Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. I can see two different sub-forums as they are programmed differently and will have different bugs and errors. As one can see the Chrome extension is live but the Firefox version has been temporarily pulled. This demonstrates that division. I can see one False Positive reporting sub-forum in the Malwarebytes Browser Guard for both Chrome and Firefox so as to clearly identify and separate F/P Reporting for them
  2. They are both malvertisements. The first is for a software update that purports to be Adobe Flash but it is not. It will install Adware or some Potentially unwanted software or actual malware. The second is an Apple FakeAlert for some product. They have nothing to do with any software on your PC. Examples: FakeAlert-Screens.pdf / Flash Version Here are videos demonstrating Apple FakeAlerts used to goad Apple device users to download Advanced MAC Cleaner and MyMobileSecure VPN solution. Apple FakeAlert leads to Advanced MAC Cleaner Rogue AV software Apple FakeAlert leads to MyMobileSecure VPN solution You can't quarantine web sites. You need to look at your Browsing habits and what sites you visited when you got these malvertisements and try to avoid them if possible.
  3. Yes. I have repeated it because the problem gets re-posted over and over and the answer doesn't change. I will try to update the text as things change though.
  4. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. This is the way they know the password. Through a data breach where the harvested data is then sold or bartered. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Blackmail Scam still current
  5. Email clients aren't a vulnerability. Yes, certain email client software may fall to a software vulnerability that may be exploitable but they are few and far between and there is a myriad of email clients. The true vulnerability is the email recipient themselves. Many forms of malicious emails use Social Engineering which is the human exploit. The vulnerability is falling for a Phishing email or, what we were previously discussing, a sextortion email. The vulnerability is the susceptibility for falling for Social Engineering ploys.
  6. The email headers are forged and thus... pointless.
  7. Yes. Many frauds are created, placed in a template and are subsequently sold or bartered.
  8. Very, very, conditional. The sending email client can mark the email to receive a "Delivery Notification" and/or a "Read Receipt". The email system and the email client may act on them or they may not. By default the email recipient client software will deny "Read Receipt" and depending on the email client the recipient may get a message to the effect of (paraphrased ) "The sender has requested a Read Receipt, do you accept?". It is totally up to the system of the email recipient if a "Delivery Notification" is generated or not. Most do not.
  9. I have downgraded and lost nothing. Try deleting the ShortCut and then recreating it.
  10. All versions... http://ftp.mozilla.org/pub/firefox/releases/
  11. New email, still current Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $528 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: 1ELKdWgfed################pKSqcCjM After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards!
  12. Malvertising is not meant to harvest information per se. It is meant to present some kind of Social Engineering fraud. It could be; You Won, Your software X needs to be updated, it could be a fake news report pushing some Snake Oil product or it could be a FakeAlert. Some Examples of FakeAlerts: FakeAlert-Screens.pdf / Flash Version There are different flavours of Ransomware and they have different target audiences. It's all about the money ( in BitCoin form ). Obviously a corporate victim would get a higher value ransom that an individual. " Was I right that if I had clicked on any of the "alarm" buttons on this particular "You have won," then there could have been either identity theft or ransomware behind it? " Doubtful. They might try get you to divulge Personally Identifiable Information ( PII ) to use in other schemes and/or they could try to push a Snake Oil Remedy, get you to use some product, access a particular web site or other objective to obtain affiliate revenue. Different scam have different results and you are mixing them all up.
  13. The extortion email is a fraud. What they claim is a fraud. Just delete them.
  14. Anything in your Profile Downloads and you don't know about, just delete. Keyloggers ==> Malwarebytes.
  15. Q: I usually by cheap mice or earphones. Is there any danger in buying the cheapest equipment by non-top brands made in China? Maybe.... Depends on the vendor. Buy only through a well known, established, vendor. Buying cheap products from a "fly by night" would pose a greater risk. Q: And another question comes to my mind: I have some files/folders with multiple files on my computer which I don't remember neither where they came from, nor what they are. Is there a way to find out what those files are? That's too broad a question to answer. It would depend upon where those files/folders are located, what the File Types are ( Documents, Media, Executable, etc ) and the file dates may bring clarity to the question.
  16. Q: Is it better to have more e-mail accounts, or fewer (or even 1)? Have as many as you want or as few as you want. It is not better or worse. It is whatever works for you, Q: Obviously I should use different passwords everywhere. But what about logins? Should I use a different login on every website/app? Yes. Reduce victimization by being less predictable. Q: Personal details I enter on various websites should be fake whenever possible, I presume? Enter NO personal details. Q: Creating accounts on online stores (like Amazon, E-bay, Aliexpress, local ones and alike). Is it okay to have an account (which obviously will have to have my real details, including my address) or should I use "guest" accounts whenever it is possible? Guest when possible and don't store Credit Card with the site. When possible, don't even create an account. Q: Malwarebytes Web[somethingDon'tRememberExactly] extension. Should I use it and is there any benefit to me using it if I already have Malwarebytes Premium? Yes. They are no longer Beta and act on web sites other than what Malwarebytes Premium does. Q: VPN. Should I use it? If yes, when should I use it? Yes. But the VPN provider must be fully vetted as what you are blocking others from seeing, THEY ( the VPN provider ) will see. VPNs are only needed if you use a mobile platform and jump onto Public WiFi. Q: If yes, which ones could be considered best/safest ones (I was looking into Windscribe)? I don't have an answer but I am sure another responder will.
  17. So, how is the End User supposed to know where to go ?
  18. It is a malvertisement and is web based and not based upon what's on your device. However, the malvertising web site will use the device's User-Agent and GeoIP to perform victim specific targeting.
  19. That's what I mean. Is F/P reporting now bifurcated ? If it is, I suggest a F/P Reporting sub-forum in Malwarebytes Browser Guard specifically for Browser Extension Add-Ons.
  20. Are F/P Reporting for web sites intended to be bifurcated between here and Malwarebytes Browser Guard - ( Chrome and Firefox ) ?
  21. You mean that non malicious, WikiMedia, web site that hosts legitimate sound bites ? Why do you think it is a malicious site that you have to worry about their sound bites ? If you thought it was malicious, why did you post the site so it is a live, clickable, link ? Think !
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.