Digital Bloodhounds Abroad

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

man seated with book thinking
She is letting me analyze her OnlyFans account… this is too much power.
Photo by Thirdman, please support by following @pexel.com

So you’re sat at your computer and it’s time to look and evaluate how your OnlyFans account has been doing but you dread the thought of having to log in, and crunch numbers, and the overshadowing thought of having to brainstorm new ideas begin to make you gag because… well frankly, you don’t like having to worry about this additional work on top of what you’re already managing.

You figure this would be better suited for a group who had a knack for handling this much information and coming up with possibilities for you to gloss over.

If you could find and hire a team like that would see yourself being the big boss and could even, make your life slightly easier and slightly less shameful.

Now the only thing is to find this special group to crunch your numbers so you can get to sleep at night. Sorry mom.

gentleman going over data sheet
I’ve never seen statements like this, you’ve employed someone named “Bob” and they’re an infamous crackhead, how are you still in business?
Photo by Anna Nekrashevich, please support by following @pexel.com

Dumpster Diving Data

Who are these mad people who rummage through data like a crackhead rummaging through your trash in hopes to find anything that’s going to help them score some…well crack?

Look no further than Data Analyst. Creative name, again I know but Linda listen. Data Analyst is professionals who retrieve, organize, and analyzes information from various sources to help an organization achieve business goals.

They often use logic, statistical techniques, and computer programming to turn numbers into information that an organization can use to improve workflow and business processes. So if you ever wondered why your job strangely and suddenly came up with more tasks for you to do at work, yeah, it’s safe to assume these guys were the culprit.

An important goal of the analysis is to distinguish between what data is important and what data should be given less weight. They do this by using data analysis to produce accessible graph charts, tables, and reports.

This is information that’s exciting for them but boring to the average person who wants to upload a twerk video online. In any organization, data analysts are also responsible for data quality and preparing reports for internal and external stakeholders.

You can picture them being the boogeymen you would hide from when you’re having a bad third quarter and you don’t want to hear about how much your company is failing at it.

They’re a real “in your facts, not your feelings” type of people.

overview of woman putting jig-saw puzzle together.
If I’m not rummaging through data I get the shakes, why is that?
Photo by Karolina Grabowska, please support by following @pexel.com

Data Shakes

Do you want to know who in their right mind uses these data hounds? Get ready for this tall order, retail banks use data extensively to understand how their customers use their accounts and to help identify security risks. They’re also leveraging big data in location intelligence to determine how to manage their branch locations and set location-based performance goals most efficiently.

Farmers, not being the first people on your list that would use data analysis, are now using them for agriculture and they are posed to grow only more important as predicting the weather and squeezing maximum productivity out of the land. This wouldn’t be so much of a problem if Earth wasn’t trying to heal itself due to the need of feeding a growing population of humans.

Real estate firms and this is no surprise here, leverage big data for better property analysis, better trend analysis, and a better understanding of their customers and markets.

Data has long been crucial for doctors seeking to figure out, based on analysis of a larger number of data points collected from many patients, examples are findings in which blood pressure range is normal or how much sugar you should consume each day. 

Now the healthcare industry is using data analytics to answer bigger, more complex questions. Like seeing how much they could charge you for treatment, I say you because insurance companies ensure they don’t pay all of the cost.

a globe wearing a mask
You know, according to this photo, the sea was the only place protected from Covid. Photo is way too accurate.
Photo by Anna Shvets, please support by following @pexel.com

Data Diagnosis

These data-horny-driven people, how important are they? Well, they can help an organization understand risk and take preventive measures if the organization chooses to listen.

As a result, data analysis helps companies make informed decisions, create a more effective marketing strategy, improve customer experience, and streamline operations, and that’s among many other things.

All of these are excuses used to squeeze that sweet work juice from employees in the name of performing what’s called “improvements”.

Implementing data analysis into business models means companies can help reduce costs by identifying more efficient ways of doing business and by storing large amounts of data.

Side effects of reducing cost are but are not limited to, getting rid of your favorite coffee machine in the office, moving Taco Tuesday to Wednesday, lack of proper working equipment or equipment, and can even cause job loss via company downsizing.

So yeah, these data fiends have a massive play and a mass amount of uses. Again, everything is data and it’s everywhere, so these people are always turned on.

young woman sat thinking
If I start an OnlyFans, I could show just my ankle and be able to keep my job. Or maybe I should show a thigh to get more views.
Photo by Andrea Piaccquadio, please support by following @pexel.com

Only Data Abound Fans

You may be thinking “why would I hire someone to do all of this, I get aroused at the thought of crunching numbers.  I could give this a shot. Do I need a degree?”

