Dwelling without Sunshine

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I’m going to read one more script before this court case. I mean the guys going to jail anyway so reading more it’s going to hurt.
Photo by Ketut Subiyanto, please support by following @pexel.com

So many times, in life when you think you have dealt with one problem, shortly after there comes another one creeping its way around the corner hopping in your pants to make its way up the place where the sun doesn’t shine.

For many of us, this comes in the form of bills, but for most of us, this comes in the form of finding out how easily someone can obtain our sensitive information, which in most cases they don’t have to be involved at all, they can just have collection be automated while sat on the porcelain stool passing the morning coffee and last night’s meal.

Android products and Google Play Store have been a playground for threat actors to release malware in an effort to collect from their victims. As usual, we’re going over what the attack is, who is using it, the functionality and effects upon release, and what are some ways to protect yourself from having a rat run rampant on your personal device.

Dear god, it’s making its way up!
Photo by Andrea Piacquadio, please support by following @pexel.com

The Attack

Speaking of having a rat in your personal device. Here’s a name you’re not ready for, IRATA. Yes, that’s an actual name of malware. IRATA stands for Iranian Remote Access Trojan.

Are you trying to figure out what the last “A” stands for? Simple, since it is Android specific, it stands for “Android”. Android users, feel proud, there’s another malware targeting you…yet again.

This is a program that has spyware and information-stealing capabilities. This was discovered via a smishing attack in Iran. Smishing for those who do not know, is the dark art of contacting a person through text or another SMS (Short Message Service) to lure them into a false sense of security to give information. In this case, IRATA brings users to a fake webpage urging them to download an app and pay a fee for the service.

Unlike how companies operate by offering a service and charging you for the service and then some, you can actually choose not to pay this one, so don’t pay it.

I’ve read Scriptingthewhy, I don’t think Z-daddy was talking about this kind of rat.
Photo by MART PRODUCTION, please support by following @pexel.com

Who Can It Be Now

So who are the culprits employing the use of IRATA? Well, and this seems to become the norm if you’re a subscribed reader, no one has been named for using this malware.

However, its origin stems from Iran since that’s where its activity is taking place. Just be aware, that if you have a trip coming up to Iran, pray for your Android device. Regardless, still safeguard your device, traveling or not.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Tim: You’re not going to believe this, a rat made off with my information.
Sarah: Are you sure it’s a RAT and not a rat?
Tim: What’s the diff?
Photo by Tirachard Kumtanom, please support by following @pexel.com

That Sinking Feeling

Why would this be something you need to worry about? Well, since you asked, you would have to worry about IRATA scurrying away with all the information about your personal device.

This would include information like the serial number, the device ID, battery status, network type, and many other things. This is like your blind date showing up and telling you everything they know about you without you uttering a word. It’s not creepy at all.

To make IRATA even more terrifying, IRATA can hide itself by disguising its icon and tampering with the phone’s sound settings, like putting the phone on vibrate or lowering the volume. Once IRATA is in, it can collect information and replicate software to further malicious attacks like phishing.

I did my research on you, I hope that’s not like creepy to you or anything.
Photo by Andrea Piacquadio, please support by following @pexel.com

The Prevention

Okay, so it’s clear that you don’t want to go on a creepy blind date where they know everything about you before you say anything, and neither do we want you to. So how would you protect yourself from something like this?

To keep this malware from two-stepping on your personal device, check the reviews of others who may have downloaded the software. Always read the permissions the application is requesting to have access to as some may request access to questionable things.

Like a camera app requesting access to cookies in the browser. It’s plausible that the camera application may have a valid reason for requesting access, however, if it raises a red flag to you then you should go with your “gut feeling”.

Do not download software from third parties as they may contain malware on par or worse than IRATA. Keep your system and anti-virus up to date and exercise caution when opening emails with attachments.

You might not be able to keep out every rat but you can at least lower your chances of falling for their traps.

Kim: You have protection, right?
Dave: You bet I do. I have anti-virus software and Scriptingthewhy.com and… that’s not what you meant by protection.
Photo by Josh Willink, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on IRATA? Script a comment below.

Unveiling the Threat of DNS Tunneling: Impact and Prevention Strategies

Key Takeaways

DNS Tunneling Explained: Abuses the DNS (internet’s phonebook) to create hidden communication channels.

History: The concept emerged in 1998, with major attacks in the early 2000s.

Impact: Steals data, bypasses firewalls, controls malware, tracks users, scans networks.

Challenges: Hard to detect due to normal DNS traffic complexity.

Prevention: Monitor DNS traffic, use DNSSEC (security extension), restrict DNS server access, and patch vulnerabilities.

I’m just tunneling, there’s nothing to see here folks.
Photo by Laura Stanley, please support by following @pexel.com

Tunneling Through History

DNS tunneling is a cunning cyberattack method that leverages the internet’s backbone, the Domain Name System (DNS). DNS acts as the “phonebook of the internet,” translating user-friendly domain names into machine-readable IP addresses. However, its vital role and inherent trust make it a prime target for attackers.

The idea of DNS tunneling emerged in discussions as early as 1998, with the first major instances documented in the early 2000s. It works by cleverly encoding data from other protocols within seemingly ordinary DNS requests and responses. This creates a hidden communication channel that bypasses conventional security measures like firewalls, making it a stealthy tactic.

It’s just our network, it’s not a big deal. We’ve got this.
Photo by SHVETS production, please support by following @pexel.com

The impact of DNS tunneling on individuals and organizations today is severe. Attackers exploit this method to steal sensitive data, establish covert command-and-control channels for malware, and even bypass firewalls altogether. Recent campaigns have shown an expansion in the use of DNS tunneling, including tracking victim behavior and scanning network infrastructures.

