Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Poisoned Emails

Poisoned Emails

Scheduled Pinned Locked Moved The Lounge
javascriptquestionlearning
49 Posts 17 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    I and family members have seen a nasty increase in malware emails that most likely will plant a Ransom Virus if the attachment is acted upon. We now get several every week and sometimes several in one day. One of the most insidious is an email where the sender is spoofed to be Amazon. The "Amazon" message will seem to announce a shipment having been sent. However, there are two tell tale warning signs: 1) It is sent to an email address that only my friends and family know. I use a different email address for Amazon. 2) The message is empty, except for an attached Word document. Amazon never attaches Word documents to their emails. Like I'm going to open such a Word document and run the risk of a malicious macro getting run on my machine. :| The other type will be an empty email from myself to myself. It has an attached zip file that contains a Javascript file. If you look into the message header it is full of Arabic characters and is sent from a domain in Iran. Of course I am in the habit of running Javascripts from unknown sources on my machine. :| Now here's the bummer: If I scan these obviously malicious messages with Defender and Malwarebytes, they come up clean! I was wondering if anyone else has had similar experiences?

    Get me coffee and no one gets hurt!

    M Offline
    M Offline
    mllarson
    wrote on last edited by
    #17

    Had the exact e-mail before. A good metric to see what scanners are good is to upload the attachment to http://www.virustotal.com and see which scanners detect it. Neither MalwareBytes nor Symantec picked it up when I checked awhile ago.

    L M 2 Replies Last reply
    0
    • M mllarson

      Had the exact e-mail before. A good metric to see what scanners are good is to upload the attachment to http://www.virustotal.com and see which scanners detect it. Neither MalwareBytes nor Symantec picked it up when I checked awhile ago.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #18

      The VirusTotal page does not exist!

      Get me coffee and no one gets hurt!

      M 1 Reply Last reply
      0
      • L Lost User

        The VirusTotal page does not exist!

        Get me coffee and no one gets hurt!

        M Offline
        M Offline
        mllarson
        wrote on last edited by
        #19

        Never posted a link here before. It did something like codeproject.com/virustotal.com :laugh: I changed the link to just be the full address that you can copy and paste.

        L 1 Reply Last reply
        0
        • M mllarson

          Never posted a link here before. It did something like codeproject.com/virustotal.com :laugh: I changed the link to just be the full address that you can copy and paste.

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #20

          OK, I reached the page by typing virustotal.com in the URL bar. Thanks for the reference! Your post deserves an upvote. :)

          Get me coffee and no one gets hurt!

          1 Reply Last reply
          0
          • L Lost User

            Quote:

            But I prefer the "If in doubt, delete" method.

            Precisely! Same here. But maintaining good backups does not hurt. Ransom viruses are also spread by hacked "good" websites. There is always the risk of visiting a supposedly safe website that has been hacked.

            Get me coffee and no one gets hurt!

            F Offline
            F Offline
            Foothill
            wrote on last edited by
            #21

            Cornelius Henning wrote:

            Ransom viruses are also spread by hacked "good" websites.

            This is the exact reason why I typically use Firefox with NoScript and AdBlockPlus (extended with my own personal filters). It has made the internet a pretty spartan place and there are some websites that don't even load anymore but I consider any website that will not fulfill its basic purpose without scripts or linking to 12 other sites as poor web design and not worth my time (and by basic purpose, I mean displaying information). If I need the full capabilities of a website, I turn on what is needed or switch over to Chrome. The end result is that I have ultimate control of what web content is allowed to run on my PC.

            if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

            L M 2 Replies Last reply
            0
            • F Foothill

              Cornelius Henning wrote:

              Ransom viruses are also spread by hacked "good" websites.

              This is the exact reason why I typically use Firefox with NoScript and AdBlockPlus (extended with my own personal filters). It has made the internet a pretty spartan place and there are some websites that don't even load anymore but I consider any website that will not fulfill its basic purpose without scripts or linking to 12 other sites as poor web design and not worth my time (and by basic purpose, I mean displaying information). If I need the full capabilities of a website, I turn on what is needed or switch over to Chrome. The end result is that I have ultimate control of what web content is allowed to run on my PC.

              if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #22

              Quote:

              It has made the internet a pretty spartan place

              This is so unnecessary! See this thread: The Lounge - CodeProject[^] Especially the item by John Simmons on HOSTS files. Shameless plug: Also see my article about surviving the Ransom Virus. If you are properly prepared, you can surf the Internet without fear. :)

              Get me coffee and no one gets hurt!

