Jump to content

David H. Lipman

Experts
  • Content Count

    15,190
  • Joined

  • Days Won

    1

Everything posted by David H. Lipman

  1. Yes. The Recycle Bin is not a folder that is viewable in Windows Explorer. It is a "Special" OS Construct.
  2. Connect Drive "F:" and yes, you can quarantine it or you can empty the "F:" recycle bin.
  3. It is not active, it is a file in the Recycle Bin. Empty the Recycle Bin and its gone.
  4. Yes, and he came to a faux conclusion and he made a baseless claim.
  5. Please request a checkout in the Mac Malware Removal Help & Support sub-forum to ease your mind., I see that you now have done so.
  6. OK - Request a checkout in the Mac Malware Removal Help & Support sub-forum. NOTE: This thread was originally posted in Newest Malware Threats which is a Windows malware file submission sub-forum and was moved here to General Chat. Thus a presumption of Windows was made.
  7. It means you will read; I'm infected - What do I do now? and follow the procedures to create specific LOG files. You then create a new post in; Windows Malware Removal Help & Support and request assistance. A Forum Malware Removal Helper will Pop your post off the queue and parse those LOG files and assist you in the determination if there is indeed malware on your PC and if there is, help you to remove it.
  8. Yes. I do not interpret LOGs as I am more of a researcher than a Forum malware removal helper. By creating a new post, a Forum Helper will pop the unanswered post off the queue and help you along the process.
  9. If you still think you may be infected then please read; I'm infected - What do I do now? and create a new post in; Windows Malware Removal Help & Support and request that you would like to have to have your PC checked out for assurance.
  10. You did not answer my question. Is your email similar to those in this thread... FYI: Email Ransom Scam still current howtoremove.guide is s shill site. The Internet is chock full of shill sites such as the above. In this case it is designed to give limited or misinformation and is created for the purpose of referring people to Enigma software and obtain affiliate revenue. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. Being a part of a breach is how they obtain people's passwords and use them to lend credulity to the scam. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Ransom Scam still current
  11. You indicated... "...and emailed me confirmation it knows one of my passwords ..." Please read the following thread and example emails. is your email similar to those in this thread... FYI: Email Ransom Scam still current
  12. Due to the fact you are unsure, then I urge you to read; I'm infected - What do I do now? and make a post in; Windows Malware Removal Help & Support and request that you would like to have to have your PC checked out for assurance and reference this thread.
  13. I have requested you read those authoritative references. The come from the here at Malwarebytes, the US FTC and FBI, Bleeping Computers and MyOnlinesecurity. I asked you to use Critical Thought and compare the text of your email vs. the text of similar email scams. I have explained about Mail Merge and how a mass email can be sent "personalized" with a password of your own making and I have provided a link to a site, https://haveibeenpwned.com/ , where one can check if they were part of a breach and how that personal password was obtained. If you still think this information in the email is true then you do have a high probability of being an easy mark. The fact that you are here, and still questioning it, shows promise. Please read those References I have provided and do compare the text of the email with the subject matter within each reference. Then I urge you to read; I'm infected - What do I do now? and make a post in; Windows Malware Removal Help & Support and request that you would like to have to have your PC checked out for assurance and reference this thread.
  14. When a Free version generates a Pop-Up for the paid-for version ( which is the fuel to provide a Free version in the first place ) it is categorized as nagware and not adware or spam. Adware and spam are malicious. Nagware is not malicious. It is simply a reminder that while you can use a free version, the paid-for version is preferred and provides greater ability. Whether it is the Free version of Avira AntiVir or its the Free version of Malwarebytes software, one can not blame the authors to remind the Free product users of the paid-for versions. If not for those paying for the software, there can be no Free version. You can call it nagware but not adware or spam. However it is purely your choice to to use the software Free or Paid-For. Using the Free version has that nagware cost. It is a fair trade-off for being provided at zero monetary costs.
  15. A Pop-Up from a program telling you there is a new version is not adware nor spam. One may consider it an annoyance but it is not adware. If you are on the paid-for version and you upgrade, nothing changes except the improvements and benefits of the updated version brings to the table. If you are using the Free version and you upgrade, it too benefits from the improvements the updated versions bring and it will remain the Free but limited in capability version of being the Free version. Upgrading from a prior version to v3.8.x bears no monetary costs. Please reference: MB3.8 is here
  16. Yes. That's why I chose to add those authoritative references to show the breadth of the scam so people can see the text is used and reused and that it is well known by Law Enforcement as a scam. You are not the first coming to the forum seeking assistance with this scam ploy and, sadly, you probably won't be the last.
  17. N O ! Again - Please read the References I provided. Use Critical Thought. If you were infected and they wanted you to pay a Fee, your email would be distinct and personal. Compare your email to those in FYI: Email Ransom Scam still current and review the time frame of the References I provided. As I wrote in Post #2, "...they send those emails out en masse hoping one or two bite at the bait " and that's why your email is so very similar to those being represented. It would not be cost effective to create hundreds of email variations and distribute them to all the possible victims. Instead, in each campaign they create one email format and broadcast it to a wide distribution list. You are not the only recipient. They perform an email version of "mail merge" where an email template is created and they merge data fields ( email address and password ) into the email so that one email is sent personalized with the password associated with that email address. This in not unlike using MS Word and create a Mail Envelope template that merges the contact information of a list of people and their Postal Addresses . You print the Envelope and if there are 20 people in that contact information list then you end up printing 20 envelopes each with an individuals' postal address. The email is generated the same way. A new campaign may use a new variation of text in the email body but the process is the same.
  18. Because they think you would be an easy mark.
  19. Like I wrote, I have received similar emails numerous times with multiple variations. Please read the References in Post #2. They want you to panic and they want you to pay the BitCoin fee. It is nothing more than a poor man's get rich scheme.
  20. Don't panic - Scam ! Your PC is not compromised.
  21. See - FYI: Email Ransom Scam still current I have received numerous of these emails. Please enter your email address(es) in the following site to see if that email address was part of a known breach. https://haveibeenpwned.com/
  22. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. This is most likely how they know the password. From a breach and not from your PC being compromised. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Ransom Scam still current
  23. https://www.virustotal.com/gui/file/dce25abc81c79dba752b9f613efbafd7ef9285c19d4b36da4cd0ad1d407129c9/detection files.zip
  24. The best option is Verify and Corroborate and not save and scan. Best Practices dictate to only open attachments if you are expecting email with an attachment from a known sender. If you were not expecting email with an attachment one should ask themselves... Who sent the email with the attachment ? Is it someone you know ? If yes, contact them and ask them did they send email with an attachment, what it is and what it is for. Verify with the sender about the email and corroborate that they intended to send you email with an attachment. If No, delete the email. MBAM only targets PE files and most email servers block them as email attachments. Malicious actors may use techniques to obfuscate the attachment such as placing the executable file in an ISO or other non-standard archive file format. Malwarebytes can't scan inside non-standard archive file formats. The file may come in a standard archive file format but may be password protected. Anti Malware software can't scan files stored in a password protected archive file. Malicious actors may use scripted formats or document files as email attachments which Malwarebytes does not target via signatures. That brings us back to Verify and Corroborate as the safest way to handle email with attachments.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.