Cybercriminals Make Millions with Malware & Mimicry

Toward the end of 2013, an ATM in the Ukrainian capital began to spit out money on various occasions – without any direct human input.  People were seen on Kiev security footage gathering up the cash, but it appeared to be individuals who just happened to walk by at the time. That was not the case.

  • The role of malware
  • The role of mimicry
  • Kaspersky highlights banks as criminal cash cows
  • Getting the money – three scenarios
  • Making sure your data is protected.

The role of malware

Experts from esteemed anti-malware company Kaspersky Lab were brought in to analyze the bank’s systems, and they revealed that the ATM was only the tip of the iceberg: “The bank’s internal computers, used by employees who process daily transfers and conduct bookkeeping, had been penetrated by malware that allowed cybercriminals to record their every move,” reported the New York Times.

As with the breaches of Sony and Anthem, hackers were inside the bank’s system for months. Using the malicious application, they delivered video streams and photos to an international criminal enterprise consisting of Europeans (especially Ukrainians), Chinese, and Russians. The visual information allowed the hackers to better understand the institution’s day-to-day operations and security mechanisms.

The role of mimicry

Once the crime syndicate collected sufficient information, they began to mimic the behavior of the company’s personnel. Using these techniques repeatedly, they distributed payouts through ATMs and sent millions from banks around the world – the US, the Netherlands, Switzerland, Russia (the hardest-hit country), and Japan – to fraudulent accounts outside their borders.

As of February 14, the total take is estimated at between $300 million and $900 million, but they continue to accrue more cash every day.

Malicious software named Carbanak is standardly emailed to a target firm’s workforce. If an employee falls for the phishing scheme, the hackers are often able to access the admin server.

The malware subsequently loads additional applications onto the central machine, which expand the hackers’ surveillance methods with keyloggers and image-capturing capabilities, while making it possible to manipulate bank data via an external server.

The three methods used by the criminals to collect funds are:

  1. Sending cash to fake accounts
  2. Delivering cash to illegitimate foreign accounts through web money-transfer portals
  3. Directing cash machines to pour out money at preset times.

Kaspersky Lab provided information about the series of attacks to the Times before publishing an announcement and alert on its own site – explored below. Actually, the information on the Kaspersky site suggests that the thieves stole even more than originally estimated, a total of $1 billion from over 100 financial firms in almost 3 dozen countries.

NDAs prevent Kaspersky from revealing the banks that were breached by the hacker group.

A federal investigation will soon be underway in the United States. Both the President and the FBI have received detailed descriptions of the intrusions, but both offices have withheld comment until they have time to fully process the information and determine the extent of the damage.

Kaspersky highlights banks as criminal cash cows

According to a Kasperky post issued two days after the Times story, the anti-malware firm worked with Interpol, Europol, and various other agencies from around the world on its investigation. The brief noted that thefts of money have occurred over the course of the past two years. The crime syndicate, also (like the malware) referred to as Carbanak, benefited from a coordinated, integrated effort that drew on tactics from disparate breach efforts to refine its overall strategies.

“The plot marks the beginning of a new stage in the evolution of cybercriminal activity,” argues Kaspersky ominously, “where malicious users steal money directly from banks, and avoid targeting end users.”

Hackers have made away with as much as $10 million per incident. Typically the heists are stretched out over the course of 60 to 120 days, a timespan that starts with initial malware deployment and ends with the cash in criminal hands.

The hackers email bogus links to users, individually customized, to get them to provide their login credentials or download a fraudulent program – an increasingly popular, sophisticated version of phishing called spear phishing.

Getting the money – three scenarios

Once the banks complete the surveillance phase of the attacks, here is how they get the cash:

Scenario one – The hackers use web-based money transfer portals to shift the cash from the bank and into the external account they have established. Typically the funds are received by accounts located in the United States or China.

