Jump to content

itman

Most Valued Members
  • Posts

    12,195
  • Joined

  • Last visited

  • Days Won

    320

Posts posted by itman

  1. Eset offers two versions of LiveGuard; one available in consumer products and one available for Eset commercial products. The version available for commercial products is titled LiveGuard Advanced and is a subscription service. LiveGuard Advanced offers features and protection not available on consumer product versions such as the ability to configure malware detection sensitivity level and detection response actions.

    Refer to this Eset article on LiveGuard Advanced: https://help.eset.com/elga/en-US/overview.html .

  2. Is this a Mac PC? Detection name is associated with Mac based adware.

    In any case, it's classified as adware;

    Quote

    Adware/Genieo!OSX is classified as a type of adware.

    Adware is any software package that automatically displays advertisements while the program is running. Adware is often not malicious, but unwanted, and a user is often unaware of its being installed on the local machine.

    The Fortinet Antivirus Analyst Team is constantly updating our descriptions. Please check the FortiGuard Encyclopedia regularly for updates.

    https://www.fortiguard.com/encyclopedia/virus/8057659

    If Eset is detecting it, there must be a malicious component to the adware.

    If the Eset alert occurs when a web site is accessed, assume the adware is being generated from the web site server which Eset doesn't have access to.

    On the other hand, this adware can be bundled with other downloaded software. In this case, assume its been installed either stand-alone or within other legit software.

  3. 4 hours ago, IK4 said:

    /System/Library/PrivateFrameworks/CloudKitDaemon.framework/Support/cloudd

    It appears this is the source of the malicious script injection Eset is detecting. Since its a system process, Eset can't access it to perform remediation;

    Quote

    What is Cloudd on Mac?

    Cloudd on Mac, like most processes ending with a d, is a daemon that runs in the background and handles system tasks. It is closely related to CloudKit, as the man page tells us. If you want to check the man page yourself, execute the following command in Terminal.man cloudd

    Cloudkit is Apple's framework that allows macOS and third-party apps to store data on iCloud for syncing to other devices. It can also be used to sync your Mac's desktop and documents to other devices. The Cloudd process works whenever an application syncs data to or from iCloud on your Mac. You can locate Cloudd by opening Finder, clicking Go > Go to Folder from the top, and entering /system/library/privateframeworks/cloudkitdaemon.framework/support/cloudd.

    https://iboysoft.com/wiki/cloudd.html

  4. On 2/6/2024 at 4:06 PM, amber438 said:

    Thats strange because I've had mbam and eset together for years without issues.

    MBAM now registers itself in Microsoft Security Center as the active Win real-time solution just as Eset does. This is bound to lead to erratic and borked registration behavior as observed.

    This article: https://support.malwarebytes.com/hc/en-us/articles/360039024313-Register-Malwarebytes-for-Windows-v4-with-the-Windows-Security-Center shows how to disable MBAM Microsoft Security Center registration. This said, MBAM real-time scanning should be permanently disabled, which will do the same, as it's bound to conflict w/East real-time scanning in other ways.

  5. 1 hour ago, NewToThis said:

    Since none of the scans have actually found the xworm payload and have only found the initial .bat files from the archive, does that mean I should be in the clear

    Did you actually extract the archive and run the .bat or any other executables in the extracted archive folder? If the answer is no, you are OK.

    The key item here is if the archive was extracted or not. If the archive has been extracted and you didn't do so manually, assume malware did so.

  6. 1 hour ago, Marcos said:

    That's expected cause we've blacklisted the site with the JS malware that was detected.

    The problem is I could fully access the web site w/o issue. No alert and no blocked access.

    1 hour ago, Marcos said:

    Now the new malware JS/Agent.RJZ trojan is detected on the main page as shown above.

    Correct. Alert now shown and web site access blocked.

  7. 10 minutes ago, Marcos said:

    You should be getting an alert like this:

    Strange. I am not getting any alert, but Eset Web Filtering is detecting and blocking it;

    Time;URL;Status;Detection;Application;User;IP address;Hash
    2/5/2024 9:22:22 AM;https://near.flyspecialline.com;Blocked;Internal blacklist;C:\Program Files\Mozilla Firefox\firefox.exe;xxxxxxxx;2606:4700:3033::6815:4c11;ACC1CEC6D99C83F3D99BC4D0FEFC058D349CA731

  8. 4 hours ago, Chawkes said:

    Also if I use the secure all browsers option (turn it ON), I start to experience random jumbled letters in what I type on screen

    The usual reason for this behavior is if additional anti-keylogger software such as KeyScrambler is installed on the device. This type of software will conflict with anti-keylogger protection of Secured browser feature.

  9. Since "unfortunate souls" keep posting in the forum about a way to decrypt their files w/o using Eset to prevent the ransomware in the first place, the following might be informative. Note that this tool applies to cryptor's that perform partial file encrytion and only for a limited number of file extension types;

    Quote

    CyberArk has created an online version of 'White Phoenix,' an open-source ransomware decryptor targeting operations using intermittent encryption.

    The company announced today that although the tool was already freely available through GitHub as a Python project, they felt an online version was needed for the less tech-savvy ransomware victims who don't know how to work with the code.

    Using the online White Phoenix is as simple as uploading files, hitting the "recover" button, and allowing the tool some time to restore whatever it can.

    Currently, the tool supports PDFs, Word and Excel document files, ZIPs, and PowerPoint. Also, the online version has a file size limit of 10MB, so if you're looking to decrypt larger files or virtual machines (VMs), the GitHub version is the only way to go.

    https://www.bleepingcomputer.com/news/security/online-ransomware-decryptor-helps-recover-partially-encrypted-files/

    Quote

    It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit.

    Intermittent encryption occurs when ransomware chooses not to encrypt every part of each file but instead encrypts sections, frequently in blocks of a set size or just the start of the targeted files.

    https://www.helpnetsecurity.com/2024/01/31/free-ransomware-recovery-tool-white-phoenix-web-version/

    White Phoenix web site here:https://getmyfileback.com/

×
×
  • Create New...