Category Archives: Technology

Ransomware, avoid being a victim


To-date, no one knows what she did on that laptop but the Executive Director of a leading government entity under the Ministry of Finance got her computer locked up by ransomware. All her information was encrypted and she eventually had to fork out millions of shillings to regain access.

Many of us are conversant with viruses and how they affect our computers or phones. However, they are just one category of crooked software that the bad guys use to mess up technology consumers.

Ransomware is malware (malicious software) that has the tendency to block you from accessing your files or data on that electronic gadget of yours. To regain the access, it requires you to pay a ransom fee.

Ransomware has been with us for a number of years but only gained prominence recently when the largest syndicated attack was launched. WannaCry has been the most prominent ransomware to-date that has had a significant impact on global computer systems. It begun on 12th May 2017 and within hours of rolling out, over two hundred thousand (200,000) machines across multiple countries had fallen victim.

How does it work?

Once the software infects a computer, it then proceeds to communicate to a central server using the very internet access on that computer. When in contact with the server, it requests for further instructions after which encryption commences on the infected computer using the instructions obtained. When the encryption is completed on all files, a message is displayed on the screen requesting for payment to decrypt the files with a threat to destroy this information if no action is taken.

Essentially, it needs all or some of the following;

  • A data network in order to spread from one computer to the other

  • A seemingly legitimate file/document through which it can be propagated

  • Email

  • A vulnerable computer operating system

What are the tell-tale signs of Ransomware?

Ransomware manifests in some or all of the following ways;

  • Encryption of all types of data/files

  • Display of hijack message to alert you

  • Request for payment in BitCoins

  • Transfers data to the central server eg passwords and email addresses

among others.

How can I avoid becoming a victim of Ransomware?

  1. Backup: Let us face it, the damage caused by ransomware boils down to denying you access to your data. If that is the case, then having a frequently updated backup of all your computer data will mean that no amount of threats can make you yield to the demands of attackers. You can simply set up your computer afresh and restore your data from the backup.

  2. Software Updates: First of all, ensure that you are running legitimate software on your computer (avoid pirated copies especially of Operating Systems). With legit software, you need to keep updating it as per the advisory of the company that supplies the software. There is always a good reason why they come up with frequent updates.

  3. Anti-Virus: It is advised that you make the presence of a recognised anti-virus software on your computer a must. Frequent database and engine updates are crucial too, considering that the suppliers of this software are always evolving it to meet the ever changing tactics of the hackers out there. Good anti-virus software has the ability to prevent some of these fishy emails or files from accessing your computer.

  4. Be slow to trust: In real life, we are always suspicious of that stranger who approaches us with a proposition on the roadside. Why then do we drop our guard and choose to trust any email we receive promising all sorts of things to us? Hackers are using Phishing Emails a lot lately to trick users into clicking certain links that then proceed to download the malicious software onto the computer. Other avenues are malicious website adverts and apps.

If you run an organisation, this is the time for you to have a comprehensive and regular Cyber Security training programme that will ensure that your staff are always aware about the dangers lurking out there on the internet and how they can grossly affect your operations.

Scenario1: You get to office one monday morning ready to complete a key business proposals due to be submitted before the end of day only to be met by a ransom notice on all the office network computers.

Scenario2: Your accountant is misled by an email into enabling macros as he tries to open an attachment that has been sent to him. The office accounting software runs off his computer and within a few minutes, the ransom notice pops up. Invoices can’t be generated or printed, all your accounting records are inaccessible and the tax authorities are demanding some overdue reconciliations.

These scenes can be real, but you have a choice to avoid seeing them happen. Do you have a need for guidance on this and other cyber security related matters? Do not hesitate to contact me on the email given below.

Let us fight Ransomware.

James Wire is a Small Business and Technology Consultant based in Kampala, Uganda

Follow @wirejames on Twitter.

Email lunghabo [at] gmail [dot] com

Sim Card Verification exposes the joke that UCC has become


Only Dr. Stella Nyanzi in my view has the right vocabulary to effectively describe the Uganda Communications Commission (UCC) and its haphazard handling of issues.