Scenario two – The hackers break directly into the bank’s bookkeeping program, bump up the dollar amounts associated with individual accounts, and then withdraw the money. For instance, they might boost an account with $20,000 to $30,000, then remove the extra $10,000. The bank customer who owns the account doesn’t sense a problem because the cash is stolen directly from the bank.

Scenario three – Cash machines are used as described above.

Making sure your data is protected

The alert from Kaspersky stated that the company “urges all financial organizations to carefully scan their networks for the presence of Carbanak and, if detected, report the intrusion to law enforcement.”

Banks are known for investing large amounts into security since protecting the funds of the institution is essential to their survival and success. This report demonstrates that they are far from immune to infiltration.

What if your own site is hacked? Safeguard your website and data now with our automatic backups that utilize military-grade encryption.

RELATED: Don’t worry. The banks aren’t sitting around twiddling their thumbs. In fact, they are counterattacking the hackers [Follow-up piece coming soon…].

Posted in Dropmysite, Ideas and Insights, News and announcements Tagged , , , , , , , .

Uber denies it was hacked

An Uber log-in can not only be used to rack up fraudulent trips, but would also give access to the user’s travel history, exposing home addresses. An account also contains partial credit card information.

Uber said the log-ins might have been lifted by either breaking weak passwords, or by trying passwords exposed in other data breaches.

“This is a good opportunity to remind people to use strong and unique usernames and passwords, and to avoid reusing the same credentials across multiple sites and services,” Uber said.

The company’s data security has made headlines in recent months. In late February, it came out that the personal information of up to 50,000 drivers had been compromised during a May 2014 breach.

The 2014 hack is not related to the current rash of Uber log-ins for sale, the company said.

#data   #security   #hacked   #password

The Hill
Log-in info for thousands of Uber users is being sold on the black market.
Posted in Dropmysite, Ideas and Insights Tagged , , .

2014 a record year for cyber-attacks 2

Contd…Hack Stats Hit All-Time High in 2014 – Trends & Analysis

The 2014 PandaLabs Annual Report looks at major hacks, such as Target and Adobe, to better understand the changing threat landscape – with a special focus on mobile.

  • Hack stats for 2014
  • Checkout lines, source code & EOL
  • Special focus on mobile
  • Time to get serious.

Hack stats for 2014

We previously reviewed the PandaLabs Annual Report 2014, which showed that global stats were rising astronomically in one way but dropping slightly in another.

The rise was in the number of never-before-seen malware strains, which rose from 30 million to 75 million between 2013 and 2014. Looking at it historically, by the end of the year, 34% of all existing malware at that time was “born” during 2014.

The decline was in the worldwide rate of infection, which dropped from 31.5% to 30.4%. That lower percentage is a positive sign, but we must recognize that we live in an environment in which 3 out of every 10 computers are hacked.

Let’s look at some of the primary hacker trends and one option for data backup

Checkout lines, source code & EOL

The breach of Target used malware custom-built to go after the retailer’s point-of-sale (POS) systems. The first step, though, was tricking someone who already had access to the server. An employee at a third-party HVAC provider who had access to the Target internal environment appears to have fallen for a “spear phishing” email – one with a fraudulent link to a website resembling the genuine Target one (phishing) and personalized to the user to optimize effectiveness (spear phishing).

Many of the major hacks in 2014 followed that same basic pattern – conning someone with an email, followed by delivery of tailor-made malware with a single, straightforward job. “That job might be something as simple as compromising a DNS or exploiting a previously unknown flaw in a piece of software,” explains Steve Brooks of

The exploitation of previously discovered flaws is perhaps particularly disconcerting, as indicated by the ongoing assault on Adobe. Hackers got ahold of the source code of various Adobe applications when they entered its systems in 2013. For the criminals, it is a gift that keeps on giving: the company has been hacked repeatedly since the initial intrusion. Plus, “given the amount of time cyber criminals have had the source code,” says Brooks, “it is likely that what Adobe are patching is likely to be only the tip of the iceberg.”

