Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by Mark_Albrosco

  1. Hi - we're using the Cloud Endpoint protection. The following is taken from the two endpoints that received the blocked website notice; are they at the most current versions/database? The EPP update differed for the two units. If not can one manually run an update of the DB for the Cloud EP? Engine Version: Last Refreshed: 07/21/2020 8:49:25 AM Asset Manager: Endpoint Protection: Endpoint Protection Protection Update: 1.0.17190 / 1.0.17170
  2. Morning - the following site came up as a blocked site; VirusTotal scans of the URL returned "Clean" from all engines </ fp-afd.azurefd.net /> Regards Mark
  3. Morning - the following sites came up as blocked sites; VirusTotal scans of the URL returned "Clean" from all engines </lubychina.com/> </airtechusa.com/> Regards Mark
  4. Received blocked website notices for </pl15364254.passtechusa.com/> and </www.hiprofitnetworks.com/> VirusTotal scan returned one hit for "Spam" from Spamhaus engine for ESET the first site above (passtechusa); and "Clean / No engines detected this URL" for the second one (hiprofitnetworks). Would like to know if these are valid blocks or not. The EP protection report is attached.
  5. Thanks TeMerc - so the block is valid. MWB keeping us safe from even those on the fringes.
  6. Morning - received blocked website notification for the site in the subject line. Attached is a screen shot of the EP protection report. I'd like to know if it's a false-positive. VirusTotal scan for the URL returned one hit from ESET as "Suspicious".
  7. Thanks Zynthesist, I'm assuming that the DB version is equal to the Endpoint Protection Update. I checked two other endpoints that experienced the same "blocked site" notices on the previous day. Their Endpoint Protection Update is now at 1.0.14775, and no further "blocked site" notices were received. I'm waiting on the scheduled tasks to "Check for Protection Updates" and "Refresh Assets" to be executed.
  8. Hi - Thanks for the notice. I checked one of the endpoints against my own unit. What Protection Update version contains the fix? My unit carries Endpoint Protection Update 1.0.14769, while the endpoint that experienced the "blocked site" notice is at 1.0.14753. I've scheduled a Task to check for protection updates in the meantime.
  9. We have Malwarebytes Cloud Endpoint deployed at our site. A number of endpoints were reported as having "blocked websites" for </login.live.com/> and carried a few different IP addresses: I checked the URL on VirusTotal and the results came back as "clean".
  10. Good day - would like to know if the following site is actually a malicious site or is it safe: <googlecm.hit.gemius.pl> IP address = Reported as a blocked website by MWB Cloud Protection. It was not detected by any engines in a Virus Total scan of the URL. Found forum entries that suggest a link to Coinhive bit coin miner. Looking forward to your guidance. Thanks, Mark
  11. I have scheduled reporting setup, and they were being received via email up to 17-May-2019. Manually generated reports are working; email is received. Just scheduled reports are not. Urgent assistance required to reinstate this feature. Thanks - Mark
  12. Morning - looking to confirm that the following sites are indeed malicious sites croissed.info lucklayed.info Virus Total results flagged them for Malware (by Avira and ESET) Thanks - Mark
  13. MAM - re: your question on reason for using it. I have a HIK Vision NVR, and want to view it remotely from my PC using the iVMS 4500 application. But the application is meant for mobile device OS platforms. When I searched for the iVMS 4500 download for Windows 10, it was suggested that I install bluestacks and this would allow the iVMS 4500 application to run in the emulator on the PC.
  14. Considering downloading the Blue Stacks Apps Player from www.bluestacks.com to use for security camera viewer (HIK vision's iVMS 4500). Virus Total listed the site as safe 0/66, the community has a +34 score - 84 thumbs up and 33 thumbs down. Appreciate any help I can get.
  15. Completely understandable TonyCummins ...I shall wait for Zynthesist to add his "two cents". Cheers.
  16. Wow...thanks Tony - I've alerted the sender to what we've been experiencing. I'm guessing even the sender is unaware of that tracking mechanism embedded in the image. Should I recommend that they remove the image as it has been identified as the source of the issue?
  17. Below is an image of the only area that contains any links in the email - hovering over the URLs shows a link that matches the hypertext (so it's not a redirect to a bad site). The section above the contact info, is an image - hovering over it does not show any link. Would you be willing to look directly at the attachment in one of my earlier posts? Maybe I'm missing something?
  18. Thanks Zynthesist - the host (onlykem) is a supplier; users get email from them on occasion. As soon as the email is opened, the user receives "blocked site" notifications. They haven't clicked any links in the email, so I'm having trouble understanding what about the email is causing the attempts to launch the site. I'm suspecting maybe the images in the signature line, or something of that nature, might be the culprit? But I was hoping Malwarebytes Labs could confirm Maybe I should inform the supplier of the experience?
  19. @KDawg @Karland - so I got a fresh detection today of the same PUP. I checked my detection history and it's the same registry entry each time. I deleted it from quarantine again. After reading the article suggested by KDawg, I could not narrow it down to a specific browser; so I followed the steps suggested for a possible "root kit" infection. The policy for the endpoints has "Scan Rootkits" disabled; I enabled it and ran a scan of the specific device - results came back with 0 threats detected. How do I kick this up to "Support"?
  20. Good day - would like to know if the following site is actually a malicious site or is it safe: <ns-1739.awsdns-25.co.uk> IP address = This was detected on our primary domain controller; executed by dns.exe Thanks, Mark
  21. Hi Miekie - below is the status of our endpoints re: Malwarebytes Version and Protection Update Version. Is it safe to assume that the Protection Update Version is more important than the Malwarebytes engine version? There were 15 "false-positive" detections regarding VSTAPROJECT.DLL. 9 of these were in Quarantine and restored. 5 were under "Remediation Required" - I opted to remediate: will it place the file in Quarantine and allow us to restore? What can I expect to happen here? 1 was under "Detections" - submitted a fresh scan+quarantine...or is no action required h
  22. Hi David - anyway to know if the analysis of the email attachment is in progress?
  23. @KDawg issue resolved; followed your steps to the letter and scan feature returned. Thanks again!
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.