Jump to content

RetiredTech

Members
  • Content Count

    27
  • Joined

  • Last visited

Community Reputation

0 Neutral

About RetiredTech

  • Rank
    New Member

Profile Information

  • Location
    Western Michigan
  1. Root Admin's solution makes the most sense. Browser guard was installed but Sync was turned on in Chrome browser and possibly not cleared out. I will attempt a Sync logout and clean things up again.
  2. I have found several of my clients who all are using Malwarebytes Pro Version and have had there browser infected with a url called "accessblocked.azurewebsites.net" It admonishes them to NOT turn off the computer and lists itself as Microsoft Support with a phone number to contact. The fake support then requests a credit card to effect the repair. They don't understand why Malwarebytes did not block the website. The website continually reconnects itself so there is no opportunity to back out of the display other than exiting the browser via task manager with a delete of the browser task. I am
  3. I just installed the Version 4 upgrade and was looking around the new interface and noticed that there was a single "Allow List" entry with an unknown IP address. I am not aware that I have ever entered an IP address that allowed a website to be skipped with Malwarebytes. The IP address is owned by a Russian company. The IP address is 91.226.116.137. Has anyone ever heard of this or know what it might be? Could it have been entered remotely? Kaspersky addresses are not in this range. I thought it very peculiar.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.