Assiut University Network warns their customers from the two most danger viruses which spread in our last days.

  1. Ransom ware virus

  2. Description

    One specific ransom ware threat that has been in the news a lot lately is Crypto locker.
    The perpetrators of Crypto locker have been emailing it to huge numbers of people, targeting particularly the US and UK. Like a notorious criminal, this malware has been associated with a variety of other bad actors – backdoor Trojans, downloader’s, spammers, password-stealers, ad-clickers and the like. Crypto locker may come on its own (often by email) or by way of a backdoor or downloader, brought along as an additional component

    How to protect:-

    1. First and foremost, be sure to back up your most important files on a regular basis. Ideally, backup activity should be diversified, so that the failure of any single point won’t lead to the irreversible loss of data. Store one copy in the cloud, resorting to services like Drop box, and the other on offline physical media, such as a portable HDD. An efficient tactic is to toggle data access privileges and set read/write permissions, so that the files cannot be modified or erased. An additional tip is to check the integrity of your backup copies once in a while.

    2. Personalize your anti-spam settings the right way. Most ransom ware variants are known to be spreading via eye-catching emails that contain contagious attachments. It’s a great idea to configure your webmail server to block dubious attachments with extensions like .exe, .vbs, or .scr.

    3. Refrain from opening attachments that look suspicious. Not only does this apply to messages sent by unfamiliar people but also to senders who you believe are your acquaintances. Phishing emails may masquerade as notifications from a delivery service, an e-commerce resource, a law enforcement agency, or a banking institution.

    4. Think twice before clicking. Dangerous hyperlinks can be received via social networks or instant messengers, and the senders are likely to be people you trust, including your friends or colleagues. For this attack to be deployed, cybercriminals compromise their accounts and submit bad links to as many people as possible.

    5. The Show File Extensions feature can thwart ransom ware plagues, as well.This is a native Windows functionality that allows you to easily tell what types of files are being opened, so that you can keep clear of potentially harmful files. The fraudsters may also utilize a confusing technique where one file can be assigned a couple of extensions.

    6. Keep the Windows Firewall turned on and properly configured at all times.

    7. Enhance your protection more by setting up additional Firewall protection. There are security suites out there that accommodate several Firewalls in their feature set, which can become a great addition to the stock defense against a trespass.

    8. Adjust your security software to scan compressed or archived files, if this feature is available.

    9. Disabling Windows Script Host could be an efficient preventive measure, as well.

    10. Use strong passwords that cannot be brute-forced by remote criminals. Set unique passwords for different accounts

3. MSRPC_Srvsvc_path_Bo Virus

Microsoft Windows Server Service could allow a remote attacker to execute arbitrary code on the system, caused by vulnerability in the Remote Procedure Call (RPC) service. By sending specially-crafted RPC requests to a vulnerable system, a remote attacker could exploit this vulnerability to execute arbitrary code and gain complete control over the affected system.
For Windows Vista and Windows Server 2008 the attacker must be an authenticated user with access to the target network in order to exploit this vulnerability.

How to protect:-

    1-Use genuine operating software as windows 7 or windows 8
    2- Make an update every week at least.
    3- Protect your pc with a trusted antivirus.
    4- Open Firewall Settings.