Whenever a company’s source code is taken, it is truly devastating. With that vital, fundamental code on hand, attackers are able to slowly and methodically develop new invasive tactics.

Code theft is not the only thing at issue. More applications are falling into the “end of life” category simply by being around for a while and falling out of the developer’s support window. It’s common for businesses to operate with old Windows operating systems, particularly Windows XP and Windows Server 2003. Jump ship before hackers started to peck away at the carcass of a discarded OS.

Now let’s say your software has not been stolen and your software is up-to-date. You still have to worry about “bring your own device” (below section) and your suppliers. Yahoo had a hoarde of information stolen, and it was actually lifted from an external provider. That same issue was seen with Target, as discussed above. It’s becoming clear that suppliers represent the hacker-friendly “sweet spot” on a wide attack surface; they need to follow the same policies with your data as you do.

Hacks by employees (as with the Korean Central Bank case) and by outsiders using employee passwords (as with the eBay case) were prevalent in 2014 as well.

Special focus on mobile

Several security firms have noted the substantial increase in strains targeting mobile devices, particularly Android. “In one month alone,” Brooks reports, “PandaLabs reported that it detected four malicious apps on Google Play with anywhere between 300,000 and 1.2 million downloads in just over one month.”

Android malware is being distributed to different hacker organizations more rapidly as well. PandaLabs was studying the new strain Android/Koler when the researchers realized there was a second instance of it that was almost identical but originating from another server. Brooks believes this acceleration is partially because of how easy malware is to purchase (often including moneyback guarantees).

This situation also showcased the increasing sophistication of the malware industry: the only difference between the two strains was that they were going after users from certain nations, seeming to suggest that hackers are conducting geographical split testing to figure out where they can make the most money.

The increasing popularity of Apple products and the ignorance of many people who jailbreak their devices to steal copyrighted material has made the iPhone and iPad a playground for Chinese hackers.

Malware is sometimes preinstalled on devices as well.

Time to get serious

The Internet is expanding, with more and more connection points to the Web established every day. PandaLabs argues for taking proactive steps to stay ahead of cybercriminals. Act now to smartly and painlessly backup your data

Posted in Dropmysite, Ideas and Insights Tagged , , , , .

New email Notification feature live on Dropmysite Reseller Portal

Dropmysite has recently launched the new customizable email notification settings for its website and database management partners.

Using this service the partners of Dropmysite can now decide and control which emails would be sent to their end users from your reseller portal.

Login to your DMS reseller portal.

  1. We hope you have configured your SMTP settings by now. If not do configure your SMTP settings before you select the notification settings by clicking on Settings à Notification Settings.
  2. Click on settings à Notification Settings. Alternatively click on the below URL:
  1. You will see the below screen.
Notification Settings

Notification Settings

  1. Check the box saying I want notifications for my users if you want your end users to receive the below notification emails.
  2. Currently there are 10 notification emails configured here. Check the ones you want your end user to receive.
  3. If you want to view the email template please click on the button next to each email option. A popup will appear with the email template. Please note that this is just a template. The actual email that will be sent will have your details from the SMTP settings that you have configured.
  4. If you have selected the “Notify when out of storage” option and you have a specific URL that you want your end users to click for upgrading the plans, please put that URL in the text box saying “Upgrade URL”. Please leave it blank if do not have such a URL.
  5. Once you have selected your email notification options click on save. Congratulations: your email notifications are configured.

Resellers and partners are the core of Dropmysite business and with this philosophy in mind, dropmysite had launched it very powerful reseller portal through which the partners can now manage their users using and also provision dropmysite services to them. This email announcement was a new feature that was added to this portal in order to provide more flexibility to the partners of dropmysite.

Don’t have a reseller portal yet? Contact dropmysite at and become a partner now.

Posted in Dropmysite, News and announcements, Product Tagged , , , , .


