs. Other news should be of interest to Linux and Windows users, including all those waiting for the release of Windows 11 – this system has also been found vulnerable to a bug called Sequoia. What else? MosaicLoader malware and SEO poisoning attacks, and some interesting facts about ChromePass credential theft.

Read more

Joker malware / The end of REvil / New Windows Print Spooler vulnerability

There are a few disturbing “returns” in this Security Center release. Let’s start with Joker malware that has appeared again in Google Play. So far, 1,800 malicious applications have been removed from the marketplace. The new variant much more effectively avoids various types of security mechanisms – built into the device and Play Protect scanners as well. So be careful when installing new applications. Another interesting news … Media all over the world are wondering if this is the end of REvil. In recent days, the world’s largest ransomware gang has mysteriously disappeared from the web. The next weeks will show if it’s for good. As it turns out, the Windows Print Spooler problem is still up to date – this time with even worse repercussions. A new vulnerability – which Microsoft is warning about – could be exploited to perform unauthorized actions on the system. You can find the details below.

Read more