Posts

Presenoker – detected plus random pop ups

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Hello! Been dodging viruses since 2006 since my last post here, but alas, now kids are in the picture and I have returned for assistance.

 

Windows defender has detected Presenoker, and there are several popups appearing from time to time. Any assistance is greatly appreciated. Thanks! Plus, bonus for me if we can remove any of the Dell bloatware and/or Mcafee bloatware in the process as well!

 

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 07-08-2021
Ran by lilly (administrator) on DESKTOP-S59AR56 (Dell Inc. Inspiron 3593) (07-08-2021 23:15:50)
Running from C:UserslillyDownloads
Loaded Profiles: lilly
Platform: Windows 10 Home Version 20H2 19042.1110 (X64) Language: English (United States)
Default browser: Chrome
Boot Mode: Normal

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Dell Inc -> ) C:Program Files (x86)DellUpdateServiceServiceShell.exe
(Dell Inc -> Dell INC.) C:Program FilesDellSARemediationagentDellSupportAssistRemedationService.exe
(Dell Inc -> Dell Inc.) C:Program FilesDellSupportAssistAgentbinSupportAssistAgent.exe
(Dell Technologies Inc. -> Dell Technologies Inc.) C:Program FilesDellDellDataVaultDDVCollectorSvcApi.exe
(Dell Technologies Inc. -> Dell Technologies Inc.) C:Program FilesDellDellDataVaultDDVDataCollector.exe
(Dell Technologies Inc. -> Dell Technologies Inc.) C:Program FilesDellDellDataVaultDDVRulesProcessor.exe
(Intel Corporation -> Intel Corporation) C:WindowsSystem32DriverStoreFileRepositorydptf_cpu.inf_amd64_1da48d5885266bb7dptf_helper.exe
(Intel Corporation -> Intel Corporation) C:WindowsSystem32DriverStoreFileRepositorydptf_cpu.inf_amd64_1da48d5885266bb7esif_uf.exe
(Intel® Embedded Subsystems and IP Blocks Group -> Intel Corporation) C:WindowsSystem32DriverStoreFileRepositorydal.inf_amd64_ffc75848a6342fdfjhi_service.exe
(Intel® Embedded Subsystems and IP Blocks Group -> Intel Corporation) C:WindowsSystem32DriverStoreFileRepositorylms.inf_amd64_c0fd909ca6e7d672LMS.exe
(Intel® pGFX -> )…

Source…

42 million malicious programs detected targeting China in 2020, mostly from US and India: report

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Cyber theft Photo: Xinhua

Cyber theft Photo: Xinhua

China has captured more than 42 million malicious program samples in 2020, with an average daily spread of more than 4.82 million times. The overseas sources of these malicious program samples were mainly the US and India, according to the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) on Wednesday.

This report comes as the US and its allies ramp up efforts to turn cyberspace into a new battlefield by groundlessly accusing China of conducting cyberattacks worldwide. Such groundless accusations will not change the fact that the US remains the world’s top spying empire with widespread malfeasance in cyberspace, observers said. 

About 55.41 million IP addresses in China were attacked by malicious programs, accounting for 14.2 percent of the total number of IP addresses in the country. These attacked IP addresses are mainly based in East China’s Shandong, Jiangsu, Zhejiang and South China’s Guangdong, the report said. 

Over the years China has been a major victim of cyberattacks. According to the annual report by CNCERT/CC, in 2020 about 5.31 million hosts on the Chinese mainland were controlled by a total of about 52,000 overseas malicious program command and control servers. The top three origins of these overseas servers in terms of the number of compromised Chinese hosts are all from NATO member states, according to a statement from the Chinese Mission to the European Union (EU) in response to the accusations.

The Global Times learned from Chinese tech giant 360 Security Technology last year of a series of attacks against China’s aerospace, scientific research institutions, petroleum industry and large-scale internet companies by a hacking organization affiliated with the CIA. The company found proof that the hacking group, APT-C-39, belongs to the CIA, and the hack was traced back to 2008, mainly targeting organizations in Beijing, South China’s Guangdong and East China’s Zhejiang provinces. 

Global Times

Source…

More Mac malware was detected last year than ever before

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


There has been a significant increase in the amount of malware targeting macOS devices over the past 12 months, new research has claimed.

A report from Atlas VPN found that the development of macOS malware surged by 1,092% in 2020 as hackers increasingly targeting Apple’s computing devices, including the all-new M1 Macs. 

Source…

Over 100 million malware infections detected on Windows in 2020

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Share


According to data analyzed by Atlas VPN, in 2020 devices with Windows operating systems were affected by over 111 million malware infections.

Out of all of the Windows malware threats detected last year, 83% or nearly 92.3 million were found on consumer devices, while 15% or 16.7 million were discovered on business devices. The remaining 2% of the malware cases were unspecified.

Malware, a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system, is one of the most common cyber threats computer users face today. While malware can affect any operating system, Windows users are among the most vulnerable.

Yet despite the impressive number of Windows malware detections in 2020, such threats actually dropped by 12% compared to 2019. According to Rachel Welch, COO of Atlas VPN: “The decline in Windows malware infections might signify that cybercriminals have found other more effective methods to exploit victims online.”

HackTool is fastest rising malware threat

In 2020, we saw a fall in malware infections affecting Windows operating systems. However, despite a general decline, certain types of malware thrived last year.

HackTool, a type of malware used by hackers to gain unauthorized access to a user’s computer, saw the biggest increase in new cases detected on Windows last year when compared to 2019. Infections with HackTool spiked by 150%, from 7.4 million to 18.4 million in a single year.

Other malware types that saw a surge last year included Rogue (117%) and Spyware (28%), which help criminals track and collect information on the victim.

However, the most common Windows malware threat last year was adware —  software that displays unwanted advertisements on people’s computers. It accounted for 32% or 35.5 million Windows malware cases in 2020, a 22% drop from 45.7 million in 2019.

To read the full article, go to: https://atlasvpn.com/blog/over-100-million-malware-infections-detected-on-windows-in-2020

Image

Chris Price


For latest tech stories go to TechDigest.tv

Source…