The POS Software Blog

The POS Software Blog

News from Tower Systems about locally made POS software for specialty local retailers.

CategorySecurity systems

Beware this email scam

B

A client received this email recently…

Hello!

I’m a programmer who cracked your email and device a few months ago.
You entered a pass on one of the sites you visited, and I intercepted it.
This is your password from  xxx@xxx.com on moment of hack:
XXXXX

Of course you can will change it, or already changed it.
But it doesn’t matter, my malware updated it every time.

Do not try to contact me or find me, it is impossible (in ‘from address’ is
a random contact).

Through your email, I uploaded malicious code to your Operation System.
I saved all of your contacts with friends, colleagues, relatives and a
complete history of visits to the Internet resources.
Also I installed a Trojan on your device and long tome spying for you.

You are not my only victim, I usually lock computers and ask for a ransom.
But I was struck by the sites of intimate content that you often visit.

I am in shock of your fantasies! I’ve never seen anything like this!

So, when you had fun on piquant sites (you know what I mean!) I made
screenshot with using my program from your camera of yours device.
After that, I combined them to the content of the currently viewed site.

There will be laughter when I send these photos to your contacts!
BUT I’m sure you don’t want it.

Therefore, I expect payment from you for my silence.
I think $868 is an acceptable price for it!

Pay via Bitcoin.
My BTC wallet: XXXX

If you do not know how to do this – enter into Google “how to transfer money
to a bitcoin wallet”. It is not difficult.
After receiving the specified amount, all your data will be immediately
destroyed automatically. My virus will also remove itself from your
operating system.

My Trojan have auto alert, after this email is read, I will be know it!

I give you 2 days (48 hours) to make a payment.
If this does not happen – all your contacts will get crazy shots from your
dark secret life!
And so that you do not obstruct, your device will be blocked (also after 48
hours)

Do not be silly!
Police or friends won’t help you for sure …

p.s. I can give you advice for the future. Do not enter your passwords on
unsafe sites.

I hope for your prudence.
Farewell.

This email is a scam. It was mentioned by the federal government recently as a scam, too. The best protection is to ensure you have your data backed up in the cloud, that you change passwords regularly and that you do not pay the ransom.

Note: we have removed identifying details from the email.

Tower Systems offers small business retailers help with the Petya malware attack

T

We published to our small business POS software customers today reminder advice on the best steps to follow to protect the business against impact from malware. This is especially relevant today because of the overnight Petya attack in the UK and elsewhere, including in Australia.

Being early with consistent professional advice helps our small business customers protect their businesses.

Here is best practice advice on which any computer user can rely:

MALWARE WARNING.
A new malware attack on computers is sweeping the world. It has hit the UK government, big businesses (shutting down the Cadbury factory in Tasmania) and small businesses. Please protect your business. Here is our advice.

  1. Tell all who use your computers to not open any emails that look suspicious in any way.
  2. Do not click on any links unless you are 100% sure.
  3. Do not open attachments unless you are 100% sure.
  4. Make sure you have the latest Windows update running on every computer.
  5. Never connect a computer to your network unless you are sure it is clean.
  6. Advise all employees of these requirements.

The easiest way to recover is if you use a professional cloud backup.

Tower Systems helps small business retailers protect against crypto locker attack

T

Tower Systems continues to help independent small business retailers reduce the possibility of impact from a crypto locket attack.

The help and service from Tower Systems is preventative as well as recovery focussed should the prevention advice be ignored.

In the Tower newsletter, regular weekly email and other communications the company ensures its thousands of small business retail customers has the information they need to properly an thoroughly deal with an attack.

The assistance from the company starts with the preventative, in the form of plain English computer use advice.

Here is a copy of the rent advice widely circulated by Tower Systems to its POS software customers:

COMPUTER USE POLICY

  1. The computers in this business are business tools. Their security is vital to the safe running of the business.
  2. Do not use any computer for any form of personal use without permission. This means:
    1. No playing games.
    2. No looking at porn.
    3. No Facebook.
    4. No browsing websites unless they are websites used regularly by this business for running the business.
    5. No connecting your phone to the computer.
  3. Do not open emails including business emails unless you have permission.
  4. Do not click on any link in any email unless you are 100% certain the email is from a trusted source.
  5. Do not clear the browser cache.
  6. Never put a USB stick in a computer unless you are certain of the source.
  7. Never permit anyone to use a computer in the business unless you have permission.
  8. Never give anyone a computer password from the business.
  9. If someone you don’t know calls and tells you to do something with the computer, make sure they have authority.
  10. Never write down any business password you are entrusted with.
  11. Never connect a USB stick with the computer unless you have permission.
  12. If you do something wrong own up to it immediately.

This is advice we suggest a retailer ives to all employees. It has been written for that purpose.

If you use our cloud backup service, recovering from a crypto locker is easier. Regardless, backing up every day in any method gives you a faster and lower cost recovery option. We offer a professional cloud based backup service. We use it ourselves and are happy to recommend it to our customers.

The POS Software Blog

Categories

Categories

Categories

Recent Comments

Monthly Archives