July 10, 2020

Cloud Computing Dallas - Russian IP Attempted Hacks

We have detected a massive spike of brute force and script attacks originating from the Russian Federation assigned block of public IP addresses. Due to the scope of the attacks, we will need to block all IPs that are attached to Russian assets to protect your servers efficiently. Your network security and integrity is of our highest priority, and we are doing everything we can to stem these attacks; thus far, we have no evidence to show that your server was compromised. Keeping your systems up to date and protected with the various layers of security we’ve already implemented are doing well in evading any successful intrusions.

It is doubtful that you will notice and issues with your server, applications, or web activities. However, if you do find any anomalies with any operation, please let us know immediately.

We are posting updates on Linkedin Facebook and Twitter

Details of attacks:

Robotic attempts using Brute Force Attacks and Penetration Scans are repeatedly attempting to bypass security measures to gain access to your system, unsuccessfully. Our security system is logging these events, which all originate from various IP addresses out of the Russian territory.

An example of the brute force attack entry is below:

Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          7/10/2020 8:47:26 AM
Event ID:      4625
Description:An account failed to log on.
Account For Which Logon Failed:
Account Name:                 ADMORRIS (they are using random usernames)
Failure Information:
Failure Reason:                 Unknown user name or bad password.
Network Information:
Source Network Address:             92.63.194.61 (This IP belongs to the Russian Federation territory)

Latest Posts

July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More
July 7, 2021

How to better defend against cyberattacks

The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.

Read More

You have questions, we have answers

What can we help you with?