              F 1 Reply Last reply
              0
              • F Foothill

                Cornelius Henning wrote:

                Ransom viruses are also spread by hacked "good" websites.

                This is the exact reason why I typically use Firefox with NoScript and AdBlockPlus (extended with my own personal filters). It has made the internet a pretty spartan place and there are some websites that don't even load anymore but I consider any website that will not fulfill its basic purpose without scripts or linking to 12 other sites as poor web design and not worth my time (and by basic purpose, I mean displaying information). If I need the full capabilities of a website, I turn on what is needed or switch over to Chrome. The end result is that I have ultimate control of what web content is allowed to run on my PC.

                if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                M Offline
                M Offline
                Mark_Wallace
                wrote on last edited by
                #23

                But why worry? If your own, personal files (which are a tiny proportion of the files on your PC) and your configuration details for various programs (which don't amount to five beans' worth of disc space) are saved to other locations, then all you lose is an OS -- and I'd be quite happy to lose any OS higher than Win 7. Just use another machine while the "attacked" one is getting everything reinstalled and copied over, and you haven't lost a peanut.

                I wanna be a eunuchs developer! Pass me a bread knife!

                L F 2 Replies Last reply
                0
                • L Lost User

                  Quote:

                  It has made the internet a pretty spartan place

                  This is so unnecessary! See this thread: The Lounge - CodeProject[^] Especially the item by John Simmons on HOSTS files. Shameless plug: Also see my article about surviving the Ransom Virus. If you are properly prepared, you can surf the Internet without fear. :)

                  Get me coffee and no one gets hurt!

                  F Offline
                  F Offline
                  Foothill
                  wrote on last edited by
                  #24

                  I am in total agreement with that. All that unnecessary junk steals my bandwidth even if my browser settings block it from being rendered. If I may also play devils advocate, I also understand that many websites depend on advertisements to supply their operating capital BUT the broad spectrum tactics that most ad services utilize, showing you a million ads in hope that you click one, is reliant on quantity and not quality. In my opinion, one or two high-quality, content-targeted ads per page is more than enough. Three dozen ads trying to sell me the latest pharmaceutical product or another product that I have no need for is a waste of money on both ends and does the advertising industry a disservice.

                  if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                  1 Reply Last reply
                  0
                  • M Mark_Wallace

                    But why worry? If your own, personal files (which are a tiny proportion of the files on your PC) and your configuration details for various programs (which don't amount to five beans' worth of disc space) are saved to other locations, then all you lose is an OS -- and I'd be quite happy to lose any OS higher than Win 7. Just use another machine while the "attacked" one is getting everything reinstalled and copied over, and you haven't lost a peanut.

                    I wanna be a eunuchs developer! Pass me a bread knife!

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #25

                    Mark, When I am attacked by Ransomware, it takes me less than 10 minutes to totally recover and clear my computer of the virus. (It has happened 3 times.) If data files are corrupted by the virus, add the time to overwrite the corrupted files from a backup that was disconnected at the time of the attack. Can you beat that? If yes: I would love to hear how!

                    Get me coffee and no one gets hurt!

                    F M 2 Replies Last reply
                    0
                    • M Mark_Wallace

                      But why worry? If your own, personal files (which are a tiny proportion of the files on your PC) and your configuration details for various programs (which don't amount to five beans' worth of disc space) are saved to other locations, then all you lose is an OS -- and I'd be quite happy to lose any OS higher than Win 7. Just use another machine while the "attacked" one is getting everything reinstalled and copied over, and you haven't lost a peanut.

                      I wanna be a eunuchs developer! Pass me a bread knife!

                      F Offline
                      F Offline
                      Foothill
                      wrote on last edited by
                      #26

                      Mark_Wallace wrote:

                      Just use another machine while the "attacked" one is getting everything reinstalled and copied over, and you haven't lost a peanut.

