• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
04 Dec

Cyber Criminals Are Using YouTube To Install Cryptojacking Malware

Cyber Criminals Are Using YouTube To Install Cryptojacking Malware

 At East African Data Handlers we have discovered that the  Slovakian software security firm Eset  uncovered that cyber criminals  are behind Cryptojacking Malware, the Stantinko botnet which has been distributed as a Monero (XMR) cryptocurrency mining module via Youtube.

We wish to warn the public to be careful. Further research indicate that, On Nov. 26, the major antivirus software supplier Eset reported that the Stantinko botnet operators have expanded their criminal reach from click fraud, ad injection, social network fraud and password stealing attacks, into installing Cryptojacking Malware on victims’ devices using Youtube.

Stantinko botnet has been active since at least 2012

The Stantinko botnet, which has been active since at least 2012 and predominantly targets users in Russia, Ukraine, Belarus and Kazakhstan, reportedly uses YouTube channels to distribute its Cryptojacking Malware module, which mines the privacy-focused crypto coin Monero on the CPUs of unsuspecting victims.

This cryptocurrency-stealing malware has reportedly infected around 500,000 devices, and is similar to the recently discovered malicious malware, Dexphot, malware discovered by Microsoft that has already infected more than 80,000 computers.

These crypto-hijacking codes steal processing resources, take over legitimate system processes and disguise the nefarious activity with the ultimate goal of running a crypto miner on the infected devices.

Eset informed YouTube, which reportedly responded by removing all the channels that contained traces of Stantinko’s code.

Malware on Monero’s official website was stealing crypto

In November, Monero’s core development team said that the software available for download on Monero’s official website might have been compromised to steal cryptocurrency. A professional investigator going by the name of Serhack confirmed that the software distributed after the server was compromised was indeed malicious:

“I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downloaded the build yesterday around 6pm Pacific time.”

 Be warned of this trend that  is now slowly coming to Africa. 

Courtesy of https://cointelegraph.com/

NEED HELP?

We are proud to provide you with full Data Recovery Service and Malware investigation services coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
30 Nov

Cloud back up services in Kenya

Cloud back up services in Kenya

Are you looking for Cloud back up services in Kenya  or Cloud Back up Solution in Kenya ? By definition cloud backup is defined as a strategy of sending any copy of a virtual file or a physical or database to a secondary storage, all this is done to an off-site location that will help preserve in the event of an equipment failure or even a catastrophe. This is done in mind to protect data.

To explain a little bit more, this offsite location having the copy of the virtual file or the physical file which has all the database is stored to a secondary storage known as the cloud.  The process of restoring all the data through cloud computing of any information that was created, edited, managed is done remotely over the internet.

Do you know disaster can’t be planned and can strike any time?  A good example is when there is a malware attacks, ransomware attacks, system failure, power outage, floods, fire or even terrorist attacks denying your organization to access data and causes loss of the same data. If you’re organization has  subscribed to our cloud backup services, they will be able to recover their lost data the moment all the restoration functionality is activated which will rollback copies of  the files and the stored data to preferred latest choice of a valid backup performed earlier through a stable internet connection remotely.

At East African Data Handlers  depending on the type of data you have, you can select the optimal type of backup that is needed for your business; we heavily focus on any core business operations with our cost-effective, automated, reliable data storage and backup solution services that are powered by a Tier 3 data center.

To entice you more, we make sure that our data backup solution covers all and is not limited to only files and folders, backup network drives, MySQL databases, Microsoft exchange, Microsoft SQL Outlook Mail and Microsoft SQL.

Our 3 Approach to backup is either;

  • Differential backup
  • Full backup
  • Incremental backup

On a liter note, East African Data Handlers Cloud backup features are best designed in mind to have minimal intervention from our staff support as the dashboard is easy to manage hence save support cost.

Best Features for Cloud Backup Services

  • You Set it and no need to forget it: Our backup agent will do the backup process automatically the way you set your scheduled and submit accurate reports to your emails.
  • Secure and highly data encrypted End to end solution; We make sure your data is safely encrypted both during its motion and even at storage rest.
  • Compatibility merits with any Platform: Our backup agent is cross platform-independent. It can support Windows or Linux environments. You have less worries
  • Speed during deployment and data restoration: Our restoration process gets your systems in minutes to start running as a quick data recovery process. This helps to minimize the cost of downtime.
  • Surveillance is assured to be 24/7 monitoring services: Our team of experts work tireless to monitor all processes while enforcing data safety, it’s integrity and security.
  • After Sale Services and a Dedicated support system: Anytime you need disaster recovery needs done, you can count on us.

