{"id":40842,"date":"2020-05-15T18:44:09","date_gmt":"2020-05-15T14:44:09","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=40842"},"modified":"2020-05-15T19:42:20","modified_gmt":"2020-05-15T15:42:20","slug":"news-you-mightve-missed-11-15-may","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-11-15-may\/","title":{"rendered":"News You Might&#8217;ve Missed. 11 &#8211; 15 May"},"content":{"rendered":"<p>What's new this week in the news for MSPs?<\/p>\n<p>AWS Launches Kendra; New Office 365 Feature Blocks Email Storms; Amazon Now Calls JEDI Microsoft Contract Fatally Flawed; Google Cloud VMware Engine Rolled Out; Texas Courts Hit by Ransomware; Thunderbolt Exploit Gives Hackers Access to Locked PCs; Ramsay Malware Steals Files from Secured Air-Gapped Computers; and Microsoft Warning on COVID-19 Phishing Malware. Let's see what's going on.<\/p>\n<p><!--more--><\/p>\n<h2>AWS Launches Kendra Search Platform<\/h2>\n<p>Amazon Web Services, Inc. announced <a href=\"https:\/\/press.aboutamazon.com\/news-releases\/news-release-details\/aws-announces-general-availability-amazon-kendra\" target=\"_blank\" rel=\"noopener noreferrer\">the launch and availability of Amazon Kendra<\/a>, a managed search program for enterprises that will help their employees navigate internal data repositories. AWS first previewed Kendra at their re:Invent conference last December.<\/p>\n<p>Kendra employs a search bar where employees can input natural-language queries to locate the data needed for their work. On the occasion of this announcement, AWS also revealed the expansion of the number of systems it can sort through when compiling search results. Kendra now provides connectors for Salesforce, ServiceNow, and Microsoft Corp.'s OneDrive cloud storage service.<\/p>\n<p>AWS has also improved the platform's vocabulary by adding domain-specific terms across eight new industries, including HR, legal, media, automotive, and health, along with entertainment, news, telecommunications, and travel and leisure.<\/p>\n<p>Most of AWS\u2019s competitors offer their own managed search platforms.<\/p>\n<h2>Microsoft Launches New Office 365 Feature to Block Email Storms<\/h2>\n<p>A new feature in Office 365 has just been rolled out by Microsoft Corp. This feature is designed to block the email storms that occur when users hit \u201creply all\u201d to large email distribution lists.<\/p>\n<p>The Reply All Storm Protection feature <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/reply-all-storm-protection-in-exchange-online\/ba-p\/1369811\" target=\"_blank\" rel=\"noopener noreferrer\">was explained<\/a> by the Exchange team in a blog post last week. It will mostly benefit large organizations that have extensive distribution lists.<\/p>\n<p>When a reply in an email storm is detected as taking place, the feature will block subsequent attempts to \u201creply all\u201d to the thread, and return a non-delivery receipt to the sender.<\/p>\n<h2>Amazon Now Calls JEDI Microsoft Contract Fatally Flawed<\/h2>\n<p>Amazon Web Services, Inc. has stepped up its protest over the Joint Enterprise Defense Infrastructure (JEDI) cloud contract award with an increasingly sharp war of words and legal maneuvers. Most recently, it has asked the U.S. Department of Defense for more clarity around corrective action it has proposed taking. Also, they filed a second and concurrent bid protest directly with the Department of Defense on Monday.<\/p>\n<p>While the objection hasn't been declared publicly, in a new <a href=\"https:\/\/aws.amazon.com\/blogs\/publicsector\/setting-the-record-straight-on-jedi\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a>, Amazon.com, Inc.'s communications chief said the award is \"fatally flawed on all six of the technical evaluation factors\u201d.<\/p>\n<p>Amazon's protest is in response to a federal court judge's decision to grant the DOD a 120-day remand to \"reconsider the aspects of the procurement challenged in Amazon's protest of the JEDI contract.\" However, the judge only included a single evaluation factor, whereas Amazon is saying that all of the evaluation factors need to be reviewed.<\/p>\n<h2>Google Cloud VMware Engine Rolled Out<\/h2>\n<p>The <a href=\"https:\/\/cloud.google.com\/vmware\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud VMware Engine service<\/a> is finally out of the box. Google LLC announced the rollout this week. It will make it simple for customers to run their on-site VMware applications on their company's public cloud infrastructure.<\/p>\n<p>Google Cloud general manager June Yang's recent blog post in which she introduced the service stated that VMware is the foundation of a number of its customers' information technology environments. Also, she declared that many of them were waiting to move their workloads to the cloud, where additional resources are easily added on to their existing infrastructure.<\/p>\n<p>Since this service is entirely managed, customers won't need to worry about the operational burden of running VMware apps on Google Cloud.<\/p>\n<h2>Ransomware Attack Targets Texas Courts<\/h2>\n<p>Late last week, websites belonging to Texas courts were shut down in response to a ransomware attack. On Monday, the Office of Court Administration for Texas <a href=\"https:\/\/81db691e-8a8c-4e25-add9-60f4845e34f7.filesusr.com\/ugd\/64fb99_edbeef2ac65640bda6512e501f859f66.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">released a statement<\/a> to the effect that the ransomware attack had been detected on Friday, May 8. They described the attack as having occurred in the \"overnight hours\".