Jump to content

David H. Lipman

Experts
  • Content Count

    14,838
  • Joined

  • Days Won

    1

Everything posted by David H. Lipman

  1. Same here. I think it's because the Forum 'ware is trying to render a preview and fails thus the problem noted.
  2. Upgrade to MBAM v3.8.x It corrects connectivity issues. RE: MB3.8 is here
  3. Syntax can play a role in whether it works or doesn't. In you submission you used HTML tags and didn't use a space between the code and the URL such as... <code>http://google.com</code> Because of that the HTTP URI wasn't interpreted and it doesn't become a live link. I checked the malicious Domain in question and it immediately redirects to Google. Either it requires a Referral from a malvertiser to render a FakeAlert or there is more to the URL than just the Domain name. Is there anything else ?
  4. This is not generated by malware nor a PUP. This is a kind of malicious advertisement ( aka; malvertisement ). This is a Google/Microsoft FakeAlert for a Tech Support scam. I have created a 1series of videos generated from these kinds of fraud sites for the purposes of recognition and education. They are all videos from real web sites. ALL are FRAUDS. All these have one thing in common and they have nothing to do with any software on your PC. They are all nefarious web sites meant to defraud you of money. The objective is to, falsely, goad you to make the phone call and pay for some service contract for an incident that never happened. From there they may continue to charge your Credit Card for other services, remote into your computer and do real damage and/or exfiltrate your personal data and they may use the information they obtain from you to commit additional frauds. MalwareScam.wmv MalwareScam-1.wmv MalwareScam-2.wmv MalwareScam-3.wmv MalwareScam-4.wmv MalwareScam-5.wmv MalwareScam-6.wmv I have also created a PDF ScreenShow of a myriad of FakeAlert screens - FakeAlert-Screens.pdf / Flash Version Reference: US FBI PSA - Tech Support Fraud US FTC Consumer Information - Tech Support Scams US FTC - Tech Support Operators Agree to Settle Charges by FTC and the State of Ohio US FTC - FTC and Federal, State and International Partners Announce Major Crackdown on Tech Support Scams Malwarebytes' Blog - Search on - "tech support scams" Malwarebytes' Blog - "Tech support scams: help and resource page" 1. Also located at "My Online Security" - Some videos of typical tech support scams
  5. BTW: The syntax for obfuscating a URL is... [code] URL [/code] example: [code] http://blende.xyz [/code] Yields... http://blende.xyz not <code> URL </code>
  6. The problem I see would be False Positives and possible loss of some content. I have seen no problems indicating the Mozilla Firefox Add-In can't be removed if one is dissatisfied with it.
  7. @Fluttershy79 Yes - False Positive. The binary is Digitally signed by Malwarebytes and Malwarebytes uses the services of Amazon.
  8. Cecile: Thanks for now allowing this user capability.
  9. These web sites are created and dissolved in short order. To block the sites MBAM has to know the URL to block it. There are two Browser Add-ins that are now in Beta that are Malwarebytes is implementing to block the malicious actions these sites perform; Malwarebytes for Firefox and Malwarebytes for Chrome
  10. I just installed v3.8.3.2965 and it wanted to do a reboot at the beginning of the installation process. Even with a reboot, the bug elaborated in; v3.8.1 context menu - old bug still a problem continues to haunt MBAM when upgrading the software.
  11. It sounds like a Tech Support scam with a faulty Microsoft FakeAlert web site. These fraud sites are deliberately coded badly in such a way you think that there is something wrong with the PC to gad you to call a phone number and get paid-for support or download some rogue anti malware solution. I have created a 1series of videos generated from these kinds of fraud sites for the purposes of recognition and education. They are all videos from real web sites. ALL are FRAUDS. All these have one thing in common and they have nothing to do with any software on your PC. They are all nefarious web sites meant to defraud you of money. The objective is to, falsely, goad you to make the phone call and pay for some service contract for an incident that never happened. From there they may continue to charge your Credit Card for other services, remote into your computer and do real damage and/or exfiltrate your personal data and they may use the information they obtain from you to commit additional frauds. MalwareScam.wmv MalwareScam-1.wmv MalwareScam-2.wmv MalwareScam-3.wmv MalwareScam-4.wmv MalwareScam-5.wmv MalwareScam-6.wmv I have also created a PDF ScreenShow of a myriad of FakeAlert screens - FakeAlert-Screens.pdf / Flash Version They are all a kind of malicious advertisement ( aka; malvertisement ). If you do find the URL to one of these sites, please do submit it in; Newest IP or URL Threats after reading; READ ME: Purpose of this forum Reference: US FBI PSA - Tech Support Fraud US FTC Consumer Information - Tech Support Scams US FTC - Tech Support Operators Agree to Settle Charges by FTC and the State of Ohio US FTC - FTC and Federal, State and International Partners Announce Major Crackdown on Tech Support Scams Malwarebytes' Blog - Search on - "tech support scams" Malwarebytes' Blog - "Tech support scams: help and resource page" 1. Also located at "My Online Security" - Some videos of typical tech support scams
  12. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Unfortunately, there is nothing can be used from the email. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Ransom Scam still current
  13. RE: v3.8.1 context menu - old bug still a problem - S2D2 It is tiresome to have to toggle the setting for the Context Menu every time. If I can toggle the GUI setting to re-enable the functionality w/o rebooting, it can be done in the software w/o forcing a reboot.
  14. Excellent photos. Thanx for posting them Ron.
  15. Ethernet adapters are always safe. Same with Token Ring, ArcNET and other topologies. It doen't make a difference if it a PCI, PCIe, USB or embedded chipset. It is the network protocols such as TCP/IP ( HTTP/HTTP, FTP, NNTP, SMTP, NFS, etc ) that can be exploited and can make using them unsafe. They can't retain malware. It is the Operating System that gets infected and thus affected. Mice are an Input only device. Nothing is stored in them.
  16. In addition to what Ron has posted, please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Ransom Scam still current
  17. RE: https://support.microsoft.com/en-us/help/4284826/windows-7-update-kb4284826 Look on the left, " In this release " June 11, 2019—KB4503292 (Monthly Rollup) Applies to: Windows 7 Service Pack 1Windows Server 2008 R2 Service Pack 1
  18. RE: Post #11 from 1/21/'19 One old bug still recurring... Prior to an in situ upgrade, Context Menu item "Scan with Malwarebytes" was enabled and present. After the version upgrade, Context Menu item "Scan with Malwarebytes" was enabled but was NOT present. Had to toggle the setting for the Context Menu [ Disable and then Enable ] for it to again be present.
  19. Ok. Please reference; Microsoft Operating Systems BlueKeep Vulnerability To mitigate the possibility of the RDP vulnerability being exploited, make sure all you systems, referenced by OS in the above, are patched.
  20. Yes, they are safe. Anti static bags are apropos for components. However we are dealing with completed products where all the components are all soldered or cabled together.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.