<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>trojan &#8211; Gooroo Technical Services</title>
	<atom:link href="https://www.gooroo.com.au/tag/trojan/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.gooroo.com.au</link>
	<description></description>
	<lastBuildDate>Tue, 02 May 2023 02:09:37 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What Anti Virus is best for you? in 2023</title>
		<link>https://www.gooroo.com.au/what-anti-virus-is-best-for-you/</link>
		
		<dc:creator><![CDATA[Jason/Gooroo]]></dc:creator>
		<pubDate>Tue, 02 May 2023 01:01:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[avast]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[computerrepair]]></category>
		<category><![CDATA[maintenance]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[trend micro]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://gooroo.wpengine.com/?p=587</guid>

					<description><![CDATA[This page highlights the benefits of using Avast Anti-Virus for home use and Trend Micro for commercial or business use, particularly for networks with Windows servers. The author emphasises Avast's exceptional performance, ability to detect and eliminate malware, and the numerous features it offers, such as anti-phishing and automatic detection of removable media.]]></description>
										<content:encoded><![CDATA[<p>We get asked a ton what anti-virus software is best for their computer for providing protection and virus cleanups, and our reply has always been Avast for home use and Trend Micro for commercial or business use, especially for those networks with Windows servers.For Windows 10 and below, the Avast anti virus program is one of the best performing anti virus applications out there that will protect…</p>
<p><a href="https://www.gooroo.com.au/what-anti-virus-is-best-for-you/" rel="nofollow">Source</a></p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SynoLocker ransomware attack &#8211; Synology DiskStations</title>
		<link>https://www.gooroo.com.au/synolocker-ransomware-attack-synology-diskstations/</link>
		
		<dc:creator><![CDATA[Jason/Gooroo]]></dc:creator>
		<pubDate>Mon, 01 May 2023 05:23:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[trojan]]></category>
		<guid isPermaLink="false">https://gooroo.wpengine.com/?p=629</guid>

					<description><![CDATA[Synology NAS targeted by SynoLocker ransomware
Synology users told to update DiskStation NAS drives after SynoLocker, a ‘cryptolocker’ style ransom attack. Synolocker is not a variant of the infamous Cryptolocker virus we reported on earlier, but is of the same type – a ransomware style virus which hold its victim’s files to ransom. Their methods involve encrypting the victim’s files and then demanding money to obtain the decryption key, usually the payment is in the form of BitCoin, and anonymous digital currency.

Users on the weekend reported finding a message from the crypto-ransomware operators demanding 0.6 Bitcoin (or around $350 US), for the decryption key. Victims would need to install a Tor browser to access the hidden website where they could make the payment and receive the key and to allow decryption. At this time their is no other method to recover files, short of recovering from backup.

According to Synology, users have been reporting that the attacks are only affecting Synology NAS devices running version 4.3 of its DiskStation Manager (DSM) and not DSM 5.0, which included fixes released last December for two critical flaws that give unauthorised access via the Windows File Service and File Station.

The malware starts encrypting files, telling users that this process is under way. This implies that unencrypted files can still be copied at that point but how many will depend on the number of files on the affected drive and how long the encyption process has been running. The best course of action remains to turn off the drive immediately and take advice.

Detection and prevention rates will be very low as SynoLocker is completely new and attacks the NAS directly, thus it is unlikely that any workstation antivirus products will detect it.

Synology users will also need to think about how the malware reached their NAS in the first place and check their modem security, especially opened ports to the NAS and their computer(s).

An official Synology statement said that the issue seemed to be affecting DiskStations running Disk Station Manager 4.3-3810 or earlier.

Update the DSM
Users should update to the latest version by going to Control Panel > DSM Update or manually via the Synology support site.

Updated Information
For more updated information see the Bleeping Computer article and discussion at Bleeping Computer’s article &#038; posts on Synlocker.]]></description>
										<content:encoded><![CDATA[<p>Updated from: August 12, 2014 initial releaseSynology users were told to update DiskStation NAS drives after SynoLocker, a “cryptolocker”-style ransom attack. Synolocker is not a variant of the infamous Cryptolocker virus we reported on earlier, but is of the same type – a ransomware-style virus that holds its victim’s files to ransom, making the virus cleanup incredibly difficult to do.</p>
<p><a href="https://www.gooroo.com.au/synolocker-ransomware-attack-synology-diskstations/" rel="nofollow">Source</a></p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cryptolocker Encrypted Trojan</title>
		<link>https://www.gooroo.com.au/cryptolocker-encrypted-trojan/</link>
		
		<dc:creator><![CDATA[Jason/Gooroo]]></dc:creator>
		<pubDate>Fri, 27 Sep 2013 03:14:02 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[trojan]]></category>
		<guid isPermaLink="false">https://gooroo.wpengine.com/?p=634</guid>

					<description><![CDATA[CryptoLocker or Trojan:Win32 / Crilock.A Cryptolocker encrypted trojan really does encrypt work data and personal files and is incredibly damaging, resulting in requiring urgent virus cleanup of computers and across the local network. This trojan is very unlike most other ransomware viruses in that this one really does damage files. It can traverse across network resources (servers, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cryptolocker encrypted trojan really does encrypt work data and personal files and is incredibly damaging, resulting in requiring urgent virus cleanup of computers and across the local network. This trojan is very unlike most other ransomware viruses in that this one really does damage files.It can traverse across network resources (servers, NAS, mapped network shares) and encrypt anything with…</p>
<p><a href="https://www.gooroo.com.au/cryptolocker-encrypted-trojan/" rel="nofollow">Source</a></p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
