Tag Archives

Be aware of AutoCAD malware

AutoCADAutoCAD is a high end CAD (Computer-Aided Design) vector based drawing application intended for engineer purposes.

The malware coders have created something which at first look appears to be part of the program. There are substantial amount of users operating with non-current versions, and more than likely, vulnerable versions of AutoCAD. Security researchers have discovered AutoCAD malware that opens up compromised machines to secondary exploits.




ACM/SHENZ-A is a legitimate component of AutoCAD software for computer-aided design (CAD). Security researchers Trend Micro have revealed that malicious file opens up systems to exploits, especially those targeting old vulnerabilities. Once this malicious file is ingrained, ACM_SHENZ.A get hold of all the administrative rights which make it easy to access and create network share for all drives. It also additional malware to be plated such as the FAS carrier of this deadly malware. It’s deadly in a sense that the users will not consider a file with .FA extension unusual and just ignore it.

According to Trend Micro, “It appears to be a legitimate AutoCAD component with a .FAS extension, but on analysis it actually opens up systems to exploits, specifically those targeting old vulnerabilities.”

Trend Micro engineers mirrored ESET experts’ sentiment that “being rare” is an advantage afforded AutoCAD malware: “Historically, AutoCAD malware is very rare, although not completely unheard of.”

Besides, the malware also opens the ports 137, 138, 139, and 445. This ultimately allows access to files, printers and serial ports.

“By opening the ports, exploits that target SMB can successfully run on affected systems, provided that the relevant vulnerabilities have not yet been patched,” explains Anthony Joe Melgarejo, a threat response engineer at Trend Micro, in a blog post about the attack. “Security bulletins that cover the SMB vulnerabilities include MS10-020 and MS11-043.”

“The decision to create an account with administrator privilege is a strategic one.  Without the said account, the attacker will have to crack passwords for existing accounts or remotely create one — processes that can be difficult and time-consuming. With the admin account, the attacker can easily steal all the files in those drives and plant other information-stealing malware.”




Security researchers revealed this another AutoCAD malware ACAD/Medre.A as a worm which was programmed to send AutoCAD drawings via email to an account in China.

The experts at ESET said, “ACAD/Medre.A is a serious example of suspected industrial espionage. Every new design created by a victim is sent automatically to the authors of this malware. Needless to say this can cost the legitimate owner of the intellectual property a lot of money as the cyber criminals could have designs before they even go into production by the original designer.”



Though AutoCAD malware is scarce, the big companies who spend lots of time and money in design should be very aware of this malware so that their designs are not stolen and patented by others. Moreover, engineering departments need to be aware since CAD drawings are now a valid attack vector. And of course, you should not ignore the .FAS extension.



Setting up parental controls on all of your gadgets

Parental Controls
These days, many of the electronic devices have parental control which is very beneficial if you have kids who use your laptops, Smartphone and other devices time and again. Setting up parental controls helps in restricting adult content, accidental shopping etc. to your children.

If you are wondering how it could be possible then here we are to help you out. Below is a helpful guide on how to set parental control over various Operating System (OS) and gaming systems.


For handling the user access control, Windows relies on Microsoft’s Family Safety Website where you are able to set separate account for your every child, limit their access to risky websites; limit the amount of time they spend on games etc. For this, you’ll have to:

  • Download Windows Live Family Safety and install
  • Go to control Panel -> Family Safety -> Manage settings on the Family Safety Website
  • Login to the family safety account using your Windows credentials and select which account you want to control. Set individual accounts per child as required.
  • You can then set the permissions for each child by clicking on Edit Settings under each of their name.


For setting parental control in Android, the device will need to run Jelly Bean version 4.3. You can then:

  • Open settings of your device -> click Add User -> Select Restricted Profile
  • Tap the settings icon next to New profile to name the account. And select which apps will be available to it and which are to be restricted.