Here’s a degree not needed inbound however, you are going to need a structured and formal approach to learning the necessary skills. The best way to do so is through a project-based course. Data analysis is also not required to have advanced coding skills.

Instead, they should have experience using analytics software, data visualization software, and data management programs. Data analysts are required to have a strong grounding in mathematics to succeed.

Again, if you’re an advent reader of mine, you already know Z-Daddy is out. Computers do the math for me, that’s how it’s always been. Reviewing and if necessary, improving your math skills may be needed before learning to become a data analyst.

The field of data science is fast-paced, demanding, and challenging. Learning to perform your responsibilities correctly can take some time too and that can add to your stress.

However, keep in mind, you’re not a machine and that working is important but it’s not worth sacrificing your health, then again, no job is.

group of young gentlemen cheering
Z-Daddy, you are the best. Z-Nation loves you.
Photo by Antoni Shkraba, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think you have what it takes to become a Data Analysis?

Script a comment about what domain knowledge you’re interested.

Tears for Fears Spreader Event

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Can’t wait to clear out this inbox. Oh? What’s this? A new script?
Photo by Andrea Piacquadio, please support by following @pexel.com

So you’re at your computer fast clicking through emails and you find one from Dave. You think to yourself, “I haven’t seen or heard from Dave for quite some time.” Dave is a friend from college if you went due to upbringing or peer pressure. And if you didn’t attend college, just know that Dave is someone you’re familiar with for the crucks of this story.

After viewing the email from Dave, you notice that the context of the conversation seems to be a bit off however, you figure it’s been a while and it would be nice to catch up on lost time.

You find that Dave had left an attachment at the bottom of the email and decided to check it out. After interacting with the attachment, you’re hit with a notification saying “We have downloaded all your files and encrypted them. You have 48 hours to pay a lump sum via Bitcoin or they will be deleted forever.” Big evil, diabolical laugh placed here.

Let me script the kind of event you may be facing here.

Peter: Oh look, Dave sent me an email!
William: Sir, are you sure that’s Dave? This email looks questionable.
Peter: Will, I’m tired of you and your lack of faith.
Photo by LinkedIn Sales Navigator, please support by following @pexel.com

Dave, not so Dave

The event you triggered is called ransomware, this is the act of gaining access to a target’s machine, collecting, and encrypting the data, and withholding it for ransom.

Many companies, big and small have encountered this at one point or another but the only difference between them and you are…well they usually have the money on hand to pay off the ransom whereas a regular person on the other hand may have a panic attack accompanied by the urge to run out and go play a game of Frogger.

Some time ago, certain ransomware surfaced going by the name of WannaCry. WannaCry had other names like WannaCypt and Wanna Decryptor but the end result was still the same.

Break in, collect, and encrypt the data, demand a nice close to unpayable ransom, and flake on the deal.

This isn’t how WannaCry looked but oh, I see what you did there.
Photo by Ketut Subiyanto, please support by following @pexel.com

Tears World Wide

So, how big of an effect did WannaCry have on the world? WannaCry was quite impactful, like a bully waiting for you outside of school at 3 o’clock wanting to punch your ever-loving lights out and you have no idea as to why, WannaCry knocked out more than 200,000 computers as a result quickly spreading across a span of about 150 countries.

This was a quick widespread infection that led corporate networks to panic which in turn led to catastrophic costs in billions of dollars in damages.

WannaCry even though it’s not prominent today and the event has been dealt with by a man going by the name Marcus Hutchins finding a kill switch, he inadvertently stopped the attack by registering a web domain found in the malware’s code. Didn’t know such a thing was possible but learning something new every day doesn’t hurt…well, not as much.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Hope you like your malware extra spicy.
Photo by Pixabay, please support by following @pexel.com

Spicy Malware

If you’re curious as to how WannaCry did its thing, don’t worry, you’re in good digital hands. WannaCry had a worm component to make it extra spicy.

Computer worms, if you’re not familiar with them, could infect other devices nearby without the need for interaction. This means that when a worm gets in, it immediately looks for other vulnerabilities and replicates itself, that way it doesn’t party alone.

Back to WannaCry, when it had found a device to infect, it would encrypt files, images, documents, and all those questionable videos that you made and stored on a hidden part of your c: drive labeled “I look good in my birthday suit, and you can’t tell me otherwise.”

There was no hacking of your computer on that one, just a lucky guess. But like with your interaction with Dave, when you click on the attachment you run the risk of all of that being lost.