As part of its global expansion strategy, Dropmysite Pte Ltd, a leading website, email, and mobile backup service, announced that it has signed and launched strategic reseller agreements with three new regional web hosting companies, including ReadySpace, a managed hosting provider servicing the Asian Pacific region, Europlanet, operators of the Easy brand of domain and email hosting services and one of the leading providers in Greece, and Winhost, a premium Windows hosting provider based in Pasadena, California. All three of these web hosting providers will now offer Dropmysite’s automated website and database back-up solution to their customers.

“Web hosting providers are recognizing the strategic importance of offering a comprehensive and fully automated website and database backup service to their customers,” said Ridley Ruth, COO of Dropmysite. “They see that standard back-up solutions are not sufficient given today’s vulnerabilities. Automation of recovery is key to bringing customers data back online quickly. These new partners are a testament to the capability our infrastructure has to deliver our comprehensive services worldwide and to a wide variety of webhosting platforms.”

Readyspace, Europlanet & Winhost are joining the expansive list of hosting companies across the globe now offering Dropmysite as part of their services offerings. Europlanet will offer a single platform of services and web applications that will include Dropmysite under a single powerful control panel its clients based in Greece. Serving other Asia Pacific region, ReadySpace will include a cPanel with its Web Host Manager Complete solution (WHMCS) for its users. Winhost will offer API integration with Dropmysite for its Microsoft developers located in the US.

“Partnering with Dropmysite was an easy choice for us as it was simple to integrate into our product offering and provides an opportunity to differentiate our service portfolio and add another incremental source of revenue to our business,” said David Loke, CEO for Readyspace. “Our customers who are running their important application in our servers will need data protection eventually. We have just made it easier by working with Dropmysite which is done within a few clicks.”

About Dropmysite’s Partner Program
As part of its global Partner Program, Dropmysite provides a white label or a co-branded option that allows resellers and other strategic partners to easily integrate Dropmysite’s cloud-based website, email, and database back-up service directly into their own product offering. To facilitate the integration process, Dropmysite offers a full range of APIs, plug-ins, and tools, email and phone support, and at its highest tier, full customization of the application to match a partner’s existing brand standards.

To join or learn more about Dropmysite’s Partner Program, click here.

About Dropmysite
Dropmysite is a comprehensive service that lets you backup your website and databases – automatically and easily. Dropmysite Pte Ltd, was founded in 2011. Dropmysite is a leading Internet backup company with a focus on backing up Cloud data, such as websites, emails, databases, mobile devices and more. The company has developed a comprehensive solution and launched three websites:, and

Posted in Dropmysite, News and announcements, Partnerships Tagged , , , , , , .

Police Pay $500 Bitcoins Ransom After Being Hacked

For the second time in two months, hackers have attacked United States police databases, holding them hostage with #Cryptowall #ransomware ; each time they have been subsequently paid $500 in Bitcoins to decrypt.

After spending several days working with the FBI, the Department of Homeland Security, Massachusetts State Police, and two digital forensics and #security firms, they were unable to regain access without paying the ransom.

Read More: Click Here

Because the backup copies were stored on the same server, they were also locked and useless.

Unless you are backing up your important files to a separate location, you may have to face the choice of paying a ransom or losing everything if you are attacked.

Safeguard your website and database now with‘s automatic backups.

Sign up for free 14 day trial at

Posted in Dropmysite, Ideas and Insights Tagged , , .

Hack Stats Hit All-Time High in 2014 – But Don’t Panic

In the epic fight of good versus evil during the Information Age, the 2014 PandaLabs Annual Report reveals that the balance tipped in favor of the cybercriminals last year.

  • Huge attacks dominate the news
  • Tip of the iceberg – 2014 hack scope unprecedented
  • Don’t panic like I just did
  • Worst Nations for Hacking
  • Best nations for hacking
  • Setting yourself apart.

