Jump to content

David H. Lipman

Experts
  • Posts

    21,223
  • Joined

  • Days Won

    260

Everything posted by David H. Lipman

  1. To be "infected" it would have to be a legitimate file that has had malicious code prepended, appended or cavity injected into the affected executable. Th1s would alter the Checksum value of the file. If a 3rd party hosts an installer and has an altered Checksum value from that of the author's installer then it can not be trusted. On the other hand, if a 3rd party hosts an installer and it has the authors original release Checksum value, of that installer, then it can be trusted.
  2. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam Bitcoin - Bitcoin Abuse Database BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes' Blog - Warning: Victims' faces placed on explicit images in sextortion scam Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Blackmail Scam still current
  3. Malwarebytes is not in that list and is not a participator in that part of Virus Total. If Malwarebytes' software is blocking any of the provided sites, please provide logs from Malwarebytes Anti-Malware or screenshots from Browser Guard.
  4. I am sorry @NewTricks but I don't follow the nuances of Malwarebytes' software sales nor do I directly provide tech support of their products. An expert at this is @Porthos He is much more in-tune to ask such a question. I don't suggest using your Smart Phone. Use your PC instead.
  5. If 3rd parties are deliberately abusing other web sites by spamming content for SEO and other purposes, the age of a media outlet is a moot point. All that is relevant is that it is the subject of spam and abusing other web sites and thus can be targeted for being blocked. Especially when the subject matter of said spam is that of Snake Oil cures and scams. No, the Internet Domain is outlookindia.com and the following is an example URL https://www.outlookindia.com/outlook-spotlight/shark-tank-weight-loss-gummies-reviews-scam-or-legit-read-customer-keto-gummies-reviews-before-buying-news-244838
  6. Yep, mini convection ovens are awesome for sure. I have a Bravo nuwave.
  7. Yeah, its like cooking a fart. You know if it is there or not but, it is not physically tangible. If you cook a nothing burger there is nothing there to flip-over.
  8. My sister-in-law always used and loved cooking in a Crock Pot slow-cooker.
  9. Cheech and Chong's Next Movie Paul Reubens, actor best known as Pee-wee Herman, dies at 70 Paul Reubens (Pee-Wee Herman) in Cheech and Chong's Next Movie 1980 Buffy the Vampire Slayer Amilyn long death scene and post credit scene... | Buffy the Vampire Slayer (1992)
  10. LOL - Stick to Puzzles, not drawing.
  11. Stung three times. Felt it for 15 minutes and then - nothing. All aggression and bravado. That's it.
  12. Those Bald-Faced Hornets were "quite aggressive" when I took that shot.
  13. The Pink Lady is Bugging Out!
  14. The file itself appears to be OK. It is Digitally signed and has zero hits on Virus Total https://www.virustotal.com/gui/file/c70d80fe3c94371fb693572697cd8627452519d1855d23b1c680dc21b50b2059/detection But why even use a 3rd party utility when you should be doing it yourself. Just to make sure and to be safe in what you do.
  15. Whose? What file? You will have to provide specific details for any determination to be made.
  16. Definitely BS Scam. Generic data but more importantly, the malicious actor did not obfuscate the email distribution list. Thus you were not the only one who got this so the graphic is only that of coincidence. IFF this was a targeted backdoor attack, and you were the target then the extortion email would not be sent to a distribution list but to you alone. Purely coincidence.
  17. Thank you. I have it. Now you can delete the attachment or the forum Admin. can redact it for you.
  18. @Rukasumi Please find that extortion email. Extract it in .EML format. Place it in a ZIP, RAR or 7zip Archive and attach it in your next reply.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.