Categories
News Personal

SOTD: My posts of spam emails

We all dislike it and there seems to be no end to it.  So why not blog about it. SPAM!  The unsolicited email message that you never wanted, didn’t ask for, yet receiver of daily I will be posting the email subject, and body along with found attachments (attachments will not be in my posts […]

Categories
How-To Software Technical

How to submit malware / virus to antivirus and malware companies

So you got yourself infected with a virus and hopefully you got rid of it before it did any serious damage.  If it had you may wish you had something like “CrashPlan” to get your files back. And while a backup solution is always the best tool to recovery today we are going to talk […]

Categories
How-To News Software Technical

Tech Short: CryptoLocker

CryptoLocker is a type of “ransomware” that encrypts the data on an infected computer so that it can’t be read and then demands payment to decrypt it. A CryptoLocker attack may come from various sources; one such is disguised as a legitimate email attachment. When activated, the malware encrypts certain types of files stored on […]

Categories
How-To Technical

Savings Bull Filter Removal

Another day, another infection. This time it’s the threat that goes by the name of Savings Bull (sample.dll) which is a form of Adware / Malware that infects a user’s computer and listens by proxy to network traffic of the infected victim. Savings Bull copies itself  to your hard disk. The typical file name is […]

Categories
Technical

wow.dll Virus / Trojan

Hmmm; Now isn’t this fun Our IDS was tossing out the following message: ET TROJAN Tornado Pack Binary Request for one of the users, along with various others. After some inspection; first running the local AV solution, and other solutions like Malwarebytes which did not locate the infection. I then loaded up Sysinternals Suite App, TCPView which […]

Categories
News

Microsoft’s fight against Poison Ivy

Info of what is known: Poison ivy (Backdoor:Win32/Poisonivy.E) is a backdoor trojan that allows unauthorized access and control of an affected machine. It attempts to hide by injecting itself into other processes. The following system changes may indicate its infection: The existence of the following file: c:windows:svvchost.exe The existence of the following registry entry: “StubPath” With data: “c:windows:svvchost.exe” in the subkey: HKLMSoftwareMicrosoftActive […]