Professor Ed: Folks, today we have to learn about handling questionable emails.
Student: What makes emails questionable?
Professor Ed: It’s questions like that is why you’re taking this training course.
Photo by RDNE Stock project, please support by following @pexel.com

Positive Ransom-forcement

What are some steps you can take to ensure your information doesn’t sign you up for a ransom note? Simple, avoid reconnecting with friends from school, it never ends well.

When receiving an email with any redirection be it a link or downloading of anything, cross-check with the sender to see if it’s in fact them and you are not getting spoofed.

Having an up-to-date anti-virus and up-to-date OS always helps as these patches are frequently released to prevent possible infection of your machine.

To owners of a business, have your staff properly trained in being aware of what to look for in suspicious emails.

Frequently back up your data on another device such as an external drive, that way if your information gets encrypted you can restore it from the last save.

If you do find that your device is infected, quickly isolate your system before it has a chance to extend its infection to other devices on your network.

It has been known that when dealing with a ransomware situation paying the ransom doesn’t guarantee the attacker will release your data back to you, they may in turn keep your data locked and sell it to other interested parties. All in all, just avoid it if possible.   

Professor: That’s excellent Tracy. How did you know about ransomware like this?
Tracy: Oh, I read a few scripts here and there.
Photo by Yan Krukau, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on WannaCry? Script a comment below.

Cats & Hat Tricks

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Yes human, keep petting me in hopes that I never turn on you.
Photo by Anna Alexes, please support by following @pexel.com

They are not Cats in a Hat and the eggs they offer will scramble your ham. If these cats come knocking at your door it’s not a good thing. Charming Kitten has employed a malicious tactic which is causing some major issues. We’re going to look at the attack, who is using it, the functionality and effects upon its release, and what are some ways to keep safe from these kittens dropping a plate at your doorstep.

That’s right kitty, you’re about to be exposed.
Photo by Cong H, please support by following @pexel.com

The Attack

Knocking on your door, what is this attack? Look no further than what’s being called “NokNok”. This is a backdoor type of malware, kind of like a trojan, that is targeting macOS (Mac Operating Systems).

Window users don’t let your hair down, you’re on the menu too. Like with trojans, once it’s in, it creates a backdoor for later entry and the victim won’t have a clue until it’s too late.

Jenny: Honey, the script said hackers, we can still trust the cat.
Brad: I still think we should get rid of it just in case.
Photo by Vlada Karpovich, please support by following @pexel.com

Who Can It Be Now

Now don’t let the name Charming Kitten fool you, there’s nothing cute about these cats. They are an Iranian government cyberwarfare group classified as an advanced persisting threat (APT) and have gone by other names such as APT35, Phosphorus, Ajax Security, and NewsBeef.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Things getting out of hand tend to take off.
Photo by SpaceX, please support by following @pexel.com

That Sinking Feeling

In this cyber-espionage comes the war you never wanted. Their targets include circles of US foreign affairs and nuclear security. Their attacks involve email phishing attempts, which could be considered whale phishing, to a nuclear security expert at the U.S.-based think tank, focused on foreign affairs to deliver a troublesome link to a Google script macro that would redirect to a Dropbox URL (Uniform Resource Locator) housing a RAR (Roshal Archive) archive.

Once presented with this file, an LNK dropper sets off a multi-stage process to deploy GorjolEcho, in turn, shows a decoy of a PDF document while awaiting the payload from a remote server. If it recognizes that it is in an Apple or MacOS, it will tweak its operation by sending a second email with a ZIP archive storing a Mach-O binary that masks as a VPN (Virtual Private Network) application. In truth, this would be an AppleScript to contact the remote server to download the payload to run the Bash script for the backdoor calling NokNok.

NokNok then retrieves modules that are able to gather information as to the running process, installed applications, and metadata from the system. The threat actor uses a fake file-sharing website which likely functions as a footprint for visitors and tracks new victims.

Out of all this, just know once it’s in it begins to collect information on the machine and user or users in secret.

Looks like that time for some awareness training.
Photo by cottonbro studio, please support by following @pexel.com

The Prevention

Charming Kitten has a high degree of adaptability because it can target both MacOS and Windows. It is strongly recommended when going through emails that caution is exercised.

Emails with attachments or links could be infectious which could put your machine at risk. Never download from untrusted or unknown sources as this could house malicious malware.

Always use and keep up to date with the anti-virus software as this will alert you to any danger on your machine. Frequent scanning of your computer should help safeguard you from experiencing a NokNok at your door.

I have a malware package from “We are Cats-To-Go.”
Photo by Pavel Danilyuk, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on NokNok? Script a comment below.