In iOS, you do the following to can set the parental control:

  • Open Settings -> general -> Restrictions
  • Enable restriction and set an access password that only you know
  • You can see list of available apps below the Enable Restriction button. Now you can set which of them will require your password and set accordingly.
  • The subsequent sections allow you to set limits on in-app purchase, allowed content etc.

Xbox One


Setting up parental control in Xbox One is somehow similar to windows.

  • Sign in to your console
  • On your controller, press the Menu button -> select Settings
  • Scroll right to family, then select the child profile that you want to control and set permissions for restricted activities. You can also set specific permissions for each section by selecting Use, but customize.

Playstation 4

For setting parental control in Playstation 4, you should:

  • Login to your Master Account and the password should be protected
  • Go to Settings -> Parental controls
  • You can then set an individual account for each kid under Settings -> Parental Controls -> Manage Sub Accounts and manage the restriction
  • The restriction could be games, apps, movies, web browser, video chats etc. You can also set time limits in Playstation Store and restrict user generated content.

So, now you know how to set parental control on your electronic devices, you do not need to worry about your children playing with your phones. Your phone is smart, the world is smart and so must be your technology. Use it to fullest!




The increasing threat of Ransomware

What is Ransomware?

Among several kinds of malicious software, ransomware is one kind of such software that criminals install on your computer purposely so that they can lock it from a remote location. Many of you might have noticed this message: “This operating system has been locked for security reasons.”  This is a type of ransomware attack. It then demands payment before you can access your files or programs.

There are various forms of ransomware malware. Cryptolocker is one of the most vicious forms. As the name suggests, it encrypts all your files and locks you out.  The encryption key is withheld by the hackers themselves and the level of RSA encryption makes it impossible to crack.


How does Ransomware get installed?

Ransomware gets installed on your personal computer via opening a malicious email attachment or clicking a malicious link in an email or social networking sites etc. You can also be the victim of ransomware when you visit a malicious website.

Rising attack of Ramsomware

Ransomware that locked a screen and demanded payment was first found in Russia in 2009. According to Norton by Symantec, from last three years it has been observed that there have been a huge number of professional cyber gangs using ransomware which has led to multiple troubles such as:

  • Disabling the devices and designing it in a way that only by paying would make it functional again, leading consumers to pay the ransom.
  • Irritating people by tracking which country they live and messaging them in local language with a logo of a local public authority
  • Changing the codes of malware to get past security software and one of the most serious variants was detected 500,000 times in 18days.

How to prevent your computer from Ransomware?

  • Make sure all the software installed on your computer is up to date. This includes operating system, browser and all of the plug-ins that a modern browser typically uses.
  • Automatic updating should always be turned on in order to get all the latest Microsoft security updates.
  • Turn on your firewalls.
  • Scan your computer daily.
  • Do not click on the spam email links or links on suspicious websites.
  • Use reputed antivirus and anti-malware programs.
  • You should have a backup strategy that is capable of strong Recovery Point Objectives (RPO) because more strong your RPO, less if the chance of data loss.
  • Since cryptolocker needs admin rights for its processing, locking down your admin rights will minimize the risk of being attacked.

Furthermore, to detect and remove ransomware and other malicious software that might be installed on your computer, you should run a full system scan with an appropriate and up-to-date security solution. Here are some lists of Microsoft’s product that can help you to detect and remove this threat:

  • Windows Defender
  • Microsoft Security Essentials
  • Microsoft Safety Scanner
  • Windows Defender Offline

So now you know some preventive methods to stay clear from ransomware, aren’t you going to apply it? Stay safe and make safe environments with your computers. If you have any queries regarding ransomware then contact us at or simply dial at 020 8293 0100. We are just a call away from you.

“Wavehill are a friendly team always on hand to help us with any problems that arise. They are quick to respond and nothing is too much trouble for them. We have worked with them for several years now and will continue to do so.”

Hydi – Manager, Sector – Marketing

Maximizer Awards

Companies that use Maximizer CRM


Get in touch with us: Call us 020 8293 0100
How can we help?


Phone: 020 8293 0100

Email: /