iTecs IT Outsourcing and Support Blog
We have detected a massive spike of brute force and script attacks originating from the Russian Federation assigned block of public IP addresses. Due to the scope of the attacks, we will need to block all IPs that are attached to Russian assets to protect your servers efficiently. Your network security and integrity is of our highest priority, and we are doing everything we can to stem these attacks; thus far, we have no evidence to show that your server was compromised. Keeping your systems up to date and protected with the various layers of security we’ve already implemented are doing well in evading any successful intrusions.
It is doubtful that you will notice and issues with your server, applications, or web activities. However, if you do find any anomalies with any operation, please let us know immediately.
Details of attacks:
Robotic attempts using Brute Force Attacks and Penetration Scans are repeatedly attempting to bypass security measures to gain access to your system, unsuccessfully. Our security system is logging these events, which all originate from various IP addresses out of the Russian territory.
An example of the brute force attack entry is below:
Log Name: Security
Date: 7/10/2020 8:47:26 AM
Event ID: 4625
Description:An account failed to log on.
Account For Which Logon Failed:
Account Name: ADMORRIS (they are using random usernames)
Failure Reason: Unknown user name or bad password.
Source Network Address: 18.104.22.168 (This IP belongs to the Russian Federation territory)
Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.Read More
G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.Read More
The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.Read More