Saturday, 29 April 2017

AUD/USD 1st MAY 2017 Forex Monthly Report

AUD/USD PRIMARY & Weekly Cycles

AUD isn't looking robust coming into the start of MAY.

Where there was initial support around the Quarterly levels @ .74.91 for the first 2 weeks of April, it has failed to move higher and now has closed below that level at the end of the month.

The key level on the AUD is .7491

Short-term is looks like it's moving down into the MAY lows, which is a random support level, simply because if it breaks that level it's going to follow a 2-month wave pattern down into the June lows

Thursday, 27 April 2017

Guest Posting - Updated List April 2017

Guest blogging is a method used by bloggers to increase blog traffic where bloggers write posts to be published on other bloggers' blogs. Guest posts and guest posting is where a writer who owns his or her own blog creates a unique and original post on another blog or site with a mention of the author and usually their blog at the bottom of the article. Guest posting can help build brand awareness with a different audience and help drive new traffic to your site.

Guest blogging is also a great way to establish yourself as an authority figure within your market and build relationships with other bloggers and experts within your field. It's an opportunity to take your expertise and share it with others, as well as an opportunity to increase traffic to both parties’ blogs. Since guest blogging should be a two-way street, when hopping on the bandwagon, you should also consider featuring posts developed by guest bloggers. Featuring guest posts will also expose your audience to a new perspective and fresh new content.


You may feel free to ask me any question anytime. Our services are perfectly customized to your Marketing Demand and needs. 


SEORapidly
Skype: SEORapidly

Sunday, 23 April 2017

Ransomware, fala sério!


Recently, a user contacted me in regards to what looks like a new, Brazilian ransomware. In this blog post, we're taking a quick look at the ransom and how to unlock or decrypt your files.

TL;DR: to unlock your files, you can use the key or password: 123
Para desbloquear seus arquivos, você pode usar a chave ou a senha: 123

The title of this blog loosely translates to: ransomware, no way! (excuse my Portuguese)

The ransomware appears to call itself 'Sem Solução'; which translates to 'Hopeless' or 'No Solution'. I propose we call it 'Hopeless ransomware':


Figure 1 - 'Seus arquivos foram criptografados'

Sua IDNão a formas de recuperar sem comprar a senha, ser tenta eu apago tudo!O método de pagamento é via Bitcoins.  O preço é: 600,00 REAIS =  Bitcoins
Não tem Bitcoins?, pesquise no google e aprenda comprar ou clique em Compra Bitcoinsenvie os bitcoins para: 1LULpQbdvoAWqKzhe8fuMiPQ8iGdW36pk1Para receber a senha, voce precisa criar uma e-mail em https://mail.protonmail.comE enviar SUA ID para 785910@protonmail.com em 24h ou mais voce receberá a sua senha!, Obrigado..

Translated:

Your IDNot the ways to recover without buying the password, be try I delete everything!The method of payment is via Bitcoins. The price is: 600,00 REAIS = Bitcoins
Do not have Bitcoins ?, search google and learn how to buy or click Buy BitcoinsSend the bitcoins to: 1LULpQbdvoAWqKzhe8fuMiPQ8iGdW36pk1To receive the password, you need to create an email at https://mail.protonmail.comAnd send YOUR ID to 785910@protonmail.com in 24h or more you will receive your password !, Thank you ..

The price is 600 REAIS (Brazilian Real), which currently amounts to 0.15 BTC.
(176 EUR | 155 GBP | 199 USD)

Interestingly enough, the ransomware has a built-in function to detect whether or not your machine belongs to a domain, and if so, will increase the amount of ransom to be paid to a whopping 1000 REAIS, or 0.25 BTC. (293 EUR | 259 GBP | 333 USD)


Figure 2 - Func _get_bitcoin_value()


The ransomware author or authors is/are definitely not kidding: if you enter a wrong password, the ransom will start deleting files.

Figure 3 - 'Error!", "Senha de descriptografia errada, NA PROXIMA 500 ARQUIVOS SERÃO EXCLUIDOS!'


Files to encrypt, including those used in virtualization software such as VMware for example:

