Jump to content

BlueSquares

Members
  • Posts

    11
  • Joined

  • Last visited

Everything posted by BlueSquares

  1. Yes, appears to be a Browser Guard block. I'm getting it for their main domain as well. Website Blocked: telnyx.com v2.6.10 | Phishing: 2.0.202309261717 Malwarebytes Browser Guard blocked this page because it may contain malicious activity.
  2. I'm getting hits every 10-15 seconds for Phishing for rtc.telnyx.com (192.76.120.58) Logs attached. Virustotal says the IP and URL is clean: https://www.virustotal.com/gui/ip-address/192.76.120.58 https://www.virustotal.com/gui/url/783ec00160144c35e4b43d2dfa3cd9d81f5ee2c0be2c5072bece2cb64833a5a5?nocache=1 And I do not see a blacklist hit at https://whatismyipaddress.com/blacklist-check I'm not sure if it's a false positive. But maybe the MB team can check? The popups are frustrating. telnyx.txt
  3. Malwarebytes blocked a compromised site Your Malwarebytes Premium blocked this website because it may be compromised. -Website Data- Category: Compromised Domain: embed.getwally.net IP Address: 159.65.49.101 Port: 443 Type: Outbound File: C:\Program Files\Google\Chrome\Application\chrome.exe We strongly recommend you do not continue. Log attached. VirusTotal for the site: https://www.virustotal.com/gui/url/2a90f7dd0abccc5866ff61add5a7cb71cf94c01d539ff1d223dc563401bba692?nocache=1 wally.txt
  4. This is my VPN software and suddenly these files are being flagged. No one else is flagging it. https://www.virustotal.com/gui/file/0414c6cc3fe30f6baf019e30148a6c841358b6f3ab570b4419812eb7350b6a19 https://www.virustotal.com/gui/file/586aeb0fb1fb7d686a137774f0a83daf8b5268cc9073ec78729a525de4ba1fff RiskWare.DllInjector, C:\PROGRAM FILES (X86)\ATOM\ATOMSDKDEPENDENCYINSTALLERS\SIMPLEINJECTOR.DLL, No Action By User, 9247, 1176980, 1.0.75109, , ame, , 799368D49236DE4022D232FBB6A4DE38, 0414C6CC3FE30F6BAF019E30148A6C841358B6F3AB570B4419812EB7350B6A19 RiskWare.DllInjector, C:\PROGRAM FILES (X86)\IVACY\SIMPLEINJECTOR.DLL, No Action By User, 9247, 1176980, 1.0.75109, , ame, , FDDF7C367D424D2960F309FB6C9ADB84, 586AEB0FB1FB7D686A137774F0A83DAF8B5268CC9073EC78729A525DE4BA1FFF
  5. After rebooting, I can confirm it is NOT fixed yet with updates. All errors/popups are back. URL: https://block.malwarebytes.com/?lic=Licensed&cat=Malware&lang=en&prod=MBAM-C&ver=4.5.14.210&cpv=1.0.1767&upv=1.0.60359&ldr=perpetual&ip=172.217.15.196&url=www.google.com 503 ERROR The request could not be satisfied. The Lambda function associated with the CloudFront distribution was throttled. We can't connect to the server for this app or website at this time. There might be too much traffic or a configuration error. Try again later, or contact the app or website owner. If you provide content to customers through CloudFront, you can find steps to troubleshoot and help prevent this error by reviewing the CloudFront documentation. Generated by cloudfront (CloudFront) Request ID: E3MW6UAFks9zGocyCI-9PM3GoyuSgq7iVIBaP7w39Jp3uFxg50WqhQ==
  6. This is what I get in Chrome trying to go to www.google.com. Anyone else?
  7. That's how I did it (from inside the main app). But the actual google.com main, front page website is down when I try to open it in a browser.
  8. Fixed for me just now. They just released an update.
  9. Same here. They're popping up every 60 seconds or so. There's no way to stop the alerts from appearing and it's frustrating. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 6/3/18 Protection Event Time: 2:10 PM Log File: 6f481e34-6759-11e8-a782-b8ca3a84019b.json Administrator: Yes -Software Information- Version: 3.5.1.2522 Components Version: 1.0.365 Update Package Version: 1.0.5342 License: Premium -System Information- OS: Windows 10 (Build 17134.48) CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , , Blocked, [-1], [-1],0.0.0 -Website Data- Category: RiskWare Domain: bam.nr-data.net IP Address: 162.247.242.21 Port: [49833] Type: Outbound File: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (end)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.