Support Home

Welcome to USA2net's Technical Support homepage. Here you will find information regarding USA2net's email, troubleshooting guides, useful links, and USA2net suggested . As always, feel free to contact us during office hours (8am-5pm, Mon-Fri) or email us at anytime. Thank you for giving us the opportunity to serve you!

I need assistance with...

Latest Malware Alerts

Following the Trail of BlackTech’s Cyber Espionage Campaigns

BlackTech is a cyber espionage group operating against targets in East Asia, particularly Taiwan, and occasionally, Japan and Hong Kong. Based on the mutexes and domain names of some of their C&C servers, BlackTech’s campaigns are likely designed to steal their target’s technology.

Following their activities and evolving tactics and techniques helped us uncover the proverbial red string of fate that connected three seemingly disparate campaigns: PLEAD, Shrouded Crossbow, and of late, Waterbear.

Over the course of their campaigns, we analyzed their modus operandi and dissected their tools of the trade—and uncovered common denominators indicating that PLEAD, Shrouded Crossbow, and Waterbear may actually be operated by the same group.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Following the Trail of BlackTech’s Cyber Espionage Campaigns

AdGholas Malvertising Campaign Employs Astrum Exploit Kit

At the end of April this year, we found Astrum exploit kit employing Diffie-Hellman key exchange to prevent monitoring tools and researchers from replaying their traffic. As AdGholas started to push the exploit, we saw another evolution: Astrum using HTTPS to further obscure their malicious traffic. We spotted a new AdGholas malvertising campaign using the...

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

AdGholas Malvertising Campaign Employs Astrum Exploit Kit

Erebus Resurfaces as Linux Ransomware

On June 10, South Korean web hosting company NAYANA was hit by Erebus ransomware (detected by Trend Micro as RANSOM_ELFEREBUS.A), infecting 153 Linux servers and over 3,400 business websites the company hosts.

In a notice posted on NAYANA’s website last June 12, the company shared that the attackers demanded an unprecedented ransom of 550 Bitcoins (BTC), or US$1.62 million, in order to decrypt the affected files from all its servers.

Erebus was first seen on September 2016 via malvertisements and reemerged on February 2017 and used a method that bypasses Windows’ User Account Control. Here are some of the notable technical details we’ve uncovered so far about Erebus’ Linux version.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Erebus Resurfaces as Linux Ransomware

Our Services

High Speed Internet Get connected with High Speed Internet! Digital Home Phone Low cost home phone service