                      This is an option at work but I only have one computer at home (and I've hand built the thing into a real monster). Since I really don't like being without a computer at home or have to wait for my work PC to be re-imaged, I take a few extra steps to prevent my machines from being infected due to someone else's unwillingness to filter their advertising content before presenting it to me. I know that this approach only filters out all the 3rd party ads and any ads 'native' to the website are still displayed.

                      if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                      M 1 Reply Last reply
                      0
                      • L Lost User

                        Mark, When I am attacked by Ransomware, it takes me less than 10 minutes to totally recover and clear my computer of the virus. (It has happened 3 times.) If data files are corrupted by the virus, add the time to overwrite the corrupted files from a backup that was disconnected at the time of the attack. Can you beat that? If yes: I would love to hear how!

                        Get me coffee and no one gets hurt!

                        F Offline
                        F Offline
                        Foothill
                        wrote on last edited by
                        #27

                        Are you backing up to a NAS?

                        if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                        L 1 Reply Last reply
                        0
                        • F Foothill

                          Mark_Wallace wrote:

                          Just use another machine while the "attacked" one is getting everything reinstalled and copied over, and you haven't lost a peanut.

                          This is an option at work but I only have one computer at home (and I've hand built the thing into a real monster). Since I really don't like being without a computer at home or have to wait for my work PC to be re-imaged, I take a few extra steps to prevent my machines from being infected due to someone else's unwillingness to filter their advertising content before presenting it to me. I know that this approach only filters out all the 3rd party ads and any ads 'native' to the website are still displayed.

                          if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                          M Offline
                          M Offline
                          Mark_Wallace
                          wrote on last edited by
                          #28

                          Hell, you can save everything important to one or more SD cards or memory sticks. These attackers can't follow back-up trails and locations, especially if it involves removable media. Look carefully at what it is that makes your computer to be Your Computer, and get a back-up program to back it up while you're sleeping. Formatting a drive and re-installing stuff is no great hardship. It's losing what's your own that's a pain, but that's easy to protect against.

                          I wanna be a eunuchs developer! Pass me a bread knife!

                          F 1 Reply Last reply
                          0
                          • L Lost User

                            Mark, When I am attacked by Ransomware, it takes me less than 10 minutes to totally recover and clear my computer of the virus. (It has happened 3 times.) If data files are corrupted by the virus, add the time to overwrite the corrupted files from a backup that was disconnected at the time of the attack. Can you beat that? If yes: I would love to hear how!

                            Get me coffee and no one gets hurt!

                            M Offline
                            M Offline
                            Mark_Wallace
                            wrote on last edited by
                            #29

                            Unfortunately, C, I can't give you timing data, because I've never been daft enough to get infected in the first place! [Ambles away, whistling the theme to Goldfinger)

                            I wanna be a eunuchs developer! Pass me a bread knife!

                            L 1 Reply Last reply
                            0
                            • F Foothill

                              Are you backing up to a NAS?

                              if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                              L Offline
                              L Offline
                              Lost User
                              wrote on last edited by
                              #30

                              Quote:

                              Are you backing up to a NAS?

                              Nooooo! A Ransom virus will encrypt all files on the network, especially files in servers or a NAS! Look what happened to the hospital in LA, who was forced to pay $17,000 to have files on their network unencrypted. You need to back up to an "air gap" device, that is only briefly connected to the network while the backup is being saved. That applies to backing up data files, as well as system drive images that are vital in case of an attack.

                              Get me coffee and no one gets hurt!

                              F 1 Reply Last reply
                              0
                              • M Mark_Wallace

                                Hell, you can save everything important to one or more SD cards or memory sticks. These attackers can't follow back-up trails and locations, especially if it involves removable media. Look carefully at what it is that makes your computer to be Your Computer, and get a back-up program to back it up while you're sleeping. Formatting a drive and re-installing stuff is no great hardship. It's losing what's your own that's a pain, but that's easy to protect against.

                                I wanna be a eunuchs developer! Pass me a bread knife!