Huge attacks dominate the news

The demand for security, business continuity, and website backup solutions is higher than ever following a series of high-profile hacks – many of them politically motivated:

These attacks were of course preceded by a difficult 2013. That year, 40 million credit and debit cards were lifted from Target’s point-of-sale systems following a successful phishing attempt

Tip of the iceberg – 2014 hack scope unprecedented

Folks, that’s just the tip of the iceberg. The Internet is the Titanic. Takeaway: We need to keep the captain off the booze long enough to make sure this whole Information Age thing doesn’t turn into a disaster.

Why are these huge hacks just the tip of the iceberg? Let’s look at the statistics. According to a new report from Panda Security, the PandaLabs Annual Report 2014, “malware creation broke new levels with 200,000 new samples spotted every single day.”

Here are additional figures from the Panda analysis, with comparisons to the past, as compiled by Steve Brooks of

  • It was a busy year for godparents of malware, with 75 million new strains born and deployed.
  • The new malware strains number is up from 30 million in 2013, representing a stunning 150% increase.
  • Looking at the entire library of malware monitored by Panda, fully one-third of it (34%) was first seen in 2014.
  • Among types of newly created malware, 69.8% were Trojans, while only 12.3% were viruses. Worms represented 5.8% of newly detected strains, with adware and spyware at 3.1%.
  • Those numbers were similar for individual infections of PCs and servers, with 65.0% of contaminations caused by Trojans (9.6% adware and spyware; 2.8 worms; 2.7 viruses).

Don’t panic like I just did

If you just wet yourself, you are not alone. These numbers sound awful. Well, they are awful. However, there is no reason to put on your antique World War II helmet and shut yourself in your bunker quite yet (I’ll cue you when applicable).

Why? There is one statistic that represents a huge bright spot – in fact, it suggests that some hacker patterns are becoming more recognizable even though they keep cranking out new threats: The rate of infection worldwide has actually gone down, from 31.5% to 30.4%.

Clearly that is excellent news considering all the massive hacks in the news and the increasing diversity of malware. However, we shouldn’t be throwing a celebration to find out that 3 out of 10 systems worldwide have again suffered at the hands of hackers.

Worst Nations for Hacking

Panda also looked at which nations had the highest incidence of infection. This list is almost identical to 2013, although Bolivia knocked Argentina off the list (like the big US hacks, many Bolivian infections are believed to originate outside their borders, in their case in Chile).

  • China – 49.0% (54.0%)
  • Ecuador – 42.3% (40.4%)
  • Turkey – 41.5% (42.2%)
  • Guatemala – 39.6% (36.4%)
  • Russia – 38.8% (38.0%)
  • Taiwan – 38.1% (38.0%)
  • Bolivia – 37.5% (unlisted)
  • Peru – 36.3% (39.9%)
  • Poland – 35.1% (35.0%)
  • Brazil – 34.1% (35.0%).

Best nations for hacking

Okay, let’s look at the 10 countries that are the safest from hackers, with the lowest rates of infection during 2014:

  • Sweden – 20.0%
  • Norway – 20.3%
  • Finland – 21.2%
  • United Kingdom – 22.1%
  • Germany – 22.7%
  • Switzerland – 23.1%
  • Netherlands – 23.6%
  • Japan – 24.8%
  • Denmark – 25.3%
  • Belgium – 25.4%.

Brooks speculates that the reason the infection rates are so low in these particular countries has to do with tactics users in these technologically literate nations are taking to protect themselves from malware: “The question is whether that level of awareness is enough to guarantee them a place on this list[.] It’s hard to know but these are also countries where sales of security products are also high.”

Setting yourself apart

Does Sweden deserve a blue ribbon because only 1 out of every 5 devices has been penetrated by malware? Not really. Although the spread of infection rates runs from 20% to 49% for major countries around the world, the fact that no nation is in the single digits shows malware is rightfully considered an international IT epidemic.

Let’s talk about you. You don’t want your website hacked and injected with malware. Nevermind the annoyance: it’s extraordinarily expensive. Three out of five small businesses that are hacked are out of business within six months (National Cyber Security Alliance).

Don’t lose everything. Get automated website and data backup today.