<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">ON-DEMAND WEBINAR<\/div>\n<div class=\"call-to-action__title\">Ransomware: Prevent or Recover<\/div>\n<div class=\"call-to-action__text\">Watch the webinar and prepare yourself and your customers with the right approach and the right tools<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" data-portal=\"5442029\" data-id=\"dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><span class=\"hs-cta-node hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" id=\"hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Ransomware_-Prevent-or-Recover-1.png\" alt=\"Webinar icon\" \/><\/div>\n<\/div>\n<p id=\"last\">According to Law.com, the Texas Supreme Court is among the Texas court sites affected by the ransomware attack. The court has shifted to releasing orders and opinions on Twitter until its website is restored.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<h2>Thunderbolt Exploit Allows Hackers to Break into Locked Computers<\/h2>\n<p>PCs using a Thunderbolt port made before 2019 are at risk. An <a href=\"https:\/\/siliconangle.com\/2020\/05\/11\/unpatchable-exploit-thunderbolt-allows-hackers-break-locked-pcs\/\" target=\"_blank\" rel=\"noopener noreferrer\">unpatchable exploit<\/a> in these devices has made them vulnerable to use by hackers in order to break into locked machines. The exploit, called Thunderspy, was publicly detailed on Sunday.<\/p>\n<p>According to the information released, it affects all Windows and Linux computers with Thunderbolt ports that were made before 2019. It also poses a risk, although a much more limited one, to Apple Inc.'s Macs.<\/p>\n<p>The attack uses an SPI programmer, a small device for configuring chips such as flash drives, that allows it to manipulate a Thunderbolt connector's controller chip and disable its security features.<\/p>\n<p>Since Thunderspy requires physical access to a machine, as well as a considerable amount of technical know-how, to be able to exploit it, it is unlikely to pose a risk to the vast majority of users.<\/p>\n<blockquote><p>Learn about common ransomware attack scenarios and what to do if one of these attacks affects your clients:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">Ransomware Attack Scenarios<\/a><\/p>\n<h2><\/h2>\n<\/blockquote>\n<h2>Ramsay Malware Steals Files from Secured Air-Gapped Computers<\/h2>\n<p>Researchers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-ramsay-malware-steals-files-from-air-gapped-computers\/\" target=\"_blank\" rel=\"noopener noreferrer\">have discovered a few samples<\/a> of a new type of malware that they have named Ramsay. It can take private files from systems isolated from the Internet, and there are already a few known victims to date.<\/p>\n<p>It gets on a victim's computer through an infected RTF file and then scans network and removable drive shares for PDF files, Word documents, and ZIP archives. ESET malware researcher Ignacio Sanmillan believes there is sufficient evidence to show that the Ramsay framework is still being developed and that the delivery vectors are yet to be refined.<br \/>\nRamsay's primary purpose is to take files from a compromised host.<\/p>\n<p>All variants reviewed by ESET collect all Microsoft Word documents on the target computer; newer ones will also search for PDF files and ZIP\u200c archives on network drives and removable drives.<\/p>\n<p>ESET researchers believe that the malefactor behind Ramsay has knowledge of the victim's environment and is developing attack vectors that would preserve resources.<\/p>\n<h2>Microsoft Warning on COVID-19 Phishing Malware<\/h2>\n<p>Microsoft has found a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-warns-of-covid-19-phishing-spreading-info-stealing-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">new COVID-19-themed phishing campaign<\/a>. The LokiBot information-stealing trojan, which uses economic concerns to target its victims, was found by using algorithms from Microsoft Threat Protection's machine learning.<\/p>\n<blockquote><p>Check our <a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\">anti-phishing<\/a> guide to learn more about phishing and how to stay protected.<\/p><\/blockquote>\n<p>After infecting a system, LokiBot will keep saved log-in credentials from a variety of browsers, mail, FTP, and terminal programs. It then sends them back to the attackers' servers, where they can later be retrieved.<\/p>\n<p>According to Microsoft, the new phishing campaigns use COVID-19 lures to trick recipients into opening infected attachments. Two of the sample emails seen use ARJ files with executables disguised as PDFs. Some anti-malware scanners skip these types of files.<\/p>\n<p>Microsoft customers using Windows Defender and Office 365 are protected automatically.<\/p>\n<h2>That's a Wrap<\/h2>\n<p>That's the news in summary for MSPs this week. I hope it has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? AWS Launches Kendra; New Office 365 Feature Blocks Email Storms; Amazon Now Calls JEDI Microsoft Contract Fatally Flawed; Google Cloud VMware Engine Rolled Out; Texas Courts Hit by Ransomware; Thunderbolt Exploit Gives Hackers Access to Locked PCs; Ramsay Malware Steals Files from Secured Air-Gapped Computers; and [&hellip;]<\/p>\n","protected":false},"author":84,"featured_media":40844,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-40842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=40842"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40842\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/40844"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=40842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=40842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=40842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}