Support Home

Welcome to USA2net's Technical Support homepage. Here you will find information regarding USA2net's email, troubleshooting guides, useful links, and USA2net suggested . As always, feel free to contact us during office hours (8am-5pm, Mon-Fri) or email us at anytime. Thank you for giving us the opportunity to serve you!

I need assistance with...

Latest Malware Alerts

Locky Ransomware Pushed Alongside FakeGlobe in Upgraded Spam Campaigns

In the beginning of September, a sizeable spam campaign was detected distributing a new Locky variant. Locky is a notorious ransomware that was first detected in the early months of 2016 and has continued to evolve and spread through different methods, particularly spam mail. A thorough look at samples from recent campaigns shows that cybercriminals are using sophisticated distribution methods, affecting users in more than 70 countries.

In the specific campaigns discussed below, both Locky and the ransomware FakeGlobe were being distributed—but the two were rotated. The cybercriminals behind the campaign designed it so that clicking on a link from the spam email might deliver Locky one hour, and then FakeGlobe the next. This makes re-infection a distinct possibility, as victims infected with one ransomware are still vulnerable to the next one in the rotation.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Locky Ransomware Pushed Alongside FakeGlobe in Upgraded Spam Campaigns

iXintpwn/YJSNPI Abuses iOS’s Config Profile, can Crash Devices

While iOS devices generally see relatively fewer threats because of the platform's walled garden approach in terms of how apps are installed, it’s not entirely unbreachable. We saw a number of threats that successfully scaled the walls in 2016, from those that abused enterprise certificates to ones that exploited vulnerabilities to curtail Apple’s stringent control over its platforms.

This is further exemplified by iXintpwn/YJSNPI (detected by Trend Micro as TROJ_YJSNPI.A), a malicious profile that can render the iOS device unresponsive. It was part of the remnants of the work of a Japanese script kiddie who was arrested in early June this year.

While iXintpwn/YJSNPI seems currently concentrated in Japan, it won't surprise anyone if it spreads beyond the country given how it proliferated in social media.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

iXintpwn/YJSNPI Abuses iOS’s Config Profile, can Crash Devices

Advisory: BlueBorne Reportedly Affects Billions of Bluetooth-Enabled Devices

BlueBorne is a set of vulnerabilities affecting the implementation of Bluetooth in iOS, Android, Linux, Windows and Mac OS* devices. According to the researchers who uncovered them, BlueBorne affects around 5.3 billion Bluetooth-enabled devices. The immediate mitigation for BlueBorne is to patch the device, if there’s any available, or to switch off the device's Bluetooth connection if not needed.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Advisory: BlueBorne Reportedly Affects Billions of Bluetooth-Enabled Devices

Our Services

High Speed Internet Get connected with High Speed Internet! Digital Home Phone Low cost home phone service