Jump to content

David H. Lipman

Experts
  • Posts

    20,836
  • Joined

  • Days Won

    244

Everything posted by David H. Lipman

  1. Don't remove it. Simply Disable it in the Browser Extension Manager.
  2. Moving encrypted files to a new folder will not alter the files more that any Ransomware already has. It would be no different to me creating a MS Word Document in "My Documents" and then later moving it to a USB "F:" drive (assuming you choose to Safely Eject the drive). A file Move does not affect the contents of the file, only the location of said file.
  3. You weigh that ageist the First Submission date. Both First Submission dates are in 2009. That indicates that the one Detection by Trapmine for each file is a False Positive declaration.
  4. Avast is affected by the Breach and they are offered Avast BreachGuard ? That's not a proper response. It must be a third party
  5. It is a generic phrase that represents a type of self extracting archives and file protectors. It could be as simple as UPX or more complex like enigmaprotector. I modified the term with "exotic" to represent those that are not as well known as something like UPX. UPX - Ultimate Packer for eXecutables. https://encyclopedia.kaspersky.com/glossary/packer/ https://www.malwarebytes.com/blog/news/2017/03/explained-packer-crypter-and-protector
  6. You submitted a ~48MB RAR to Virus Total. It is not the Archive file ( ZIP, RAR, 7zip, etc ) that you send to Virus Total. It is the file or each file within the Archive file you send to Virus Total for a report. Sending the Archive file skews the results and the data generated is based upon the archive container and not the malware or suspect files themselves. There are heuristic detections that are based solely on types of files in an archive. There could be many files in that RAR or it could be one or a few. The only time an Archive should be submitted is when the file is a bloated EXE and it exceeds the maximum submission size of Virus Total but is compressible in an Archive such that it no longer will exceed the maximum submission size of Virus Total or when you know there are so many files in the Archive you just want to get some overarching idea if there any at all detections. There are so many variables here. It could be case where there are many files and only one is really malicious. It could also b a case that an EXE is using some exotic packer that triggers detections. Use of exotic packing software is used by malware but it is also used by game writers to obfuscate proprietary game coding. One can not give such a determination on that basis.
  7. Honorary Members Is a Forum only membership designation based upon your activity and participation here. It has no bearing on product subscriptions and/or purchases.
  8. I was playing with some fallen walnuts last week and boy, did thy stain my skin!
  9. How to Protect Against Evolving Phishing Attacks
  10. Stephen Marley, Bob Weir and Jack Johnson
  11. How Americans View Data Privacy The role of technology companies, AI and regulation – plus personal experiences with data breaches, passwords, cybersecurity and privacy policies ** Much more. Please visit the Pew Research link
  12. SIM Swap Scams: How to Protect Yourself Armed with your log in credentials, the scammer could log in to your bank account and steal your money, or take over your email or social media accounts. And they could change the passwords and lock you out of your accounts. Here’s what you can do to protect yourself from a SIM card swap attack: Don’t reply to calls, emails, or text messages that request personal information. These could be phishing attempts by scammers looking to get personal information to access your cellular, bank, credit or other accounts. If you get a request for your account or personal information, contact the company using a phone number or website you know is real. Limit the personal information you share online. If possible, avoid posting your full name, address, or phone number on public sites. An identity thief could find that information and use it to answer the security questions required to verify your identity and log in to your accounts. Set up a PIN or password on your cellular account. This could help protect your account from unauthorized changes. Check your provider’s website for information on how to do this. Consider using stronger authentication on accounts with sensitive personal or financial information. If you do use MFA, keep in mind that text message verification may not stop a SIM card swap. If you’re concerned about SIM card swapping, use an authentication app or a security key. If you’re the target of a SIM swap scam Contact your cellular service provider immediately to take back control of your phone number. After you re-gain access to your phone number, change your account passwords. Check your credit card, bank, and other financial accounts for unauthorized charges or changes. If you see any, report them to the company or institution. If you think a scammer has your information — like your Social Security, credit card, or bank account number — go to IdentityTheft.gov to see the specific steps to take. SIM Swapping Stay a step ahead of the scammers. Educate yourself on some of the most common frauds and scams.
  13. Thanks, @NewTricks I had to go listen to this as it has been a while...
  14. You are not up to date. From your log... Version: 4.6.3.282 Components Version: 1.0.2158 Update Package Version: 1.0.76299 As @Porthos had posted...
  15. Are you stating your web site is infected and/or hacked or are you relating that Malwarebytes falsely detects your site? Virus Total doesn't show any vendors flagging the web site. https://www.virustotal.com/gui/url/745eae6f10367e9a81af57cbddcf0e457978eaa26489bc926d1e79d1dd206e4d/detection
  16. Great Expressions Dental Centers Data Breach
  17. YW - The whole idea is that if you are uncertain, a trained Forum Helper can bring you a much greater level of certainty.
  18. You can take advantage of the Malwarebytes' Forum Service of having your PC checked-out by a trained Forum Helper. If interested... Please read; I'm infected - What do I do now? then create a new post in; Windows Malware Removal Help & Support
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.