New products in our portfolio

Our engineers have devised new several products: MSRP/RRP price monitoring – for wholesalers IoT products security assesments – for importers of products SPA – Single Page Application for presentation and filtering of catalogs Interested? Message us for a full presentation.

New IoT Malware? Anime/Kami

During August 2016, we came across several devices that were infected with a new malware that we couldn’t identify – for now. It resides in a read-write partition of some CCTV devices (most partitions on these devices are read-only), in a folder called .anime under the name .kami. It seems the attack used hard-coded telnet credentials and then downloaded the now-unknown malware(or maybe created the file via “echo” commands).

CCTV Malware

We failed to identify it, since it’s truncated – the final file seems to be bigger than the partition it was created on (mounted as /mnt/mtd).

.kami: ERROR: ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linkederror reading (Invalid argument)

The MD5 of it:

cdd887f2112b3d87b96154ca492368a8 .kami

For now, all we can recommend is to move devices from DMZ to proper port-forwarding and, where needed, install a router as a firewall in front of them.

IT Operations

Information technology operations, or IT operations, are the set of all processes and services that are both provisioned by an IT staff to their internal or external clients and used by themselves, to run themselves as a business. Networking Linux Servers BackUPs / Ransomware-proof backups Monitoring of websites, IPs/IP Ranges, …

IoT Devices & IoT Devices Security

Our team is able to help you setup and deploy custom-built IoT devices, depending on your companies need. We can also assist you integration them into current systems, setups, websites etc. But we also understand that IoT security is a must, not something optional. With a plethora of Internet-connected devices …

About our IT Automation Services

We think there is an almost unlimited array of things that can be automated. Below you will find a few examples: Download a certain file, syncronize a FTP account or mirror a Web Folder Find broken weblinks or other resources: CSS, JS files, images Extract competitor’s price list regularly and …