RSS Feed
News
Jun
30
Nexus - Security Notification - Petya/ WannaCry Ransomware
Posted by Muslim KHAN on 30 June 2017 07:49 AM

Dear Customers,

Being your hosting provider, we feel that this news might be of importance for you due to the nature of the exploit.

As widely reported, hackers launched a global ransomware campaign Friday, May 12, known as “WannaCry Ransomware". Targeting tens of thousands of companies and governmental organizations, this campaign encrypted files on infected computers and asked computer administrators to pay a ransom in order to regain access. The Petya variant is also targeting Microsoft Windows operating systems, and reports show all systems from XP – Windows 10 are susceptible to the attack.

This particular ransomware exploited a vulnerability that allows remote code execution via the Microsoft Server Message Block (SMBv1) server. Microsoft has released a security update that addresses this vulnerability, and we have been working diligently to make sure all internal systems have had this vulnerability addressed.

Scope of this attack is not limited to the web servers only, desktop users shall also be very careful by clicking on any external hyperlink or attachment even from trusted sources, beacuase links and attachments may seem legitimate apparently. Keep your systems and AV upto date, and thoroughly scan your systems with a licensed AV application.  
For those who are looking to protect themselves more, follow the recommendations outlined below.
Protection Recommendations :
•    Install Microsoft security patches that eliminate the vulnerability exploited by WannaCry.
•    You may ask our IT security team to back up critical data, so  that even if data is locked up, there are copies elsewhere, to which we can turn.
•    If they have not done so already, IT security teams should deploy antivirus and malware signatures associated with the threat.
However, the hackers may reconfigure their assault around this ‘kill switch’ with new phishing emails to come in the days ahead.


Technical Details:
=================================================================================================================

There were hundred of thousands of devices/ systems been compromised via the same malware in the recent times. Ransomware is spreading across many organizations around the globe halting different business functions. Following patches should have been deployed on the system in order to secure the Windows system from this attack.

1- MS17-010 (ETERNALBLUE and DOUBLEPULSAR)
Microsoft has also released patches for end of life Windows systems under KB4012598. And Filter all SMB (TCP/445), NetBIOS (TCP/139), and RDP (TCP/3389)

The campaign uses an exploit for a recent SMB protocol vulnerability in Microsoft Windows [1,2, 3, 7]. According to [7], the ransomware perpetrators incorporated publicly-available exploit
code for the patched SMB EternalBlue vulnerability, CVE-2017-0145, which can be triggered by sending a specially crafted packet to a targeted SMB server. It spreads initially through vulnerable computers exposing port '445' on the Internet, and then using the same technique propagating through the internal network.

=================================================================================================================


Please direct any questions or issues to Nexus Technologies’ customer service at support@nexus.pk, UAN: 0300-0341140 .

Thanks,


Read more »



Jun
30
Nexus - Security Notification - Linux Kernel Vulnerability
Posted by Muslim KHAN on 30 June 2017 07:47 AM

Dear Customer,

This notice is to inform you that a vulnerability have been detected in Linux Kernel: Linux Kernel Stack Clash Vulnerability CVE-2017-1000364.

Being your hosting provider, we feel that this news might be of importance for you due to the nature of the exploit. If your server has a management plan, our system administrator team will perform the security update for you and reboot the server whenever it’s convenient for you.

For further information about this vulnerability, please visit the following link:

Linux Kernel Stack Clash Vulnerability CVE-2017-1000364:
https://www.cyberciti.biz/faq/howto-patch-linux-kernel-stack-clash-vulnerability-cve-2017-1000364/

Please direct any questions or issues to Nexus Technologies’ customer service at support@nexus.pk, UAN: 0300-0341140 .

Thank you,


Read more »



Jun
5
Announcement: Ramadan Mubarak Promotional Sales Offer
Posted by Samiya Tariq on 05 June 2017 01:14 PM

Dear Valued Customer,

 

Nexus is offering special discount on All Products & Services in the Blessed month of Ramadan w.e.f 7th June' 2017.

Activated Promotional Codes are as follows:

               

Products/Services

Percentage

Promotional Code

All .com Domains

10 %

GWKQ3X5XBG

All PK Domains

20 %

NLH9H8K5J2

All SSL Certificates

10 %

VO48E0D2RX

All Business Hosting Packages Pakistan/International Based

10 %

WDEA8TA5I5

Web Development Packages (Premium, Ecommerce, Enterprise)

Upto 20 %

17URN2M8AG

 

Terms & Conditions:

  • Nexus Reserves the right to cancel the Campaign at any time
  • Order processing time for PK domain may vary from 24 - 36 hours, depending on registration requests
  • Discount Applies for PK (International) Domains but Custom Invoice will be generated as per their rates
  • Discount offer Valid till 30 June' 2017
  • All Polices applies & for details please visit our website www.nexus.pk/promotions.php

Thank you!

Regards,

Nexus Technologies

UAN: 0300-0341140 or 0800-10100

www.nexus.pk

 


Read more »



Apr
20
Notice : Payment Mode for Web Development Projects
Posted by Samiya Tariq on 20 April 2017 08:29 AM

Dear All,

Now onwards, all payment related to Web Development Projects must be done online through below mentioned bank ONLY.

UBL Account Details are as follows:

• Account Title: Nexus Technologies
• Account Number: 233069571
• Branch Code: 1092
• Bank: United Bank Limited ( UBL )
• Branch Address: F10 Markaz Branch Islamabad
• Swift Code: UNILPKKA0741
• IBAN: PK38UNIL0109000233069571

Please Note: Scanned Copy of Deposit Slip is required to be sent via email to dev@nexus.pk.

For any queries, please contact 0300-0341140, Ext 4 (Development)

Regards,
Development Team
Nexus Technologies


Read more »



Apr
4
Announcement: Revised Timing for Order processing of All .pk Domains
Posted by Samiya Tariq on 04 April 2017 11:53 AM

Dear All,

We would like to inform you that from now onwards, all .pk domain orders are also available after 5:00 pm on daily basis.

Orders received after 5:00 pm will be proceeded next day.

For any queries, please contact on your UAN numbers: 0300-0341140 or 0800-10100.

Regards,

Nexus Technologies

www.nexus.pk

 


Read more »



Mar
7
Notice: Nexus Technologies Liability Declaration
Posted by Samiya Tariq on 07 March 2017 08:03 AM

Dear Valued Customers, 

It is being informed that M/S Nexus Technologies operating its business through SIX (6) offices (currently) in Pakistan with details mentioned clearly on our official website www.nexus.pk

All of the correspondence (sales, support, billing) is done via automated system (billing & helpdesk) and our recognized sales offices. Our general advertised email IDs are:

  • Sales (sales@nexus.pk)
  • Support (support@nexus.pk)
  • Billing (billing@nexus.pk)
  • Development (dev@nexus.pk)

Any kind of dealing regarding Services and Payment must be done through these published sources with genuine invoice/reference number generated through the system.

Any kind of forgery, misrepresentation, fraud or commitment by any individual/company using our name, invoices or unofficial emails will not be owned and considered by M/S Nexus Technologies
and there will be no liability for damages recovery or compensation.

M/S Nexus Technologies will NOT be responsible for any verbal or written document (forged), if not generated and/or verified by our system.

Note: Any individual/company found in such Fraudulent activities may be reported on billing@nexus.pk.

Regards,
Nexus Technologies
www.nexus.pk

 


Read more »