Five years ago, the commission huffed and puffed about the need to register sim cards citing security as one of the key reasons it was being done.

mkts01px

Eng. Mutabazi being assisted during the launch of the registration exercise. Photo Credit – Daily Monitor, 2012

The Executive Director, Eng Godfrey Mutabazi is on record having said that, “In countries where SIM card registration has been taken seriously, a drop in crime especially cybercrime has been registered. We want to emulate this and see to it that such unlawful acts are done away with.”

 

Many of us supported the move and even used various fora to enlighten the general public about the importance of registration. The deadline set for 2013 passed and before we knew it another threat was issued to the telecoms companies to ensure that the process is completed in 2015. Interestingly, we were led to believe that the issue had been sorted once and for all.

To my shock, earlier this year, information from the Police begun pointing fingers at the use of unregistered simcards by criminal gangs. The UCC kept mum. Is it because the victims were largely lay men? It wasn’t until the investigations into the assassination of the Assistant Inspector General of Police, Mr. Felix Kaweesi (RIP) that the UCC was jolted out of its slumber.

With the kind of resources this institution commands, it is foolhardy for one to believe that they have a genuine reason for such a lapse in judgement. I strongly believe this is a sign of gross incompetence in the institution that is failing to offer the much needed direction for the ICT industry, preferring to concentrate on shutting down internet during election time as well as shopping for pornography tracking equipment. It seems like UCC is narrowing its attention to matters that involve procurement (this was actually intimated to me by a Member of Parliament) as they offer quick gains to the individuals involved there-in as well as satisfying the politburo’s demands. These two areas of engagement I presume form the basis for any contract renewal that the head of the institution is definitely interested in.

By failing to do the obvious, the Eng Mutabazi led outfit has slowed down the pace set by Mr. Patrick Masambu the former Executive Director of UCC who is currently the Director General of the International Telecommunications Satellite Organisation (ITSO). Despite the massive hurdles he went through to set up this institution, Mr Masambu defied all odds to leave a healthy and globally acclaimed institution in place.

The latest gaffe has been the press release by UCC that orders Telecommunication service providers to verify all SIM card subscriber details within seven (7) days starting 12th April 2017. The communique advises the public to visit the nearest authorised telecoms service centres as well as utilising the *197#.

I can only shake my head in disbelief because whoever came up with this decision at UCC is out of touch with reality. Do they think that they are managing a home? Do they realistically expect even 50% of the Ugandans to get sorted within one week? Which world are these !#%&^396$#@ living in? (Dr. Nyanzi the queen of metaphors please come to my rescue here)

Now to Eng Mutabazi and your team, do you really believe that:

  • All Ugandans are within 7 days reach of a recognised Telecoms Service Centre?

  • All Ugandans will have got the information to pursue this activity within 7 days?

  • All Ugandans will have the money and time to make it to the various centres within 7 days?

  • All Ugandans have National IDs?

  • All Ugandans are utilising their cell numbers within the boundaries of this country?

  • All Ugandans have time to repeatedly go to Telecoms service centres in a bid to repeat activities they had already engaged in?

Take the example of this guy

kaabong

Meanwhile, like you can see, he at least might be able to afford the entire exercise financially. What happens to the many that cant afford it and also reside where he is currently working? [Pointing my index finger onto my bald head saying “COMMON SENSE IS NOT COMMON”]

Meanwhile of the seven (7) days given, four of them are taken up by the Easter Holidays. For a country that is over 70% Christian, why do you think they will leave their celebrations to attend to an exercise that was caused by your incompetence?

When will you get out of this gambling nature that seems to have become a part of your operational manual? I do believe that UCC as an institution has some very brilliant minds, a number of whom are known to me personally but the way the institution is operating as a whole, makes any outsider think it is a bunch of jokers. This should be a wakeup call to the appointing authority, at this rate, the efforts to attain Middle Income status are likely to be sabotaged by an inefficient Communication and Technology Sector whose regulatory agency seems to be operating in a reactive rather than proactive manner.

This seven day deadline is simply a poorly thought through decision that only serves to lay bare the incompetence of the institution we are meant to look upto for guidance. Could it be time for a total purge?

Let me go pick my orange tree seedlings and plant before the rains cease. I think I have had enough of this circus.

James Wire is a Small Business and Technology Consultant based in Kampala, Uganda

Follow @wirejames on Twitter.

Email lunghabo [at] gmail [dot] com

Other Articles of Interest: