Jump to content

exile360

Experts
  • Content Count

    22,937
  • Joined

  • Last visited

About exile360

  • Rank
    exile

Recent Profile Visitors

115,350 profile views
  1. Greetings, To create a ticket with Support you do not need to log in. You simply need to fill out the form on the bottom of this page and Malwarebytes Support will respond to you via email. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  2. Nothing yet unfortunately, but based on what I've been hearing from Support it is likely that this issue should be addressed in the next release of Malwarebytes assuming the Developers have been able to find a solution. That said, I don't know when the next version of Malwarebytes is set to be released so I would suggest keeping an eye on this area of the forums as they always announce the new releases in a pinned topic at the top of this area.
  3. Greetings, I took a look at the logs you posted in the other forum and what concerns me is the fact that no file/process is shown for the blocks. If it were just ads being blocked or something else benign like that then your web browser's process should be shown as the process/file being blocked but instead there is nothing. This makes me think that it's possible your system is infected with some kind of bot, Trojan or other malware which may be hidden and is reaching out to the blocked websites. Assuming you haven't done so already, please open Malwarebytes and navigate to Settings>Protection and under Scan Options toggle the option Scan for rootkits to On and then return to the Dashboard tab and click Scan Now. Allow the scan to complete and have Malwarebytes remove anything it detects. Hopefully it will find whatever is reaching out to these websites. If nothing was found then please try running ADWCleaner and likewise scan with it and have it remove anything it detects, restarting your system if prompted to do so to complete the removal process.
  4. Greetings, I already posted this in another thread, but if you haven't tried yet, I'd suggest disabling fast startup to see if that resolves the issue. You'll find additional information and instructions on how to do so here as well as here.
  5. Excellent, I am glad I could help. If there is anything else we might assist you with please let us know. Thanks
  6. Precisely. Yes, they could disable it (though it would likewise require flashing the chip), and while there is a way to disable the ME by effectively deleting all of its functions except for the very basic one that tells the CPU/BIOS that the ME is present (a requirement for the system to boot at all unfortunately), I don't think Intel or any other vendor is going to be anxious to provide a means of doing so any time soon. It has been with us for quite some time now and I expect it to continue to be there for the foreseeable future and I believe it is there for a reason that extends far beyond the management of business devices in corporate environments.
  7. Exactly, and what's so frustrating about all of this is that these vulnerabilities wouldn't even exist had Intel, AMD and whoever else has lead this initiative for these kinds of secretive technologies in CPUs hadn't pushed so hard to get this technology into every single chip they've made since the late 2000's. I have my suspicions as to why they exist on such a large scale but there's no need to stir things up. I'll just say that I believe it is a horrible mistake and that it is going to lead to severe consequences for everyone if and when the bad guys discover a method to deploy attacks remotely to these devices (assuming they have not already done so). Intel's excuse has always been that this feature only exists for the sake of their business and enterprise customers for systems management, but then why does the ME exist in every single chip they have created, including those explicitly for gamers/enthusiasts as well as consumers? If this were truly intended to be only for businesses then they would have deployed it sparingly only in the chips where it makes sense for those markets just like they did with technologies like vPro and VT, yet they went to the trouble and cost of putting this technology and the associated software into every single chip they made unlike those features. It is obvious there must be another reason that they aren't anxious to expose publicly, which also explains why they have always been so secretive about the technology to begin with. To be clear, an exploit that successfully infiltrates the ME can power on your system remotely even if the device is completely powered off, can run without booting the operating system, can run completely undetected by the operating system, and has full read and write access to every storage device, all of the system memory/RAM, and all networking components attached to the system and can utilize their functions completely unseen by the OS and any software running within the OS. This means that no antivirus, software firewall, rootkit detection software, deep level forensics/monitoring software/tools can even see this activity much less do anything to prevent it or stop it once in progress. I am far more concerned about the threat posed by the existence of the ME than I am any of the recently discovered side channel vulnerabilities such as Spectre and Meltdown. What Intel and AMD have created in their chips is a bullet proof, invisible backdoor into every device that runs on one of their chips, and they aren't the only ones; the cell phones and other devices that use ARM chips have the same kinds of technology built into them as well. Intel's ME just happens to be the one that gets the most attention due to Intel's notoriety, the popularity of their chips, and the fact that this was the first of these hidden components discovered and made public. Besides all of that, what happens when the bad guys get access to AI that is capable of testing and developing new attack methods to unlock 0-day vulnerabilities that no one knows about and they then employ those newly discovered tactics in new weaponized malware? No data will be safe neither will any government, public or infrastructural systems/devices that contain the vulnerable technology/chips. Such an attack will make WannaCry look like a minuscule practical joke compared to the widespread devastation they could cause, especially since patching any vulnerability in the ME is so complex; it's not something Microsoft can just push out a patch for through Windows Update, and even the process of patching can brick a system completely, rendering it unbootable if anything goes wrong during the process.
  8. You may need to post about this in the Website Blocking FP area so that the Research team can investigate and whitelist the site assuming it's safe.
  9. Greetings, Yes, you'll most likely need to wait to hear back from Support as they have direct access to the licensing system and should be able to get the other licenses associated with your account. They will also let you know if you need to deactivate/reactivate any of the licenses on their existing devices/installations, but more than likely this won't be necessary. I'm sorry that we can't do more, but obviously access to the licensing system is restricted for security and privacy reasons. Anyway, if there is anything else we might assist you with please don't hesitate to let us know. Thanks
  10. Excellent, I'm glad that it worked. At this point you basically have two choices; it is up to you which solution best suits your needs: 1. Leave Ransomware Protection off from now on to eliminate the performance issues. While this obviously reduces your level of protection, as I mentioned previously this component of Malwarebytes is far less proactive than the others and is very unlikely to detect any threats that the other modules would not have prevented beforehand so it is largely redundant (I keep this module disabled on my own systems for similar reasons as it tends to impact performance and have not had a single threat get through). 2. Remove Acronis or simply disable its automated backups/background processes. While this obviously reduces its usefulness for keeping your data backed up, as long as you remember to make regular backups manually (something you should be able to do even if Acronis' scheduled/automated backups are disabled) then it shouldn't be much of a risk. In fact, you can probably change Acronis' settings to stop doing the constant backups whenever anything is changed/disable its background monitoring and instead schedule something like a daily or weekly backup so that your backups are still kept current without you needing to remember to run the backups manually and as long as the backups are able to complete even with Ransomware Protection enabled (though the system may perform slowly while the backups are running) then it should be OK; otherwise you could simply disable Ransomware Protection temporarily while running the backups manually or just remember to disable Ransomware Protection whenever your scheduled backups are going to start. You may need to do some additional testing with Acronis and Malwarebytes to see how they behave and how the system performs to determine which method would be best. Obviously neither solution is ideal, but for the time being those seem to be the only real options. You could pursue a different backup solution to see if it fares any better than Acronis, however there is no guarantee that it would not suffer from the same issues. There are several alternatives available such as Macrium, Paragon, EasUS etc. There are several listed in this article and most if not all of them provide some kind of free version or free trial allowing you to try them out before deciding.
  11. Greetings, It looks like from your logs that the issue you were researching occurred at the same time as the crashes for Malwarebytes and the Asus program so I believe that whatever caused that crash is what caused all 3 of the programs to crash. That said, I would recommend removing Java if you don't require it for anything as it is known to be frequently targeted by malicious exploits. If you wish to do so, go ahead and run the Java Uninstall Tool found here and it should remove all Java components from your system. I hope this helps and if there is anything else we might assist you with please let us know. Thanks
  12. Please fill out the form on the bottom of this page to contact Malwarebytes Support if you have not done so already. Once they are able to respond, they will be able to resolve the problem so that you may activate Malwarebytes with your license.
  13. Excellent, you're very welcome. I'm glad you were able to get the problem resolved and that Malwarebytes is back up and running on your new install. If there is anything else you need our help with please don't hesitate to ask.
  14. Greetings, I would recommend signing up for an account at My.Malwarebytes.com using, if possible, the same email address you used when you originally purchased your license (this makes synchronizing your license key to your account much easier) and then using the available options there to deactivate any past installation/device to free up your license once more so that you may activate the software with your license key. Instructions on signing up can be found in this support article and additional information on how to deactivate your past installation/device so that you may use it on your new Windows installation can be found in this support article. Further info on how to use the My Account feature to manage your licenses and devices can be found in this support article. If you still have any trouble getting your license to work or getting it to show up in your account at My.Malwarebytes.com then please refer to the information in this support article which shows how to add an existing lifetime license key to your account. If it still won't work for some reason then please contact Malwarebytes Support directly via the form on the bottom of this page and they will reset your license key so that you may activate it on your current system/Windows installation. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  15. Greetings, Yes, that shouldn't be a problem. Simply refer to the information in this support article or just contact Malwarebytes Support directly by filling out the form at the bottom of this page to cancel your existing subscription/disable auto-renewal and once that is done, go ahead and purchase the 3 device license for the discounted price and you should be all set. Once you have acquired your 3 device license be sure to sign up at My.Malwarebytes.com so that you can manage your licenses/devices there as it makes it much easier to keep track of your licenses/installations as well as moving a license from one device to another (if, for example you replaced one of your 3 devices at some point and needed to move that instance of Malwarebytes from the older device to a newer one that replaced it). You'll find further information on signing up in this support article and additional info on managing devices and licenses through the My Account feature in this support article as well as this support article. I hope this helps, and if there is anything else we might assist you with please don't hesitate to let us know. Thanks
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.