Jump to content


  • Content Count

  • Joined

  • Last visited

About Mark_Albrosco

  • Rank
    Regular Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Thanks Zynthesist, I'm assuming that the DB version is equal to the Endpoint Protection Update. I checked two other endpoints that experienced the same "blocked site" notices on the previous day. Their Endpoint Protection Update is now at 1.0.14775, and no further "blocked site" notices were received. I'm waiting on the scheduled tasks to "Check for Protection Updates" and "Refresh Assets" to be executed.
  2. Hi - Thanks for the notice. I checked one of the endpoints against my own unit. What Protection Update version contains the fix? My unit carries Endpoint Protection Update 1.0.14769, while the endpoint that experienced the "blocked site" notice is at 1.0.14753. I've scheduled a Task to check for protection updates in the meantime.
  3. We have Malwarebytes Cloud Endpoint deployed at our site. A number of endpoints were reported as having "blocked websites" for </login.live.com/> and carried a few different IP addresses: I checked the URL on VirusTotal and the results came back as "clean".
  4. Good day - would like to know if the following site is actually a malicious site or is it safe: <googlecm.hit.gemius.pl> IP address = Reported as a blocked website by MWB Cloud Protection. It was not detected by any engines in a Virus Total scan of the URL. Found forum entries that suggest a link to Coinhive bit coin miner. Looking forward to your guidance. Thanks, Mark
  5. I have scheduled reporting setup, and they were being received via email up to 17-May-2019. Manually generated reports are working; email is received. Just scheduled reports are not. Urgent assistance required to reinstate this feature. Thanks - Mark
  6. Morning - looking to confirm that the following sites are indeed malicious sites croissed.info lucklayed.info Virus Total results flagged them for Malware (by Avira and ESET) Thanks - Mark
  7. MAM - re: your question on reason for using it. I have a HIK Vision NVR, and want to view it remotely from my PC using the iVMS 4500 application. But the application is meant for mobile device OS platforms. When I searched for the iVMS 4500 download for Windows 10, it was suggested that I install bluestacks and this would allow the iVMS 4500 application to run in the emulator on the PC.
  8. Considering downloading the Blue Stacks Apps Player from www.bluestacks.com to use for security camera viewer (HIK vision's iVMS 4500). Virus Total listed the site as safe 0/66, the community has a +34 score - 84 thumbs up and 33 thumbs down. Appreciate any help I can get.
  9. Completely understandable TonyCummins ...I shall wait for Zynthesist to add his "two cents". Cheers.
  10. Wow...thanks Tony - I've alerted the sender to what we've been experiencing. I'm guessing even the sender is unaware of that tracking mechanism embedded in the image. Should I recommend that they remove the image as it has been identified as the source of the issue?
  11. Below is an image of the only area that contains any links in the email - hovering over the URLs shows a link that matches the hypertext (so it's not a redirect to a bad site). The section above the contact info, is an image - hovering over it does not show any link. Would you be willing to look directly at the attachment in one of my earlier posts? Maybe I'm missing something?
  12. Thanks Zynthesist - the host (onlykem) is a supplier; users get email from them on occasion. As soon as the email is opened, the user receives "blocked site" notifications. They haven't clicked any links in the email, so I'm having trouble understanding what about the email is causing the attempts to launch the site. I'm suspecting maybe the images in the signature line, or something of that nature, might be the culprit? But I was hoping Malwarebytes Labs could confirm Maybe I should inform the supplier of the experience?
  13. @KDawg @Karland - so I got a fresh detection today of the same PUP. I checked my detection history and it's the same registry entry each time. I deleted it from quarantine again. After reading the article suggested by KDawg, I could not narrow it down to a specific browser; so I followed the steps suggested for a possible "root kit" infection. The policy for the endpoints has "Scan Rootkits" disabled; I enabled it and ran a scan of the specific device - results came back with 0 threats detected. How do I kick this up to "Support"?
  14. Good day - would like to know if the following site is actually a malicious site or is it safe: <ns-1739.awsdns-25.co.uk> IP address = This was detected on our primary domain controller; executed by dns.exe Thanks, Mark
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.