Why East African Data Handlers Cloud Back up Services?

  • It’s Safe
  • Fast
  • Simple  and Easy Scheduling Process
  • Quick and Simple Restore Process
  • Can support Group Policy

We Support : personal cloud backup, online backup comparison, , cloud backup solutions for small business, best cloud backup for mac, enterprise cloud backup and do sos online backup.

GET A QUOTE NOW:  Call +254 711 051 000

Share this
19 Nov

Data Recovery Services

Data Recovery Services

By definition a data recovery services is a service which is dedicated to the process of doing recovery of lost or any corrupted data. It entails salvaging of data that is either corrupted, damaged, inaccessible storage or failed media using the normal data methods to access and cannot be executed.

At East African Data Handlers we Offer :

  • NO Processing Fee, No Diagnosis Fee, NO Data No Charge

Our Data Recovery Service are :

Desktop Recovery
Laptop Recovery
Hard Drive Recovery
RAID Recovery
Server Recovery
Encrypted Data Recovery
Operating System Recovery
Digital Photo Recovery
Database Recovery
File Recovery
Forgotten Password Recovery
Ransomware Recovery Services
Server Recovery
Tape Recovery
Email Recovery
Mobile Phone Data Recovery Kenya
Computer Forensics Services

Some of the Causes of Data loss are.

 power loss.
 Human error.
 Logical or hardware failure.
 Natural disaster
 Viruses.

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Raid Recovery process.

What to do when experiencing Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
19 Nov

Data Recovery In Nairobi

Data Recovery In Nairobi

Are you looking for Data Recovery in Nairobi ? Are you stranded where to get this services. Do you know you can get this services at East African Data Handlers by just calling 0711 051 000 at a very affordable price.
Are you new in Nairobi? Do you know that Nairobi is Kenya’s capital city? In addition to it’s urban core, the city has Nairobi National Park, a large game reserve known for breeding endangered wild animals. It is also East Africa ICT HUB.
When talking of Data recovery services in Nairobi, East African Data Handlers is the best Company offering Data recovery Services. We Get our Cases from all over  Kenya.

Our Data Recovery Service are :

 Desktop Recovery
 Laptop Recovery
 Hard Drive Recovery
 RAID Recovery
 Server Recovery
 Encrypted Data Recovery
 Operating System Recovery
 Digital Photo Recovery
 Database Recovery
 File Recovery
 Forgotten Password Recovery
 Ransomware Recovery Services
 Server Recovery
 Tape Recovery
 Email Recovery
 Mobile Phone Data Recovery Kenya
 Computer Forensics Services

Some of the Causes of Data loss are.

 power loss.
 Human error.
 Logical or hardware failure.
 Natural disaster
 Viruses.

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Raid Recovery process.

What to do when experiencing Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
19 Nov

Kenya Data recovery

Kenya Data Recovery

What is Data recovery?

Kenya Data Recovery plays a big role in Kenya business industry to help companies resolve data disaster occurence. So, do you understand what it means to do data recovery?  Do you have lost data or have data files that are corrupted ? Are you looking for Data recovery  experts? Do you have raid drives and and  in urgent need of raid recovery?

Are you stranded looking for a reliable Data Recovery Experts company in Kenya, Dar es Salaam Tanzania , Kampala Uganda and  Kigali Rwanda? Do you know we also do  Data recovery Sudan

In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, formatted or corrupted data from secondary storage, data files or removable media, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid- state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystem, and other electronic devices.

Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevent it from being mounted by the most operating system (OS).

The most common data recovery scenario involves an operating system failure, malfunction of a storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged to another new drive. This can be easily accomplished using a live CD or DVD by booting directly from a ROM instead of the corrupted drive in question.

Many live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigate by disk partitioning and consistently storing valuable data files (or copies of them) on different partition from replaceable OS system files.

Another scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices.

