Securing and managing agency mobile apps.
WEBINAR, THU 11/10, Complimentary, CPEs
This important video webinar will explore how mobile apps
rapidly expand in agency networks and how agency experts
limit security risks while they manage mobile Web devices
to drive agency productivity and mission achievement.
Thank you Lu+Toiya for introducing me to an amazing, life changing system created by visionaries Drew Burton and Faheem Rajput.*
I met this crazy couple on Youtube who introduced me to something that that changed the direction of my life, career and goals. What a blessing! It is called my24hourincome and it is a revenue sharing program.
I thought this was an MLM or Network marketing but it is not. Revenue sharing is the distribution of profits and losses between stakeholders. Apparently, this is a thing! It is going to be a really big thing. You have to try it to see for yourself the growth potential.
Here is a classic scam. There are so many of these Internet Lottery scams:
We happily announce to you the draw of the USA INTERNATIONAL LOTTERY, online Sweepstakes promotion held in United States of America on Saturday 16th Jan. 2016. You have been allocated to claim a total sum of £520,731.00 (Five Hundred and Twenty Thousand, Seven Hundred and Thirty One British Pounds) with ticket number: B55607545 4152 with reference number USA/JA2C110P5 and Serial number ZA5365/3 ,Batch number XA87-2PY,drew the lucky numbers: 06 14 32 35 41 Bonus 43. Contact our Fiduciary agents immediately to commence release of your lottery prize by providing details as listed below. 1. Full Name: 2. Email Address: 3. Age/Occupation: 4. Reference Number/Ticket Number 5. Phone Number: 6. Country: 7. Date of draw To file for your claim, please contact our fiduciary agent and provide them with your winning email and details as above. USA Lottery Fiduciary Agents: Mr. Phil Langa Foreign Service Manager E-mail: email@example.com Yours faithfully, Teresa Marie Roberts. Online coordinator USA INTERNATIONAL LOTTERY
One of my wordpress blogs got hacked. I was notified by google
I was apprehensive about accessing the site from my computer so i checked it out from my smartphone. I figured most current malware attempts to download and install on windows systems, but are usually not smart enough to infect two different platforms (windows AND android). The site seemed fine, but I am sure there is something wrong. So I logged into the server. The dates look a little suspcious but I the actual php files looked find.
I noticed a pattern with the dates that the files were access. I am seeing scores of files/folders that have been “touched” and have the same date/time stamp Nov 22, 2015 12:00. You only see that many files changed at once when a script does it. I focused on those files and I can see that MOST of the Nov 22 1200 date/time stamps are on ONE plugin: plugin GroupDocs. I look at the error log:
INFO Started brute forcing.
INFO checking: drinkmusiccity.com, david, david
INFO checking: farmofpeace.com, salima, salima
INFO checking: fayjames.com, fay, fay
INFO checking: fantasyassembly.com, kevin-j, kevin-j
INFO checking: fionaraven.com, fiona, fiona
INFO checking: fishinglakes.com, Colby, Colby
INFO checking: firetown.com, firetown, firetown
INFO checking: fontainetours.com, claudia, claudia
INFO checking: foreverboundadoption.org, designteam, designteam
INFO checking: fotoparisberlin.com, amelie, amelie
INFO checking: frabonisdeli.com, bennett-fraboni, bennett-fraboni
INFO checking: freeloveforum.com, anne, anne
INFO checking: funkatech.com, incyte, incyte
INFO checking: futurist.com, brenda-cooper, brenda-cooper
INFO checking: futebolnas4linhas.com, ingrid-carvalho, ingrid-carvalho
INFO checking: freedomnewton.com, pastorc, pastorc
INFO checking: k-bell.co.jp, kohei, kohei
INFO checking: katrinakaif.co.uk, harish, harish
INFO checking: kcfw.de, c-mohr, c-mohr
INFO checking: kazu.co.nz, staff, staff
INFO checking: keneally.com, samcniotktaetl, samcniotktaetl
INFO checking: keratoconus.com.au, jim, jim
INFO checking: fundacjadantian.com, fundacjadantian, fundacjadantian
INFO checking: kibi-group.com, kibi, kibi
I look up the plugin GroupDocs. I has had a MAJOR compromise:
It is being used as a backdoor into WordPress. Honestly, I don’t remember even installing it. I am not sure if it came with the theme I installed or what. I start checking all more other blog’s plugins. I don’t see it any where else. Upon further inspection of the plugin, I can clearly see the PHP backdoor code:
As I was trying to move my cursor to get out of the site, another tab popped up saying that I must update my google chrome. I closed it.
I tried opening the tabs once more with the website to confirm if my suspicion was right. It led me to another tab that was asking me to download a software in my toolbar. I have not taken the screenshot on that one. I went back to my computer history to search for that specific link and it was not there anymore. A warning of a virus appeared in my screen. That is really scary. Always be cautious and careful while browsing online.