By Kent Roberts

Posted in Dropmysite, Ideas and Insights, News and announcements Tagged , , , , .

Are you one of the million WordPress sites using the WP-Super-Cache plugin?

Are you one of the million WordPress sites using the WP-Super-Cache plugin? If so, the FBI has issued an advisory about a vulnerability that can allow hackers to gain unauthorized access, inject scripts or install malware on the affected sites. Be sure to backup your website and update your plugins!

Never lose data again with‘s secure storage and instant updates on any downtime. Sign up for free 14 day trial at

The plugins are low-hanging fruit, but the attacks have been widespread and disruptive, the FBI said

Posted in Dropmysite, Ideas and Insights, News and announcements Tagged , , , , , .

Preparing for the Blacklisting Threat: A Proactive Strategy for Hosting Providers

Blacklisting is probably more common than you think. While Google eschews the term “blacklist,” the search giant has quarantined as many as 10,000 websites per day in recent years, typically because the sites have been infected with malware and expose unsuspecting visitors to malicious software that can cause harm to their computers and put sensitive personal information at risk.

What happens when a website is blacklisted? Too often, site owner’s panic and web hosting providers suffer disruptions to everyday business as they scramble to help anxious customers clean up their sites and get back online.

Unfortunately, businesses that can’t afford to hire IT security specialists or install expensive monitoring tools are often slow to realize their website has been blacklisted. In fact, nearly half of business owners are alerted to a compromised website by a browser, search engine or other warning when trying to visit their own websites. That’s when the fire drill begins. For blacklisted sites, time is the enemy. Every minute a website is blocked represents lost revenues, not to mention immediate—and sometimes lasting—damage to an organization’s reputation. This problem is particularly acute for startups and small and medium-sized businesses, which lack the infrastructure and deep pockets to weather an extended storm.

The time required to remove malware and secure a site can range from hours to days, depending on the severity of the infection and whether the site is protected by a frequent and effective backup regimen. Removal of malware and site restoration is the first part of the fix. Once that process is complete, site owners still need to request a review from Google before blocking is removed. A recent study of 500 blacklist removals by SucuriLabs found that the average time for blocking removal was 10 hours and 23 minutes, with actual removal times ranging from 2 hours and 20 minutes to 23 hours.

For web hosting providers, blacklisted customer sites can be a real nightmare, putting a strain on operations and potentially undermining their credibility. Customers typically don’t understand why their site was blacklisted and will often unfairly blame their hosting provider for the problem. But regardless of where the fault actually lies in individual incidents, blacklisting isn’t going to go away anytime soon, and smart hosting providers will position themselves to help customers remediate the problem as quickly as possible. Providers that offer robust tools to get their clients through the process expediently will ultimately inspire enhanced confidence and loyalty; those that don’t are likely to squander significant resources on remediation support and lose customers in the process.

The good news is that blacklist remediation doesn’t have to be a nightmare or a lengthy ordeal, particularly if affected website owners are already using intelligent automated backup regimens and can easily restore the affected website files and functionality on their own with the appropriate tools.

To protect themselves, hosting providers should familiarize themselves with the following steps for remediation so they can implement them quickly and efficiently once a customer discovers their site has been blacklisted:

  1. Check for viruses on administrators’ systems by running reputable antivirus scanners or AV scanners on every computer used by an administrator to log in to the site. Then, you should check server logs for activity by the administrator who owns the infected computer.
  2. Change passwords for all site users and accounts, including logins for FTP, database access, system administrators and CMS accounts. Remember that strong passwords will combine letters and numbers and punctuation, and will exclude words or slang that might be found in a dictionary. The more sophisticated web hosting companies will allow customers to easily make these changes in a dashboard interface as part of a self-service automated backup offering.
  3. Educate customers to check that they have installed the latest versions of their operating system, CMS, blogging platform, apps, plug-ins, etc.
  4. Delete all new and modified files added to the server following the time when the issue was first detected, and then perform a complete system restore. If you offer a cloud-based automated backup and disaster recovery service to customers, it may be possible to complete the restoration with a single click. Otherwise, your customers will need to find and manually download the last clean versions of the each of the modified files.
  5. Request a review by Google to remove the blacklist flagging. The process for that is described by Google here, and keep in mind you will need to use Google Webmaster Tools to carry out the required steps.

