Your IT Support Experts
We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.
Free Consultation
Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today
Is your business currently infected with the GoldenEye Ransomware Threat?
WE CAN HELP YOUR BUSINESS TODAY!
Contact us now to see how we can get your business back up and running again today!
Get Help Now
Is your business currently infected with the GoldenEye Ransomware Threat?
WE CAN HELP YOUR BUSINESS TODAY!
Contact us now to see how we can get your business back up and running again today!
Get Help NowIs your business currently infected with GoldenEye ransomware?
USA Computer Services has the experience and skills required to restore your data and we can get started right now!
If you are currently infected with GoldenEye you may see some of the following images on your computers and/or servers:
What is GoldenEye?
In March 2016, we observed the beginning of an interesting ransomware package called Petya. The second version (green) Petya comes combined with another ransomware, packed in the same installer – Mischa. The latter one was deployed as an alternative payload: in case if the installer was run without administrator privileges and the attack was impossible. This combo, however, is slowly reaching its maturity now, in 2019. The hackers fixed bugs that allowed for decryption of the two earliest versions. Now, we are facing an outbreak of the fourth version and this time it's under a new name, GoldenEye.
GoldenEye is distributed by phishing e-mails, in campaigns targeting mostly Germany, but it is increasingly being seen here in the United States. The same pattern of distribution was observed in early editions of the Petya ransomware. Germany seems to be an environment familiar to this ransomware writer, (who is probably a German native speaker based on our analysis of his coding), and his testing campaigns are always released in Germany. However, the threat has gone global again.
The behavior of GoldenEye is no different than in the previous versions of Petya. After the malware is deployed, the system crashes and starts with a fake CHKDSK. It pretends to be checking the disk for errors, but it is actually encrypting the MFT (Master File Table), using Salsa20. After it is completed, we are left with a blinking skull – this time in yellow/golden color.
This threat uses a very secure method of encrypting your data, which means there is no decryptor available to recover your data. Although your data cannot be decrypted, USA Computer Services can restore your data from backup and get your network back up and running quickly and efficiently.
When was GoldenEye first identified?
GoldenEye was first identified in April of 2017, but it continues to evolve several times a year.
How is GoldenEye spread?
Currently, Goldeneye is distributed by phishing/fake e-mails. They are crafted to appear to be legitimate and trick users into installing the ransomware.
Did the hackers steal my data before encrypting it?
At this time, it does not appear that the hackers are attempting to copy the data prior to encrypting it.
How long will recovery take?
This is always a tough question to answer. Since decryption is not possible at this time, the only option is to recover systems from backup. The amount of time this will take will depend on the size of your network, the amount of data infected, and the number of infected systems. USA Computer Services has the staff available to restore your systems as quickly as possible.
Can my data be recovered using a decryptor or is my data gone forever?
No, currently there is no decryptor available for GoldenEye.
These are the general steps cyber criminals take in a typical ransomware attack
1) Infection
After the ransomware has been delivered to the system via email attachment, phishing email, infected application or other method, the ransomware then installs itself on that endpoint and any/all network devices it can access from that system. This can include mapped network drives, backup storage, servers, databases, and other workstations.
2) Encryption Key Exchange
The ransomware program then contacts the control server operated by the cyber criminals behind the attack to generate the cryptographic keys to be used on the local system. This is how they are able to decrypt your data once the ransom has been paid. Some ransomware variants use a simple encryption algorithm while others use the same level of encryption the Military and financial institutions use.
3) Encryption of Data
The ransomware starts encrypting any files it can find on local machines and the network. It does this as "quietly" and as quickly as possible. What they are trying to do is get all of your data encrypted before you stop the process.
4) Extortion
With the encryption work done, the ransomware will now display the ransom and instructions for extortion and ransom payment, threatening destruction of data if payment is not made. There is usually a time limit which if it expires the decryption key may be deleted, or the price of the ransom may go up.
5) Unlocking or Recovery
Organizations can either pay the ransom and hope for the cyber criminals to actually decrypt the affected files (which in some cases does not happen), or they can attempt recovery by removing infected files and systems from the network and restoring data from clean backups. USA Computer Services never recommends paying the ransom. We have the experience in dealing with various ransomware attacks and there are almost always other alternatives if proper backup and disaster recovery steps were taken prior to the attack.
How to recover from a ransomware attack
1) Isolate
Prevent the infection from spreading by separating the infected computers from each other, shared storage, servers, and the rest of the network.
2) Identify
Identify the ransomware variant from the messages, cyber evidence on the computer, and various cyber security tools to determine which ransomware strain you are dealing with. You must quickly identify how the attack occurred and patch/close that security flaw. We may need to patch/update all systems, rebuild firewall configs, change all passwords, etc.
3) Report
Report to the authorities and coordinate measures to counter attack if the FBI or other governing authority requires assistance. You may also be required to notify your clients or customers that you have been a victim of a cyber security attack.
4) Create a list of recovery options
There are always a number of ways to deal with the infection and the recovery from the attack. We are here to help you make the best and quickest recovery decisions.
5) Restore
Using the most recent clean backups and program/software sources to restore your network/systems. Due to the disruption you may need to consider new equipment and the latest software. We would have already identified this in step 4.
6) Prevention
Report on how the infection occurred and what you can do to put measures into place that will prevent it from happening again in the future.
Ransomware is a serious threat to your business.
USA COMPUTER SERVICES is a serious threat to RANSOMWARE!
Contact us now to begin your recovery process from GoldenEye today.
704-665-1619
Our USA Computer Services team members are skilled professionals who take great pride in their work. Our team will arrive on time, keep you informed, deliver what we promise and guarantee our work. We’ll also get to know what’s important to you so that we can customize the way we work with your daily routine.
President / Owner
Senior Technician
Network Security Specialist
Field Services Technician
Help Desk Technician
Help Desk Technician
Office Manager / Marketing
USA Computer Services recovered our business from a ransomware attack and was able to save all of our data that was missing. Our old IT company never explained Ransomware to us but we are blessed you were able to save us.
Thomas. M - Plumbing Supply Warehouse
USA Computer Services provides the highest quality onsite and remote IT support. All of our products and support comes with an unconditional satisfaction guarantee. We specialize in Small and Medium sized businesses with all your IT needs. These are just some of the areas we can assist you. Call or contact us today to see how we can resolve your IT problems!
We have been extremely happy with USA Computer Services for over 7 years. I highly recommend them for your computer needs.
- Charlene G. - Legal Firm
USA Computer Services will stop at absolutely nothing to ensure our clients are protected against even the latest Cybersecurity threats.
Here are some statistics on the increasing threat of Cyber Crimes in 2023.
Our computer problems have completely disappeared since partnering with USA Computer Services. They have the friendliest Tech's and they are always on-time for our appointments.
- Christina. W - Town Administrator
Ready to see how "We do IT Better"?
We take cybersecurity very seriously and can help your business recover from a GoldenEye ransomware attack. Once we have recovered your business, our proven solutions can prevent your company from being held hostage by hackers in another ransomware or cybersecurity attack. We are so confident that we can prevent a cybersecurity attack at your business that we back it up with a $1,000,000 protection plan. Contact us today to get your business running again!

Contact Us
Headquarters:
525 North Tryon St. #1600
Charlotte, NC 28202