Many grade schools and organizations are known to be at risk

 Many grade schools and organizations are known to be at risk

Cybercriminals never sleep. They are using every opportunity to take advantage of system vulnerabilities to spread malware and infect computers. Ransomware is one of the most threatening malicious spreads in recent years, and unfortunately, the victims are growing in numbers. It turns to be a “profitable business” for the hackers who seek new ways to infect systems, encrypt their data and ask for a ransom in exchange.

window-1231894_1920

Hackers target the JBoss web servers.

The new target of the hackers are the JBoss web servers, with thousands of servers already confirmed as compromised. Cisco’s Talos group security researchers have detected a large number of vulnerable internet-connected systems, which are running the out-of-date JBoss installations. One of them is the educational software developer Follett Destiny, which is creating library management software, sold worldwide. Cisco’s Talos group announced that hackers have found a way to install backdoors on the old software versions. These backdoors may introduce ransom code such as SamSam, and encrypt the data of millions of organizations, which are using the Follet’s outdated software at the JBoss servers.

Until now, about 2100 backdoors are known to be installed, but more than 3 million systems all around the world are at risk. Many of them are schools. Needless to say that the losses from a potential ransomware attack over such a vast number of organizations would lead to huge expenses and will surely disturb their functions. They will not be able to operate without access to their database. Unfortunately, cyber criminals know that very well, and that’s why ransomware is becoming their favorite technique to racket organizations for their encrypted data in exchange for a huge ransom.

However, there is a good news for the JBoss servers’ users. Follet is taking actions against the software holes and has a patching system that should fix the flaws in the older software versions. It can also detect potentially threatening files that might be used to compromise the JBoss servers. The company has also taken actions to notify the users about the security risk. Their technical staff provides support to all customers, who have found suspicious files in their system.

This, of course, cannot guarantee a full protection from getting infected, because these patches would be able to fix system vulnerabilities for 9.0 to 13.5 software versions only. There is still no solution for those, who use a software too old to get the patches. However, it looks like the company has taken measures to gain control over the situation before it gets completely out of hand and cause a major risk.

In case you are concerned, our “How to remove” experts would advise you to update your software and pay attention to every suspicious looking file or activity on your PC. You can also update your antivirus and set it for a regular system check. Follow the basic online security rules to stay away from potential threats. An outdated software is an invitation for any sorts of malicious programs, that’s why staying up-to-date is crucial for your safety.


About the author

Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

Leave a Comment

SSL Certificate

Web Safety Checker

About Us

HowToRemove.Guide is your daily source for online security news and tutorials. We also provide comprehensive and easy-to-follow malware removal guides. Watch our videos on interesting IT related topics.

Contact Us: info@howtoremove.guide

HowToRemove.Guide © 2024. All Rights Reserved.

Exit mobile version