Depending on the situation, solutions involve repairing the logical file system, partition or the master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery or corrupted data, hardware and software-based recovery of damaged service areas (also known as hard disk drives “firmware”), to hardware replacement on a physically damaged drive which allow for extraction of data files to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one time recovery, salvaging whatever data can be read.

The term “data recovery” is also used in the context of forensic applications, where data which has been encrypted or hidden, rather than damaged, are recovered. Sometimes data files present in the computer get encrypted or hidden due to reasons like virus attack which only be recovered by computer forensic experts.

Are you in Nairobi Kenya and Looking for recovery process by best Data Recovery Experts for services likeraid recovery,photo recovery, recovery kenya laptop recovery file recovery or have Storage media (storage devices )like flash drives , hard drive ( hard disk drives) and need to recover the data files call now East African Data Handlers.

Causes of Data loss in Kenya.

  • power loss.
  • Human error.
  • Logical or hardware failure.
  • Natural disaster
  • Viruses.

 

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the Data Loss and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Data Recovery process.

What to do when experiencing RAID Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

 

Share this
05 Nov

Data Recovery Kampala, Uganda Service

Data Recovery Kampala, Uganda Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Kampala, Uganda Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Uganda (Kampala, Nansana, Kira, Makindye/Ssabagabo, Mukono, Mbarara, Mukono, Gulu, Lugazi, Masaka, Kasese, Hoima, Lira, Mityana, Mubende, Masindi, Mbale, Jinja, Kitgum, Entebbe, Njeru ) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;
Hard Drives,
Network-Attached Storage (NAS),
Flash Drives and Solid State Drives
Mobile Phones,
Laptops,
SAS and SCSI Hard Drives,
Desktops,
Memory Cards,
Raid Systems,
Storage Area Network (SAN),
Tapes, Servers,
SAS and SCSI Hard Drives,

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Kampala, Uganda 

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
31 Oct

RAID Recovery in Kenya

RAID Recovery in Kenya

Are you looking for Raid Recovery in Uganda,  Raid Recovery in Kenya, Raid Recovery in Tanzania, Raid Recovery in Rwanda  do not struggle  East African Data Handlers we Recovers all types of corrupted RAID arrays.

Allow our Team of Experts to Recover data from corrupted RAID arrays with sophisticated tools. Our tools automatically detect the type of original RAID array that you have during RAID Recovery while allowing for fully manual operation.

Our RAID Recovery engineering team recover from all types of RAID arrays, whether hardware or software.

We Reconstruct all types of arrays just as easily as a single hard disk. Our Team of Experts know and can recognizes all imaginable configurations of various types of arrays, including RAID 0, 1, 0+1, 1+0, 1E, RAID 4, RAID 5, 50, 5EE, 5R, RAID 6, 60 and JBOD, no matter whether they are connected to a RAID server, a dedicated RAID controller or a RAID-enabled motherboard from NVidia®, Intel®, or VIA®.

Apple®, Linux® (NAS), Microsof® software RAIDs (also called Dynamic Disks) are also supported, including JBOD (span), RAID 0, 1, and 5 configurations, QNAP RAID, mdamd RAID. Product works with Adaptec®, HP®, Dell®, MegaRAID®, Silicon® RAID Controllers and DDF compatible devices. ZFS with RAIDZ are also supported. RAID Recovery™ works only under Windows but restores RAID that is running Mac OS, Unix, etc.

Step one is to detect the right type of an array

Our Team ensure they do this for vital and correct recovery process to start. They study the DiskInternals during the RAID Recovery process both manual and with the use of our fully automatic detection tools for essential parameters such as a type of array, type of RAID controller, stripe size, and disk order.

Step two is to assemble RAID configurations manually

We assemble RAID configurations manually via a simple drag-and-drop operation. Our Raid Recovery Tools re-constructs any array from the available hard disks and detects the right type and size or the array as well as the order of the disks automatically.

Special technical skills are required during this process to recover broken RAID arrays.

Our RAID Recovery Team gives our customers the best and top of the art method of Raid Data Recovery as a way to ensure all the data is recovered and the integrity maintained.

Be at peace knowing that our RAID Recovery method use advanced search algorithms to allow recovering important files such as documents, pictures, and multimedia even if there is a missing disk in the array, or if the file system is missing or damaged.

So if you are Located in Uganda we offer Uganda Raid Data Recovery.

Our stretch

 

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
08 May

Surge of MegaCortex Ransomware attacks detected

Surge of MegaCortex Ransomware attacks detected

A new strain named MegaCortex.

A cyber-security firm in the UK has reported detecting a spike in ransomware attacks at the end of last week from a new strain named MegaCortex. The firm said the MegaCortex ransomware appears to have been designed to target large enterprise networks as part of carefully planned targeted intrusions – a tactic that is known as “big-game hunting.” The modus operandi is not new and has been the preferred method of delivering ransomware for almost half a year.

MegaCortex now joins an ever-growing list of ransomware strains that cyber-criminal groups are using only in targeted attacks, rather than with spam or other mass deployment techniques. The list includes some recognizable names, such as Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga, and Matrix.

SUDDEN RISE OF ATTACKS THIS MONTH.

According to a report released late Friday night 3rd May 2019, MegaCortex was first spotted back in late January, when someone uploaded a sample on malware scanning service VirusTotal.

Since then, the number of attacks has been growing, but they spiked mid last week when the firm says it detected 47 attacks – accounting for two-thirds of all the 76 MegaCortex attacks the company has seen all year.

The firm says it blocked the attacks it detected, which originated from enterprise networks located in the United States, Canada, the Netherlands, Ireland, Italy, and France. However, other megacortex attacks might have occurred in other places where the UK antivirus vendor had no coverage.

 

 

Share this
15 May

Facebook Messenger Spam and scam is targeting its victims via a video link malware

Facebook Messenger Spam & Scam Spreading Malicious Chrome Extensions, Adware

Beware Facebook Messenger users, as cybercriminals are targeting victims by spreading malware through links sent by their friends.

The malware campaign was discovered by David Jacoby, a senior security researcher in the global research and analysis team at Kaspersky Lab, who was himself targeted after a Facebook friend with whom he rarely interacts, sent a link to a purported video file in Messenger.

After just a few minutes analyzing the message, I understood that I was just peeking at the top of this iceberg. This malware was spreading via Facebook Messenger, serving multi platform malware/adware, using tons of domains to prevent tracking, and earning clicks,” David said.

So, how does this malware spread? Apparently, the malicious message containing a bit.ly or t.cn link and the name of the user plus the word “Video” arrives through one of your friends account on Messenger to make the potential victims believe that it is a legitimate video link. When the victim clicks on the link, it will take the user to a Google Docs page that has a screenshot photo of that Facebook friend. The message is made to look like a playable movie.

But when clicked on that video, the victim is redirected to external sites depending on their browser, location and operating system that ultimately attempt to lure them into installing the malware. This malicious software, if downloaded, will cause the victim to spread the virus to their contacts on Facebook Messenger.

By doing this, it basically moves your browser through a set of websites and, using tracking cookies, monitors your activity, displays certain ads for you and even, in some cases, social engineers you to click on links,” Jacoby writes.

 

facebook_messenger_malware

For example, a Google Chrome user is redirected to a fake YouTube page with a fake error message designed to push the user in downloading a malicious Chrome extension.

Meanwhile, on Firefox, the users get directed to a website displaying a fake Flash Update notice, which attempts to run a Windows executable to deliver the adware. Since this malware is cross-platform, it affects MacOS Safari too and offers the download of a .dmg file, which is also adware.

It is unclear how the malware spreads via Messenger.

The initial spreading mechanism seems to be Facebook Messenger, but how it actually spreads via Messenger is still unknown. It may be from stolen credentials, hijacked browsers or clickjacking,” David speculated.

The people behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts,” said David.

We know that clicking on unknown links is not recommended, but through this technique they basically force you to do so.

Please make sure that you don’t click on these links, and please update your antivirus!,” added David.

When ZDNet got in touch with Facebook regarding the matter, a spokesperson for the social media giant said: “We maintain a number of automated systems to help stop harmful links and files from appearing on Facebook.

“If we suspect your computer is infected with malware, we will provide you with a free antivirus scan from our trusted partners. We share tips on how to stay secure and links to these scanners on facebook.com/help.

Source: ZDNet

Share this

© 2015  East African Data Handlers. All rights reserved.