zip, 7z, rar, pdf, doc, docx, xls, xlsx, pptx, pub, one, vsdx, accdb, asd, xlsb, mdb, snp, wbk, ppt, psd, ai, odt, ods, odp, odm, , , odc, odb, docm, wps, xlsm, xlk, pptm, pst, dwg, dxf, dxg, wpd, rtf, wb2, mdf, dbf, pdd, eps, indd, cdr, dng, 3fr, arw, srf, sr2, bay, crw, cr2, dcr, kdc, erf, mef, mrw, nef, nrw, orf, raf, raw, rwl, rw2, r3d, ptx, pef, srw, x3f, der, cer, crt, pem, pfx, p12, p7b, p7c, abw, til, aif, arc, as, asc, asf, ashdisc, asm, asp, aspx, asx, aup, avi, bbb, bdb, bibtex, bkf, bmp, bpn, btd, bz2, c, cdi, himmel, cert, cfm, cgi, cpio, cpp, csr, cue, dds, dem, dmg, dsb, eddx, edoc, eml, emlx, EPS, epub, fdf, ffu, flv, gam, gcode, gho, gpx, gz, h, hbk, hdd, hds, hpp, ics, idml, iff, img, ipd, iso, isz, iwa, j2k, jp2, jpf, jpm, jpx, jsp, jspa, jspx, jst, key, keynote, kml, kmz, lic, lwp, lzma, M3U, M4A, m4v, max, mbox, md2, mdbackup, mddata, mdinfo, mds, mid, mov, mp3, mp4, mpa, mpb, mpeg, mpg, mpj, mpp, msg, mso, nba, nbf, nbi, nbu, nbz, nco, nes, note, nrg, nri, afsnit, ogg, ova, ovf, oxps, p2i, p65, p7, pages, pct, PEM, phtm, phtml, php, php3, php4, php5, phps, phpx, phpxx, pl, plist, pmd, pmx, ppdf, pps, ppsm, ppsx, ps, PSD, pspimage, pvm, qcn, qcow, qcow2, qt, ra, rm, rtf, s, sbf, set, skb, slf, sme, smm, spb, sql, srt, ssc, ssi, stg, stl, svg, swf, sxw, syncdb, tager, tc, tex, tga, thm, tif, tiff, toast, torrent, txt, vbk, vcard, vcd, vcf, vdi, vfs4, vhd, vhdx, vmdk, vob, wbverify, wav, webm, wmb, wpb, WPS, xdw, xlr, XLSX, xz, yuv, zipx, jpg, jpeg, png, bmp

Additionally, Steam users aren't spared of getting their files encrypted either:

Figure 4 - Executable files in Steam's games directory will be encrypted

In reality, it appears all files are encrypted, regardless of extension.

The ransomware ultimately calls home and leverages Pastebin to do so. However, when analysing the ransomware, none of the Pastebin links were online as they had been removed.

$data = "pcname=" & @ComputerName & "&hwid=" & $key & "&version=Locker"

At time of writing, no payments have been made as of yet to the Bitcoin address:
1LULpQbdvoAWqKzhe8fuMiPQ8iGdW36pk1

The ransomware encrypts files prepending the original extension with '.encrypted.'. For example;
image.png would become: image.encrypted.png

The ransomware is based on CryptoWire, an open-sourced ransomware written in AutoIT.


Decryption

To unlock your files, you can use the key or password: 123
Para desbloquear seus arquivos, você pode usar a chave ou a senha: 123

Note: as always, prevention is more important than decryption or disinfection! Have a look at the dedicated page I've set up here.


Conclusion

While ransomware is anything but uncommon, ransomware very likely stemming from Brazil and specifically targeting Brazilian users and businesses, is a less frequent occurence. In fact, the only notable example, as far as I know, is TeamXRat also known as Xpan ransomware.

Below you may find IOCs.

IOCs





Thursday, 6 April 2017

Your New Google Password is your Phone

Yes its true ! Now you can use your Android Smart Phone to get access you your google account on any other device. Benefit of this feature is that you don't need to type your password every time you want to login into your google account from any other device. It makes your account more secure as nobody can track your password, even if the device you are using is not so secure.


How to activate Google Account Password as your Phone ?
Go to accounts.google.com from a secure device. It will ask you for your password. Now go to "Signing in to Google" section. Here you will find the option to turn on this feature.

Once you click to activate this feature, it will do certain checks, such as finding your android phone which is using the same google account and checking if the screen lock is enabled or not. If your screen lock in not enabled then it will ask you to do so, to make your account secure.

After completing a few steps this feature will be turned on.

What if my phone is not handy ?
In such case you will have the option to enter the password and access the account.

What if my phone is lost and somebody else tries to access my google account ?
To save you from such a hack, google checks if your screen lock is enabled before turning on this feature. If your phone is lost and in a locked condition then its secure. However you can easily track your phone or disable google account in that phone by simply accessing the account.google.com page from any other device. You can also erase the sensitive data from your phone using this service.

Every technology have its own benefits and drawbacks. But bestrix.blogspot.com found this feature quite safe and makes your google account more secure.

Get Backlinks From CNN, HuffingtonPost, NYTimes, or Fox News

Have you ever thought about how to increase your visits, and make strong damage to your competitors quickly?

I will give you 301 Url Redirect from interior pages of the following site:

CNN, 
FDA,
Times Magazine
Fox News
INC, 
Huffington Post, 
Entrepreneur, 
NY Times,
Los Angles Times
.........

Please note that I do not post new articles. I use their dead links on the current pages and make them live to point to your website.

You cannot choose the keywords because the articles are already on the website and posted. Also, I will not write or post new articles in such mentioned sites because the are very costly. In return, you will get reputation and improvement in Google.

Each may last anywhere from 6 months to 3 or 4 years. It all depends if the site gets updated or not.
For the basic gig, you will only Receive one link from the mentioned sites listed above.

So what are you waiting for? Rank in few weeks.

You can also send me the website you want to point to your website and I tell you if it is possible to get a backlink from them or not.

Please feel free to contact me if you have any question.

Best regards,