Jump to content


Trusted Advisors
  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by Firefox

  1. Hello and Welcome @IvanIvanovich Sorry for your issues and I can certainly understand your frustration. Tickets are handled in a first come first server basis and they are quite busy at the help desk. @AdvancedSetup may be able to help you with the matter as well.
  2. The United Kingdom’s National Cyber Security Centre (NCSC) has released their 2019 Active Cyber Defence (ACD) report, which provides an analysis of program outcomes throughout 2018. NCSC’s ACD program—stood up in 2016—seeks to reduce harm from commodity cyberattacks against the United Kingdom. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review NCSC’s report for more information. Source: https://www.us-cert.gov/ncas/current-activity/2019/07/16/ncsc-releases-2019-active-cyber-defence-report
  3. Glad to hear your issue was resolved. Thanks for letting us know.
  4. The United Kingdom’s National Cyber Security Centre (NCSC) has released an advisory about an ongoing Domain Name System (DNS) hijacking campaign. The advisory details risks and mitigations for organizations to defend against this campaign, in which attackers use compromised credentials to modify the location to which an organization’s domain name resources resolve to redirect users, obtain sensitive information, and cause man-in-the-middle attacks. The Cybersecurity and Infrastructure Security Agency (CISA) encourages administrators to review the NCSC Advisory, apply the recommended mitigations, and refer to CISA’s Alert AA19-024A – DNS Infrastructure Hijacking Campaign for more information. Source: https://www.us-cert.gov/ncas/current-activity/2019/07/12/ncsc-releases-advisory-ongoing-dns-hijacking-campaign
  5. Greetings, @arbrich Please do the following so that we may take a closer look at what is going on with your system to try and solve the problem: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply Thanks
  6. IIRC, if the software has already downloaded the installer for the update, even turning it off will still prompt for an update. You have to go to the folder below and delete the downloaded installer: C:\ProgramData\Malwarebytes\MBAMService\instlrupdate
  7. Activate Malwarebytes for Windows Premium https://support.malwarebytes.com/docs/DOC-1142
  8. Hello and Welcome! If you purchased for 2 computers, then on the second computer, simply DOWNLOAD the installer on the 2nd computer, and then activate it using your KEY.
  9. Thanks for posting this @David H. Lipman currently don't use any D-Link equipment, nor do I know anyone that does.
  10. Try this link https://www.reddit.com/r/sysadmin/comments/c89fa4/cloudflare_outage_again/
  11. FYI, in case some folks are having issues getting to some website
  12. If you feel that you are infected, you can get help from the experts by following the topic below.
  13. Glad you got it sorted out, for the benefit of others that may find this topic, you mind sharing what you did to solve your issue?
  14. Looks like something went wrong during our upgrade. I suggest you do a clean re-install to get fixed up. Using the same support tool you used to collect the logs.. Go to the Advanced Section, and Choose Clean After your perform these steps and reboot your computer if your still having issues let us know. Thank you
  15. The United Kingdom (UK) National Cyber Security Centre (NCSC) has released an advisory, Ryuk Ransomware Targeting Organisations Globally, on their ongoing investigation into global Ryuk ransomware campaigns and associated Emotet and TrickBot malware. The Cybersecurity and Infrastructure Security Agency (CISA) encourages administrators to review the NCSC advisory and the following for more information: Alert TA18-201A: Emotet Malware Multi-State Information Sharing and Analysis Center (MS-ISAC) White Paper: Security Primer – TrickBot Protecting Against Ransomware Source: https://www.us-cert.gov/ncas/current-activity/2019/06/28/ncsc-releases-advisory-ryuk-ransomware
  16. Another sample i know ######## one of yŏųr pass words. Lets get straight to pųrposě. Nŏ persŏn hås paid mě to investigate you. Yoų dŏ not know me and yoų åre probably thinking why you're getting thіs e mail? i plåced a software on thě 18+ vіds (porno) website and there's morě, you vіsited this sіte tŏ expěriěnce fųn (yŏu know what i mean). While you were watching vіdeos, your wěb browsěr begån opěratіng as å Remote cŏntrol Děsktŏp wіth a keylogger which providedme access to yoųr dіsplay screen and wěb camera. åfter that, my software gåthěred all yoųr contåcts from your Messěnger, Faceboŏk, as wěll as e-mail . and then і creatěd a double-screen viděo. 