Old malware still poses a serious risk to EMRs

Computer technology firm Symantec is warning consumers that an infamous trojan virus still targets healthcare data across the United States and around the world. This infamous piece of malware hides among image files downloaded with pirated software. Read on to learn more about the Stegoloader infection, how it might target your business, and what you can do to keep it at bay.

What is Stegoloader?

The trojan known as Stegoloader infects machines through product key generators packaged with downloads of pirated software. Small companies have been targeted by the malware, particularly those in the healthcare industry — and to a lesser extent, the insurance and technology sector.

Steganography is a cyber attacker term for hiding malware inside an image file. Once the image is opened on a vulnerable machine, the program gathers information and crawls through the network looking for weaknesses. Although Stegoloader doesn’t appear to be a particularly sophisticated program, it can devastate your business by stealing electronic medical records as well as installing a secondary piece of malware to pilfer banking information.

Anthem and Premera Blue Cross are two big-name victims of the widespread malware. Symantec believes that Stegoloader’s creators plan to sell healthcare data because they’re more lucrative than other information types. Symantec also believes the cyber attackers are opportunistic, taking advantage of companies that download pirated versions of popular software.

How to Avoid becoming infected by Stegloader

Because the Stegoloader trojan often lurks in illegal product key generators and illegitimate software, the best way to avoid infection is to stay away from sites that offer pirated software. Other than that, we recommend educating your employees on safe practices, avoiding unknown image files and quarantined backups, and updating operating system and antivirus software as often as possible.

When business owners download pirated software, they’re trying to cut corners to save money on business applications and technology consultants. But not only are they getting themselves in trouble with cyber attackers, they’re also messing with the law. We promise that partnering with us will end up saving you more money and hassle than the alternatives. If you’re looking for a better way to protect your company and keep your information safe, contact us today.

ron.pierce

Recent Posts

Small Business Cybersecurity: Protect Your Business Like a Pro

Imagine this... You wake up, grab your morning coffee, and check your email. There’s a…

4 days ago

How to Set Up Parental Controls on Your Devices

As children spend more time on devices, ensuring their online safety becomes vital. Parental controls…

6 days ago

The Ultimate Guide for CPAs: Choosing the Right Accounting Practice Software for Your Office

  Are You Making the Right Choice for Your CPA Firm? When was the last…

2 weeks ago

Implementing Screen Time Management Solutions in the Workplace

In today’s digital-first world, screen time is an unavoidable aspect of the modern workplace. Employees…

2 weeks ago

Simple Ways to Limit Screen Time for Your Family

Spending too much time in front of screens can affect how we feel and interact…

2 weeks ago

Preventing Email Phishing Attacks for Small Businesses: Essential Strategies

Every day, people receive emails pretending to be from trusted sources only to discover they…

3 weeks ago