Windows attack can steal your logged-in username and password

Page 5 of 6 FirstFirst ... 3456 LastLast

  1. Posts : 32
    Windows 10 Pro 64-bit
       #40

    Slartybart said:
    Did you forget to include Mbam in your list of scans or did I miss a Mbam mention elsewhere?

    Anyway ....

    scop8 shoulkd also run Malwarebytes (download begins when clicked), noting the setting for Rootkits you mention.
    Hello, Yes the MBAM was the first scan I did after restarting my computer when that weird site prevented me from using Chrome. And yes, I changed the 'rootkit' to 'on' in the settings so the scan checked it as well. Thanks for double-checking, Slartybart.
      My Computer

  2. Slartybart's Avatar
    Posts : 3,502
    Win_8.1-Pro, Win_10.1607-Pro, Mint_17.3
       #41

    scop8 said:
    Hello, Yes the MBAM was the first scan I did after restarting my computer when that weird site prevented me from using Chrome. And yes, I changed the 'rootkit' to 'on' in the settings so the scan checked it as well. Thanks for double-checking, Slartybart.
    Thanks, I miss things from time to time.

    Bill
    .
      My Computer

  3. simrick's Avatar
    Posts : 16,108
    W10Prox64
       #42

    scop8 said:
    Is the bold part a lark? If not, then, no, my computer was not talking to me :)
    I was serious. Usually they are also telling you "verbally" that your computer is infected and you need to call the number right now.

    scop8 said:
    I followed all your instructions, simrick, and things seem to be clean. RKill just couldn't open and edit the Hosts file because Avira blocks that. Is this a problem or can I assume things are ok without it having been checked?
    Can you temporarily disable Avira and let RKILL look at the HOSTS file? It's kind of important to see what's in there. Or, you could just look at the HOSTS file yourself. Of course, if Avira is blocking it, then I doubt any changes were made.

    scop8 said:
    Tempfile deleted what it needed to, no restart needed. JRT had 9 files deleted but these were all from Spyshelter update installations (I'm aware it sometimes reads as a false positive with some cleaners).
    Yes, anti-keyloggers are unique birds.

    scop8 said:
    AdwCleaner deleted a hxxp://www.trovi.com... file in Chrome along with 'Tracing' keys and cleared Winsock settings. I do know about turning on for rootkits in Malwarebytes so that was checked before the scan, thanks.
    Yes, trovi.com is a known questionable site.
    You might want to consider putting OpenDNS server addresses in your NIC's IPv4/IPv6 settings;
    IPv4=208.67.222.222 and 208.67.220.220, IPv6=2620:0:ccc::2 and 2620:0:ccd::2


    scop8 said:
    Should I be at least creating new passwords or at worst doing another clean re-install or is the latter neck deep in paranoia? This is precisely the kind of thing I'd hoped to avoid, that dreaded feeling of 'maybe something's left over and I shouldn't check anything that requires a password' with a new Win 10 installation. Yet here we are.
    I suppose, there is always the possibility that a script could have grabbed your current login cookie sessions. Unlikely, but it does happen. That's not grabbing your login credentials, just your cookie session, which could theoretically be used to pretend to be "you" in another browser. But, that's not usually what these particular guys are looking for - they want you to call, they then remote into your computer and take control, install rogue "cleaning software" which infects you, then have you pay to get it removed. If you stop mid-stream of their remote session, they are now locking systems using SysKey, so you can't even boot into Windows anymore.

    If you're really paranoid, you could change the passwords of whatever you were logged into at the time on the system. Or. you could check recent activity (i.e. gmail and yahoo allow you to do this). For a final "all clear" you can run ESET Online Scanner, checking the option to scan all drives, and scan for PUPS. (detailed instructions here)

    scop8 said:
    I don't know why all the sites say cinplex.com is clean yet when I hit enter things switched to the address of that red image I posted earlier...
    Could have been a hack/redirect manipulating a security hole in an old version of Java/Flash, etc. Hard to say. Could even be an infected ad. I'm not going there to find out!

    scop8 said:
    Thanks again, simrick, for a prompt and thorough response, I really appreciate it.
    You're quite welcome. Let us know how the ESET scan turns out.
      My Computer


  4. Posts : 342
    Windows 10
       #43

    zooburner said:
    So much for windows 10 being secure, not only have they not fixed the issue, that allows a site to steal all your log on information to all your windows devices, but they have created a new additional vulnerable browser that allows it. !!
    The issue is with shared drives which mostly involved the enterprise. The threat has increased because of the use of MS account to get access to a shared drive.
      My Computer


  5. Posts : 32
    Windows 10 Pro 64-bit
       #44

    simrick said:
    I was serious. Usually they are also telling you "verbally" that your computer is infected and you need to call the number right now.



    Can you temporarily disable Avira and let RKILL look at the HOSTS file? It's kind of important to see what's in there. Or, you could just look at the HOSTS file yourself. Of course, if Avira is blocking it, then I doubt any changes were made.



    Yes, anti-keyloggers are unique birds.



    Yes, trovi.com is a known questionable site.
    You might want to consider putting OpenDNS server addresses in your NIC's IPv4/IPv6 settings;
    IPv4=208.67.222.222 and 208.67.220.220, IPv6=2620:0:ccc::2 and 2620:0:ccd::2





    I suppose, there is always the possibility that a script could have grabbed your current login cookie sessions. Unlikely, but it does happen. That's not grabbing your login credentials, just your cookie session, which could theoretically be used to pretend to be "you" in another browser. But, that's not usually what these particular guys are looking for - they want you to call, they then remote into your computer and take control, install rogue "cleaning software" which infects you, then have you pay to get it removed. If you stop mid-stream of their remote session, they are now locking systems using SysKey, so you can't even boot into Windows anymore.

    If you're really paranoid, you could change the passwords of whatever you were logged into at the time on the system. Or. you could check recent activity (i.e. gmail and yahoo allow you to do this). For a final "all clear" you can run ESET Online Scanner, checking the option to scan all drives, and scan for PUPS. (detailed instructions here)



    Could have been a hack/redirect manipulating a security hole in an old version of Java/Flash, etc. Hard to say. Could even be an infected ad. I'm not going there to find out!



    You're quite welcome. Let us know how the ESET scan turns out.
    Hi simrick,

    Thanks for the feedback Here are the results:
    - I ran RKill with Avira off and there's no issue with the Hosts file, thankfully.
    - It's a bit disconcerting that Trovi somehow got through with all the levels of security, but I made the DNS changes you suggested and hopefully it'll help. I ran a test of IPv6 on Test your IPv6., and the summary states 'Your current configuration will continue to work as web sites enable IPv6' but I'm able to browse IPv4 net only and I won't be able to reach IPv6-only sites. There were three 'bad' results with IPv6 in the 'Test Run' tab (Test with IPv6 DNS record, Test IPv6 large packet, Find IPv6 Service Provider). Is this just a service provider issue or should I be making some adjustment?
    - Following your link to the ESET instructions in SevenForums, the actual link to ESET isn't what is shown in the screenshot (it's a MAC ESET purchase page). I used this link instead: Free Virus Scan | ESET Online Scanner ESET
    It looks a bit different but I guess it's an updated version. Anyway, it found no suspicious files :) Huge relief! It's nice to be assured that another install is not necessary in this computer's near future. Many thanks!
      My Computer

  6. simrick's Avatar
    Posts : 16,108
    W10Prox64
       #45

    scop8 said:
    Hi simrick,

    Thanks for the feedback Here are the results:
    - I ran RKill with Avira off and there's no issue with the Hosts file, thankfully.
    Okay good!
    scop8 said:
    - It's a bit disconcerting that Trovi somehow got through with all the levels of security, but I made the DNS changes you suggested and hopefully it'll help. I ran a test of IPv6 on Test your IPv6., and the summary states 'Your current configuration will continue to work as web sites enable IPv6' but I'm able to browse IPv4 net only and I won't be able to reach IPv6-only sites. There were three 'bad' results with IPv6 in the 'Test Run' tab (Test with IPv6 DNS record, Test IPv6 large packet, Find IPv6 Service Provider). Is this just a service provider issue or should I be making some adjustment?
    I think IPv6 is too new, and these are ISP issues. I have Charter for an ISP, and I get no IPv6 yet at all.
    scop8 said:
    - Following your link to the ESET instructions in SevenForums, the actual link to ESET isn't what is shown in the screenshot (it's a MAC ESET purchase page). I used this link instead: Free Virus Scan | ESET Online Scanner ESET
    It looks a bit different but I guess it's an updated version. Anyway, it found no suspicious files :) Huge relief! It's nice to be assured that another install is not necessary in this computer's near future. Many thanks!
    They have indeed updated their page; sorry about that. The instructions are basically the same though. Glad it didn't find anything. That's good - it's like a final "all clear".
      My Computer

  7. Cliff S's Avatar
    Posts : 25,556
    Win10 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #46

    Cliff S said:
    I just posted a question about this Windows Credential Leak Flaw in Edge, IE, and Cortana/Windows Search in the Malwarebytes Forum.
    I asked:
    I was just curios if MBAE protects browsers and against sites set up to exploit the Windows Credential Leak Flaw in Edge, IE, and Cortana/Windows Search? I tried Malwarebytes search here in the forums, and the main sit, but I guess I either don't use the correct terms, or nothing has been written or asked already
    When and if I get an answer, if Malwarebytes Anti Exploit protects against this, I will post here it here.
    Ok, I just got my answer from pbust a moderator at Malwarebytes Forums:
    Nope, MBAE will not protect against this as it is a logic flaw within the OS. MBAE protects against remote code execution in third-party applications (browsers, java, office, flash, etc.).
    Windows Credential Leak Flaw - News, Questions and Comments - Malwarebytes Forums
      My Computers

  8. simrick's Avatar
    Posts : 16,108
    W10Prox64
       #47

    Cliff S said:
    Ok, I just got my answer from pbust a moderator at Malwarebytes Forums:
    Windows Credential Leak Flaw - News, Questions and Comments - Malwarebytes Forums
    Thanks for following up on that Cliff.
      My Computer

  9. Steve C's Avatar
    Posts : 6,287
    Windows 10 Pro 64 bit
       #48

    This is another long standing security & QA issue MS to sort out.
      My Computers


  10. Posts : 74
    Windows 8 / 10 Pro
       #49

    Simple solution: don't have a login password - nothing to steal! ;-)

    Seriously though, I never set up my systems with a login password. Been like that ever since I used Win 95.

    I always found password protected accounts caused more problems than they prevented.

    I exercise a bit of caution (online) and keep the system secure with a well-maintained firewall and malware prevention.

    Never had any issues.

    (Disclaimer: what works for me, may not work for others!)

    Cheers,

    Mike.
      My Computer


 
Page 5 of 6 FirstFirst ... 3456 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 01:23.
Find Us




Windows 10 Forums