                                F Offline
                                F Offline
                                Foothill
                                wrote on last edited by
                                #31

                                That's a good point. 64GB or higher flash drives are relatively inexpensive and you can plug them into one of the mobo's usb ports. I could easily fit local files onto one. I don't think ransomeware encrypts executable files or libraries yet so no need to back those up. Heck, I could just write a program myself to perform the backup.

                                if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                                L 1 Reply Last reply
                                0
                                • M mllarson

                                  Had the exact e-mail before. A good metric to see what scanners are good is to upload the attachment to http://www.virustotal.com and see which scanners detect it. Neither MalwareBytes nor Symantec picked it up when I checked awhile ago.

                                  M Offline
                                  M Offline
                                  Mark_Wallace
                                  wrote on last edited by
                                  #32

                                  Um, clicking a button on a web-site that purports to tell you if a file is OK might not be a wise thing to do.

                                  I wanna be a eunuchs developer! Pass me a bread knife!

                                  M 1 Reply Last reply
                                  0
                                  • M Mark_Wallace

                                    Unfortunately, C, I can't give you timing data, because I've never been daft enough to get infected in the first place! [Ambles away, whistling the theme to Goldfinger)

                                    I wanna be a eunuchs developer! Pass me a bread knife!

                                    L Offline
                                    L Offline
                                    Lost User
                                    wrote on last edited by
                                    #33

                                    Quote:

                                    I've never been daft enough

                                    Mark, Innocent websites that you trust may become infected through hacking. If you browse to such a trusted website, are your prepared for the consequences?

                                    Get me coffee and no one gets hurt!

                                    M 1 Reply Last reply
                                    0
                                    • F Foothill

                                      That's a good point. 64GB or higher flash drives are relatively inexpensive and you can plug them into one of the mobo's usb ports. I could easily fit local files onto one. I don't think ransomeware encrypts executable files or libraries yet so no need to back those up. Heck, I could just write a program myself to perform the backup.

                                      if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                                      L Offline
                                      L Offline
                                      Lost User
                                      wrote on last edited by
                                      #34

                                      Re-imaging your systems drive may take 10 minutes and will completely get rid of the virus if done right. How does that compare with the time to re-install an entire operating system and all apps?

                                      Get me coffee and no one gets hurt!

                                      M 1 Reply Last reply
                                      0
                                      • L Lost User

                                        Quote:

                                        I've never been daft enough

                                        Mark, Innocent websites that you trust may become infected through hacking. If you browse to such a trusted website, are your prepared for the consequences?

                                        Get me coffee and no one gets hurt!

                                        M Offline
                                        M Offline
                                        Mark_Wallace
                                        wrote on last edited by
                                        #35

                                        You'd probably be surprised at how few sites I visit (on my own machines -- on work machines, who gives a banana?. I mean, the Interwebs are only useful for knowledge that you don't already have, and that's mostly a curiosity thing (and curiosity kills computers) The people who get hit by these viri are mostly facebookers and twatters. The rest of us aren't so dumb, so the scare stories don't apply to us.

                                        I wanna be a eunuchs developer! Pass me a bread knife!

                                        1 Reply Last reply
                                        0
                                        • L Lost User

                                          Quote:

                                          Are you backing up to a NAS?

                                          Nooooo! A Ransom virus will encrypt all files on the network, especially files in servers or a NAS! Look what happened to the hospital in LA, who was forced to pay $17,000 to have files on their network unencrypted. You need to back up to an "air gap" device, that is only briefly connected to the network while the backup is being saved. That applies to backing up data files, as well as system drive images that are vital in case of an attack.

                                          Get me coffee and no one gets hurt!

                                          F Offline
                                          F Offline
                                          Foothill
                                          wrote on last edited by
                                          #36

                                          Air gap backups seem like a lot of trouble for my home since there really isn't much there that I couldn't go without and now they have malware designed to target 'air gapped' computers (Microtrend article). I guess the only way to prevent such attacks is not to become a target.

                                          if (Object.DividedByZero == true) { Universe.Implode(); } Meus ratio ex fortis machina. Simplicitatis de formae ac munus. -Foothill, 2016

                                          L 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups