Support Home

Welcome to USA2net's Technical Support homepage. Here you will find information regarding USA2net's email, troubleshooting guides, useful links, and USA2net suggested . As always, feel free to contact us during office hours (8am-5pm, Mon-Fri) or email us at anytime. Thank you for giving us the opportunity to serve you!

I need assistance with...

Latest Malware Alerts

ProMediads Malvertising and Sundown-Pirate Exploit Kit Combo Drops Ransomware and Info Stealer

We’ve uncovered a new exploit kit in the wild through a malvertising campaign we’ve dubbed “ProMediads”. We call this new exploit kit Sundown-Pirate, as it’s indeed a bootleg of its precursors and actually named so by its back panel.

ProMediads has been active as early as 2016, employing Rig and Sundown exploit kits to deliver malware. Its activities dropped off in mid-February this year, but suddenly welled on June 16 via Rig. However, we noticed that ProMediads eschewed Rig in favor of Sundown-Pirate on June 25.

It’s worth noting that Sundown-Pirate is only employed by ProMediads so far. This could mean that it’s yet another private exploit kit, like the similarly styled GreenFlash Sundown exploit kit that was exclusively used by the ShadowGate campaign.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

ProMediads Malvertising and Sundown-Pirate Exploit Kit Combo Drops Ransomware and Info Stealer

Linux Users Urged to Update as a New Threat Exploits SambaCry 

A seven-year old vulnerability in Samba—an open-source implementation of the SMB protocol used by Windows for file and printer sharing—was patched last May but continues to be exploited. According to a security advisory released by the company, the vulnerability allows a malicious actor to upload a shared library to a writable share, causing the server to load and execute it. If leveraged successfully, an attacker could open a command shell in a vulnerable device and take control of it. It affects all versions of Samba since 3.5.0.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Linux Users Urged to Update as a New Threat Exploits SambaCry 

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More

The information-stealing RETADUP worm that affected Israeli hospitals is actually just part of an attack that turned out to be bigger than we first thought—at least in terms of impact. It was accompanied by an even more dangerous threat: an Android malware that can take over the device.

Detected by Trend Micro as ANDROIDOS_GHOSTCTRL.OPS / ANDROIDOS_GHOSTCTRL.OPSA, we’ve named this Android backdoor GhostCtrl as it can stealthily control many of the infected device’s functionalities.

There are three versions of GhostCtrl. The first stole information and controlled some of the device’s functionalities without obfuscation, while the second added more device features to hijack. The third iteration combines the best of the earlier versions’ features—and then some. Based on the techniques each employed, we can only expect it to further evolve.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More

Our Services

High Speed Internet Get connected with High Speed Internet! Digital Home Phone Low cost home phone service