Defending against DNS tunneling requires a multi-layered approach. Continuous monitoring of DNS traffic is crucial to identify anomalies. Additionally, implementing DNS Security Extensions (DNSSEC) adds a vital layer of security to the DNS protocol itself. Firewalls should be configured to restrict outgoing DNS traffic to authorized DNS servers only. Finally, staying up-to-date with regular patching and updates helps address vulnerabilities that attackers might exploit.

I can’t defend everything but that doesn’t mean I can’t try… at least.
Photo by Tony Schnagi, please support by following @pexel.com

However, it’s important to remember that DNS tunneling presents a unique challenge for defenders. Because DNS traffic itself is inherently full of varied requests and responses, distinguishing legitimate activity from malicious tunneling can be difficult. This is why a combination of the aforementioned strategies is essential to create a robust defense.

By staying vigilant and employing these preventive measures, individuals and organizations can significantly improve their protection against the threats posed by DNS tunneling.

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly

Cybersecurity Basics: Strengthening Your Home PC’s Defenses

Key Takeaways

  • Install reliable antivirus software: Your first line of defense against malware.
  • Keep your operating system updated: Patch security vulnerabilities for better protection.
  • Secure your network: Change router password, enable strong encryption, and consider a VPN.
  • Practice safe browsing habits: Avoid suspicious links, download only from trusted sources, and be aware of phishing attempts.
  • Use strong, unique passwords: Consider a password manager for complex and unique passwords.
  • Enable two-factor authentication: Adds an extra layer of security beyond your password.
  • Back up your data regularly: Protect your important files in case of attacks or hardware failures.
  • Educate yourself and stay informed: Follow reputable cybersecurity sources to learn about the latest threats.
Set your pieces up for defense.
Photo by Tima Miroshnichenko, please support by following @pexel.com

The Ultimate Guide to Fortifying Your Home PC: A Beginner’s Handbook

Introduction: Embracing Cybersecurity

In today’s digital world, cybersecurity isn’t a fancy term – it’s a necessity. With cyber threats constantly evolving, protecting your personal computer from potential attacks is crucial. This guide is designed for those with a growing interest in IT security and who want to strengthen their home PC’s defenses, even with no prior knowledge.

Understanding the Basics: What is PC Defense?

PC defense encompasses the strategies, tools, and practices that safeguard your computer from unauthorized access, attacks, and other cyber threats. Think of it as the digital equivalent of locking your doors and windows – a fundamental step in keeping your private information secure.

Step 1: Install Reliable Antivirus Software (Keyword: Antivirus Protection)

Your first line of defense is a dependable antivirus program. It’s the foundation of PC security, designed to detect, quarantine, and eliminate malware. Look for features like real-time scanning, automatic updates, and heuristic analysis.

Step 2: Keep Your Operating System Updated (Keyword: System Updates)

Regularly updating your operating system is essential. These updates patch security vulnerabilities and improve your PC’s ability to fight off attacks. Enable automatic updates to ensure you’re always protected.

Learning a little can help you protecting a lot.
Photo by Field Engineer, please support by following @pexel.com

Step 3: Secure Your Network (Keyword: Network Security)

Your home network is the gateway to your PC. Secure it by changing the default router password to a strong one, enabling WPA3 encryption (if available), and hiding your network name from public view (SSID cloaking). Consider using a VPN for an added layer of security, especially on public Wi-Fi.

Step 4: Practice Safe Browsing Habits (Keyword: Safe Browsing)

The internet can be a minefield of cyber threats. Be cautious of suspicious links, only download files from reputable sources, and be wary of phishing attempts that try to trick you into revealing personal information. Learn the signs of a compromised website to avoid them altogether.

Step 5: Use Strong, Unique Passwords (Keyword: Password Security)

One of the simplest yet most effective security measures is using strong, unique passwords for all your accounts. Strong passwords are typically a mix of uppercase and lowercase letters, numbers, and symbols. Consider using a password manager to help you create and store these complex passwords securely.

Defend your assets in layers.
Photo by Mikhail Nilov, please support by following @pexel.com

Step 6: Enable Two-Factor Authentication (Keyword: Two-Factor Authentication)

Two-factor authentication (2FA) adds an extra layer of security by requiring a second verification step, like a code sent to your phone, in addition to your password. It’s a powerful deterrent against unauthorized access, even if your password is compromised.

Step 7: Back Up Your Data Regularly (Keyword: Data Backup)

Back up your important data regularly to an external hard drive or cloud storage service. In the event of a cyber attack or hardware failure, you’ll have a secure copy of your files.

Step 8: Educate Yourself and Stay Informed (Keyword: Cybersecurity Education)

Knowledge is power! Stay informed about the latest cyber threats and defense strategies by following reputable IT security blogs and news sources. Here are a few good places to start:

Conclusion: Your Role in Cybersecurity

Improving your home PC’s defenses is an ongoing process. By following these steps and staying vigilant, you can significantly reduce the risk of cyber threats. Remember, cybersecurity is a shared responsibility – your actions can contribute to a safer digital world for everyone.

Engage with Us

Have questions or tips of your own? Share your thoughts in the comments section below and join the conversation on home PC defense. Together, we can build a community of informed and secure digital citizens.


This revised version incorporates your suggestion by providing a few examples of reputable sources for Step 8. This additional information empowers readers to take the initiative and learn more about cybersecurity.

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly