Jump to content

vanished

Members
  • Posts

    9
  • Joined

  • Last visited

Reputation

0 Neutral
  1. I already had done a scan on Malwarebytes and it showed that it's clean. Anything else I should be doing?
  2. Hi AdvancedSetup, those have been helpful, but I have had those settings turned off from the beginning, and I've forgotten the network earlier. What else do I need to check on my phone to make sure that nothing malicious has happened (e.g anything malicious being downloaded when it connected, or anything stolen off my phone) - assuming the best case scenario that I have just connected to the network accidentally? Thanks!
  3. My android connected to a public WiFi without me triggering anything, and I only found out about it when I have left the place. Of course, it is likely that an accidental click happened in my pocket, as the WiFi was an unsecured one. I've also double-checked if I have any auto-join-esque features turned on, like Hotspot 2.0, but I don't. So for my peace of mind... what else could I check to know that I wasn't tampered with? I've scanned with Malwarebytes, Google Play Protect, and Samsung's in-built security scanner. I've checked for newly installed apps, newly added files and found nothing (unless there are more thorough ways to check). Nothing in my downloads folder, didn't find anything suspicious in my browser or chat history... is there anything else I could do to have that peace of mind, without resorting to nuking my whole phone and changing all my passwords? Is there also a way for me to check HOW I connected my phone to the WiFi in the first place, or was it triggered by some malicious actor? Thanks a bunch!
  4. Hey David! Don't get me wrong, but I just am not too comfortable sharing any of it to a stranger. However, using what you said, I have did my own research/learning on the topic of analysing an EML file. Through my own analysis I think I wasn't phished and the email was from xXcompanyXx. So really, thanks for pointing me in that direction! Knowing that I wasn't phished, I guess the only questions remains is that if the act of me opening the HTML, getting redirected to the office365 site, me uploading a document, and replying has any potential security flaws in the journey that I need to check for? Virustotal/Avira came back clean for the HTML file, so I supposed that opening the HTML was fine. Redirection to the O365 site seemed fine too I guess, since I didn't input any passwords, just an OTP? I don't know if allowing a file to be uploaded from my computer to an online portal triggered by a downloaded HTML file can pose any problems or if I'm just being overly paranoid on this last one haha. Either ways, thanks so much for the help!
  5. Hi David, thanks for taking the time to reply! Upon further digging, I have a feeling that this was what xXcompanyXx was attempting (assuming it's legit). I found two .gov documents on Google ( https://file.lacounty.gov/SDSInter/dmh/1076478_HowtoOpenanOutlookEncryptedEmail.pdf and https://tax.vermont.gov/help/technical-assistance/encrypted-email ) that seemed to illustrate the exact process I went through. Since they are .gov sites, I'm assuming they may paint this is a legit but (as you said) arcane method? It seems like VirusTotal came back with a negative. Other than that and Avira, what software would be good to try to run a scan with? Avast? Yes, they have mentioned a few times in prior emails that if I need to email them any documents, they will send instructions that allow me to send them through a "secure portal". Also, I have emailed xXcompanyXx through regular email, and they confirmed that they have received my files and the email was legitimate. However, I have an irrational fear of their email being spoofed. Not only that, while I am certain they are a legitimate company, is there a possibility of any bad actors accessing any other files on my computer when I added an attachment to the outlook.office365.com/Encryption site? Worse, what if the company is trusted but their methods may have security holes that put my device at risk? Like you said, the methods did seem arcane... hmm. How does one check that btw? Thank you so much for taking the time to reply to my question.
  6. Also, apologies, I just realized that this section of the board is for Windows Computers only. Please move it to somewhere more appropriate if this is not allowed here.
  7. Hey friends, Recently I've went through a lengthy process for a legal thing with a company (let us refer to them as... uh, xXcompanyXx). At some point, they requested some personal documents and sent me an apparently encrypted email for me to reply to. Absent-mindedly, I did it... only to worry if I potentially fell victim to a phishing attempt or have downloaded a piece of malware. Looking up some videos, this seemed to be a legitimate thing by Microsoft, but the steps in most of them were different (e.g: https://www.youtube.com/watch?v=RyaJ8eNoYpk ) where the user first received an email that had a link to the encrypted email, whereas in my case, it was an email with a HTML file that first needed to be downloaded and opened before I got the instructions to the encrypted mail ( e.g: https://www.youtube.com/watch?v=w_z_YPiuAVI ). So just for the peace of mind, I'm going to share you my steps just to see if there's anything suspicious. 1) Email received from xXcompanyXx.com, with the instruction to download the included "message.html" file. 2) I downloaded the file to my Mac (MacOS 12.6.3) and opened it locally from my "Downloads" folder. 3) The file asked me to sign in with an OTP - clicking that led me to a legitimate looking website with a URL that started with "outlook.office365.com/Encryption". Site seemed legit and their security was verified by DigiCert. 4) I received a legit-looking email from MicrosoftOffice365@messaging.microsoft.com with my OTP. 5) I entered the OTP and viewed the email, which even included my email history with this address prior to this encrypted message. The email's URL also started with "outlook.office365.com/Encryption". 6) I attached my documents, hit reply, and then signed out. Now, after performing all these, I got a bit paranoid, so I ran a few checks on my computer. a) I scanned the "message.html" file with both Malwarebytes and Avira. Nothing found. b) I deleted the html file, and then scanned my entire Mac with both Malwarebytes and Avira. Nothing found. c) I triple-checked through my browser history for the links I've been through, and if any rogue downloads have happened. All seemed good. d) I tripled-checked to see if any suspicious files have been created on my Mac. None found. e) I checked for any rogue installations under System Report > Installations. None found. Now, with all these information, does it seem like I have nothing to worry about? Or, are there more tests that I could do to see if I was infected by anything? Also based on my steps, I don't think I was phished, right? Hope I could get some opinions on this here. Thanks y'all, Vanished.
  8. Was wondering if anyone had experienced the same issue. I had a fresh install of Malwarebytes Free (version 3.9.1.68). It came with the Premium Trial (without an option for me to skip it). Realized that certain settings (like "Scan after Update"), once turned off, will turn itself back on again the next morning. Not a fan of settings not saving. Was wondering if this was tied to the Premium Trial, or a bug of the app in general? Have uninstalled the app due to the annoyance, but out of curiousity (and peace of mind) would like to know if anyone else had faced the same issue? Thanks all.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.