Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. They just keep coming... Hi, how you doing ? We see nothing mischievous in pleasing yourself from once in a while. Certain things must be kept private, and if your relatives and friends are confronted by it, this will be something to worry about. Something anyone would be badly put out by. This will strongly influence your personal life and wellbeing. For a certain period of time, we have been tracking your PC activity via a trojan virus that you had caught and that had infected your PC. You had been infected after clicking on an poster on one of our virus-infected pornographic websites. A trojan virus provides us with access to your PC and any device that is connected to it, whether via wifi or bluetooth. We have been monitoring your screen and everything you have been doing - through a live feed - and you had no idea of us doing this. We also have access to your camera and microphone which we can switch on and off whenever we want. Any information that has been interesting or relevant to us has been stored privately. For instance: contacts, social media, emails, etc. We have recorded a video where you can be seen pleasing yourself, and we have added the video you was watching as an split screen footage. With one press of a button I can forward this video to all your contacts, social media, etc. If you want to prevent this from happening transfer the amount of $750 to the following bitcoin address. Bitcoin wallet: 1E4WMuN9jZ##############yL3LmoMek4HNEenh7hB Buying bitcoin is very easy and straightforward (usually verification is needed) through the following websites: www.coinbase.com www.localbitcoin.com www.coinmama.com www.bitit.io ww.bitpanda.com www.bittylicious.com The next moment after receiving money, I will erase all your data. We are very generous, so you have 5 days to process the payment. Failing to do so will leave you with the consequences that you have been made aware of. We don’t make mistakes. By the way, nothing can be more stupid that reporting this, as it is absolutely unattainable to track this email, as these messages were processed through the external server located in another country. These accounts have been hacked. If you make the stupid choice to do report this or contact anybody about this message we will directly release your footage and forward it. Any other things we obtained that can possibly harm you will be used against you too. We will get notified as soon as this email has been opened, from that moment the clock starts running. You have 5 days exactly, not a minute longer. Best Regards
  2. The term malware is the overarching concept of Malicious Software and is a derivation of parts of those words concatenated together. All viruses are malware but not all malware are viruses. There is a taxonomy to malware just like there is in the animal kingdom or even vehicles. Just like all Fords are automobiles not all automobiles are Fords. There are three basic sub-types of malware; Viruses, Trojans and Exploit code Viruses - A subset of malware that is capable of self replicating and spreading autonomously. That means viruses are able to spread from computer to computer, computer to media and from media to computer without assistance. Viruses are further broken down and have sub-types based upon how they spread. For example there are viruses that are called file infectors because they spread by infecting a legitimate file by appending, prepending or cavity injecting code into the file which will then, in turn, be able to infect other files. There are also type of viruses called worms. They can use Network Protocol to spread from system to system over a network. they are known as Internet Worms. Then there are worms that exploit the AutoRun/AutoPlay facility in Windows. Malicious code is placed on a media such as a CDROM, Flash Drive or Removable hard disk in such a way that when they are inserted into a windows PC the infector spreads from the media to the system. Trojans - This is a malware sub-type that requires assistance to infect a system. It could be Social Engineering ( the Human Exploit ), Exploit code or some other means. A trojan can infect a legitimate file by appending, prepending or cavity injecting code into the file but that is the extent of the infection. The altered file can't spread the infection. Such a file is deemed "trojanized" or "patched". There are many other sub-types of trojans as this is the biggest class of malware can; inject malicious code, download, drop, dial porn ( 900 ) numbers, steal passwords, steal data, create a Remote Access backdoor, act as a part of a larger robotic system doing the bidding of a central command and control (C2) system, act as a Proxy, and many, many, more forms of malicious activity. Exploit code - This is code to take advantage of a system, functionality, or bad coding. For example there may be a software bug in a particular program that when exploited can cause a trojan to be installed. Another example is where a file is coded in such a way that when viewed or rendered will cause that viewer and rendering software to act in an unusual way. For example a Winmad trojan may exploit the Digital rights Management ( DRM ) to cause the use of a media file ( MP3, WAV, etc ) file to cause a malicious download. The above may be combined. For example the Lovsan/Blaster worm was an Internet worm that exploited a bug in the RPC/RPCSS subsystem of Windows which uses TCP port 135 and cause the installation and execution of the malware. Once infected that system can seek out other vulnerable systems via TCP port 135 and infect them. Thus the Lovsan/Blaster worm uses both Exploit Code and is a Internet worm. There are also other situations where a trojan can be infected by a virus. For example a Downloader Trojan may be infected by a file infecting virus such as Sality or Parite. The trojan will still do what it was programmed to do but it will also cause other files to be infected and spread that virus to other systems, You'll see the term "trojan virus". This is a false term. The above is not a "trojan virus" it is a trojan infected with a virus. Calling a malware a "trojan virus" is akin to calling a particular automobile a "Ford Chevrolet" or a "Mazda Datsun".
  3. Hind-sight is 20/20 and through the lens of time, we learn more. It also is a reminder of how Pakistani A.Q. Khan proliferated Nuclear technology and while Qadafi gave up on nuclear technology, Iran never did. Dank je @pondus
  4. As always I suggest creating a password encrypted ( enhanced RSA and AES ) Excel Spreadsheet using highbit encryption with a Strong Password. For added security, that password encrypted Excel Spreadsheet can be stored within a password protected ZIP file using a Strong Password. Thus making the data enclosed within a double wrapped secured container.
  5. I can see two different sub-forums as they are programmed differently and will have different bugs and errors. As one can see the Chrome extension is live but the Firefox version has been temporarily pulled. This demonstrates that division. I can see one False Positive reporting sub-forum in the Malwarebytes Browser Guard for both Chrome and Firefox so as to clearly identify and separate F/P Reporting for them
  6. They are both malvertisements. The first is for a software update that purports to be Adobe Flash but it is not. It will install Adware or some Potentially unwanted software or actual malware. The second is an Apple FakeAlert for some product. They have nothing to do with any software on your PC. Examples: FakeAlert-Screens.pdf / Flash Version Here are videos demonstrating Apple FakeAlerts used to goad Apple device users to download Advanced MAC Cleaner and MyMobileSecure VPN solution. Apple FakeAlert leads to Advanced MAC Cleaner Rogue AV software Apple FakeAlert leads to MyMobileSecure VPN solution You can't quarantine web sites. You need to look at your Browsing habits and what sites you visited when you got these malvertisements and try to avoid them if possible.
  7. Yes. I have repeated it because the problem gets re-posted over and over and the answer doesn't change. I will try to update the text as things change though.
  8. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. This is the way they know the password. Through a data breach where the harvested data is then sold or bartered. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Blackmail Scam still current
  9. Email clients aren't a vulnerability. Yes, certain email client software may fall to a software vulnerability that may be exploitable but they are few and far between and there is a myriad of email clients. The true vulnerability is the email recipient themselves. Many forms of malicious emails use Social Engineering which is the human exploit. The vulnerability is falling for a Phishing email or, what we were previously discussing, a sextortion email. The vulnerability is the susceptibility for falling for Social Engineering ploys.
  10. The email headers are forged and thus... pointless.
  11. Yes. Many frauds are created, placed in a template and are subsequently sold or bartered.
  12. Very, very, conditional. The sending email client can mark the email to receive a "Delivery Notification" and/or a "Read Receipt". The email system and the email client may act on them or they may not. By default the email recipient client software will deny "Read Receipt" and depending on the email client the recipient may get a message to the effect of (paraphrased ) "The sender has requested a Read Receipt, do you accept?". It is totally up to the system of the email recipient if a "Delivery Notification" is generated or not. Most do not.
  13. I have downgraded and lost nothing. Try deleting the ShortCut and then recreating it.
  14. All versions... http://ftp.mozilla.org/pub/firefox/releases/
  15. New email, still current Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $528 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: 1ELKdWgfed################pKSqcCjM After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards!
  16. Malvertising is not meant to harvest information per se. It is meant to present some kind of Social Engineering fraud. It could be; You Won, Your software X needs to be updated, it could be a fake news report pushing some Snake Oil product or it could be a FakeAlert. Some Examples of FakeAlerts: FakeAlert-Screens.pdf / Flash Version There are different flavours of Ransomware and they have different target audiences. It's all about the money ( in BitCoin form ). Obviously a corporate victim would get a higher value ransom that an individual. " Was I right that if I had clicked on any of the "alarm" buttons on this particular "You have won," then there could have been either identity theft or ransomware behind it? " Doubtful. They might try get you to divulge Personally Identifiable Information ( PII ) to use in other schemes and/or they could try to push a Snake Oil Remedy, get you to use some product, access a particular web site or other objective to obtain affiliate revenue. Different scam have different results and you are mixing them all up.
  17. The extortion email is a fraud. What they claim is a fraud. Just delete them.
  18. Anything in your Profile Downloads and you don't know about, just delete. Keyloggers ==> Malwarebytes.
  19. Q: I usually by cheap mice or earphones. Is there any danger in buying the cheapest equipment by non-top brands made in China? Maybe.... Depends on the vendor. Buy only through a well known, established, vendor. Buying cheap products from a "fly by night" would pose a greater risk. Q: And another question comes to my mind: I have some files/folders with multiple files on my computer which I don't remember neither where they came from, nor what they are. Is there a way to find out what those files are? That's too broad a question to answer. It would depend upon where those files/folders are located, what the File Types are ( Documents, Media, Executable, etc ) and the file dates may bring clarity to the question.
  20. Q: Is it better to have more e-mail accounts, or fewer (or even 1)? Have as many as you want or as few as you want. It is not better or worse. It is whatever works for you, Q: Obviously I should use different passwords everywhere. But what about logins? Should I use a different login on every website/app? Yes. Reduce victimization by being less predictable. Q: Personal details I enter on various websites should be fake whenever possible, I presume? Enter NO personal details. Q: Creating accounts on online stores (like Amazon, E-bay, Aliexpress, local ones and alike). Is it okay to have an account (which obviously will have to have my real details, including my address) or should I use "guest" accounts whenever it is possible? Guest when possible and don't store Credit Card with the site. When possible, don't even create an account. Q: Malwarebytes Web[somethingDon'tRememberExactly] extension. Should I use it and is there any benefit to me using it if I already have Malwarebytes Premium? Yes. They are no longer Beta and act on web sites other than what Malwarebytes Premium does. Q: VPN. Should I use it? If yes, when should I use it? Yes. But the VPN provider must be fully vetted as what you are blocking others from seeing, THEY ( the VPN provider ) will see. VPNs are only needed if you use a mobile platform and jump onto Public WiFi. Q: If yes, which ones could be considered best/safest ones (I was looking into Windscribe)? I don't have an answer but I am sure another responder will.
  21. So, how is the End User supposed to know where to go ?
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.