1st part shows the videŏ you were wåtchіng (you've got a nice taste: )), and second part displays the viěw of your cam, yeå its u. Yŏu have two options. Why dŏnt we take a look at these sŏlutions in dětåils: First choice іs tŏ disregard thіs e-mail. in this situatiŏn, i will send yŏur viděo recording to ěach of your your persŏnal contåcts and thus yŏu can easily imagine regarding the shåme that yŏu receіve. Not to mention if you åre in a rŏmantic rělationship,precisely hŏw іt will ěventually åffect? Nųmber 2 solųtion will be to give me $1996. Let us namě it as a donatіon. іn this scenårio, i will asap discard your video fŏotage. Yŏu can go fŏrward yŏur dåіly rŏųtine like this never occurred and you never will hear back ågåin from me. Yoų'll måke thě payměnt through Bitcoіn (if yŏu do not know thіs, seårch 'hŏw to buy bitcoіn' in Google). BTC åddress to send to: ################################### [CaSe-SeNSіTіVe, cŏpy & paste іt] Should you are lookіng at going to the police, well, this email cannŏt bě traced back to me. і havě taken carě ŏf my åctiŏns. і am not tryіng to chårge a fěě a lot, i woųld likě to be påіd fŏr. і've a special pixel in this email, and at this moměnt i know thåtyoų have reåd through this ě-mail. Yoų havě ŏne day in ŏrder tŏ pay. іf і do not rěceive the BitCoіns, i wіll definitěly send yŏur videŏ tŏ all of yŏur contacts including frіends and famіly, co-wŏrkěrs, and so ŏn. Nŏněthelěss, if i do gět paіd, i wіll destroythe vіdeŏ right awåy. Thіs іs the non:negŏtiåble offer, so dŏn't wåste my timě and yours by replyіng to thіs messåge. if you want tŏ have proŏf, reply with Yea! & і wіll send out your vіdeo recording tŏ your 8 contacts. 
  17. Hello and Welcome @joonkit95 Sorry your having issues, please provide the requested logs from the bot above so the team can help you better. The section under technical issues..
  18. A digital intrusion at PCM Inc., a major U.S.-based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. El Segundo, Calif. based PCM [NASDAQ:PCMI] is a provider of technology products, services and solutions to businesses as well as state and federal governments. PCM has nearly 4,000 employees, more than 2,000 customers, and generated approximately $2.2 billion in revenue in 2018. Sources say PCM discovered the intrusion in mid-May 2019. Those sources say the attackers stole administrative credentials that PCM uses to manage client accounts within Office 365, a cloud-based file and email sharing service run by Microsoft Corp. One security expert at a PCM customer who was recently notified about the incident said the intruders appeared primarily interested in stealing information that could be used to conduct gift card fraud at various retailers and financial institutions. In that respect, the motivations of the attackers seem similar to the goals of intruders who breached Indian IT outsourcing giant Wipro Ltd. earlier this year. In April, KrebsOnSecurity broke the news that the Wipro intruders appeared to be after anything they could quickly turn into cash, and used their access to harvest gift card information from a number of the company’s customers. It’s unclear whether PCM was a follow-on victim from the Wipro breach, or if it was attacked separately. As noted in that April story, PCM was one of the companies targeted by the same hacking group that compromised Wipro...………………….. Full Story can by found HERE? https://krebsonsecurity.com/2019/06/breach-at-cloud-solution-provider-pcm-inc/
  19. First you will have to contact support, and have them disable Auto renew on the one you don't want to, and then on the one you did renew, get the $10 one and apply that key to your husbands computer. Staff can correct me if I am wrong.
  20. In the search icon on the taskbar type winver.exe and then click on the search result that is found. It will tell you what version of windows your on, this way we will know if you have to re-run the app to upgrade or not.
  21. Hello and Welcome, please provide these logs so the team can get a better look at what may be going on. If you haven’t already done so, please run the Malwarebytes Support Tool and then attach the logs in your next reply: NOTE: The tools and the information obtained is safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system. Download Malwarebytes Support Tool Once the file is downloaded, open your Downloads folder/location of the downloaded file Double-click mb-support-X.X.X.XXXX.exe to run the program You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent. Place a checkmark next to Accept License Agreement and click Next You will be presented with a page stating, "Get Started!" Click the Advanced tab Click the Gather Logs button A progress bar will appear and the program will proceed with getting logs from your computer Upon completion, a file named mbst-grab-results.zip will be saved to your Desktop. Click OK Please attach the file in your next reply.
  22. Awe, many thanks for that information, it will help the masses that come here with that issue.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.