How can webhosting provider’s best prepare for possible infections and blacklisting? Act now to control your own destiny. Assume the worst will happen, and then make sure you have access to tools that will get your customer’s site and data back online as quickly as possible

Ridley Ruth is COO at Dropmysite. A leading Internet Cloud backup company with a focus on backing up data, such as websites, emails, databases, mobile devices and more. The company has developed a comprehensive solution and launched three websites: and

Posted in Dropmysite, Ideas and Insights, News and announcements, Product Tagged , , , , , , , , , , , , , , .

Dropmysite Announces Free Blacklist Monitoring Service for Websites

Dropmysite Pte Ltd, a leading website, email and mobile backup service, today announced the introduction of its new Website Blacklist Monitor service that automatically performs health checks of websites multiple times per day and issues instant alerts in the event of a problem at the WHD Global 2015 at Europa-Park, Rust. Dropmysite were gold partners for the event.

Dropmysite Announces Free Blacklist Monitoring Service for Websites

Dropmysite Announces Free Blacklist Monitoring Service for Websites

Website Blacklist Monitor integrates Dropmysite’s award-winning self-service website backup tools with Google’s Safe Browsing technology to provide customers with the fastest possible remediation process in the event their website is compromised by malware or phishing attacks. Monitoring is now available free to users of Dropmysite’s secure, automated, cloud-based website backup services, which feature an easy-to-use dashboard and one-click restoration of backed up data. Dropmysite will be demonstrating this new service at WHD Global in Germany, March 24-26.

Billions of website pages are monitored per day in search of unsafe websites, and issued warnings against thousands of new sites daily on search engines and in web browsers. However, many small and medium-sized business (SMB) owners are unaware their website has been blacklisted until they receive a complaint from a customer or navigate to the site themselves and encounter a warning. Blacklist Monitor eliminates the time lag between the emergence of a problem and remediation, minimizing lost revenues and damage to customers’ reputation. Customers are alerted immediately so they can quickly restore a clean website copy with Dropmysite’s one-click restoration feature.

“Blacklisting of websites is an enormous and growing problem, particularly for SMBs,” said Dropmysite COO Ridley Ruth. “As many as 10,000 websites per day are identified as unsafe through browsers and web searches, and companies that are unable to act quickly risk catastrophic setbacks. Website Blacklist Monitor gives website owners peace of mind by detecting problems as soon as they occur, thus enabling fast and effective remediation and minimizing potential downtime and potential damage to their reputation. We will continue to create solutions and technology that enable our customers and partners to focus on their business and be successful online.”

Features of Dropmysite’s Website Blacklist Monitor service include:

  • Multiple daily website checks, with instant alerts via email or text
  • On-demand website monitoring by users
  • Comprehensive website blacklist monitoring history
  • Optional automatic stop of code or file corruption, which interrupts website and database backups upon blacklist detection
  • Complete integration with backup services for one-click restoration of data
  • Support of multiple URLs within a website

Dropmysite self-service backup technology is available directly to website owners or through web hosting companies, ISPs and domain name registrars. For more information, click about the service, click here.

If you are a hoster and want to know how you can have a perfect strategy for handling blacklist, click here.

TO get this service contact

About Dropmysite

Dropmysite is a comprehensive service that lets you back up your website and databases — automatically and easily. Dropmysite Pte Ltd, was founded in 2011. Dropmysite is a leading Internet backup company with a focus on backing up cloud data, such as websites, emails, databases, mobile devices and more. The company has developed a comprehensive solution and launched three websites: and

Posted in Dropmysite, News and announcements, Product Tagged , , , , , , , , , , , , , , , , , .