All Questions
45
questions
2
votes
0
answers
279
views
WordPress site hacked [closed]
We got hacked.
Our setup:
DigitalOcean VPS, Apache, multiple domains & WP websites, Elementor Pro, hopefully safe plugins.
Known facts:
It's phishing.
The virus infects all the websites on our ...
0
votes
0
answers
27
views
I clicked what looked like an Amazon email, but it (maybe) was from an Amazon affiliate. Ended up at Amazon.com anyway. Can I safely investigate? [duplicate]
In a case of clicking too fast, I clicked on a picture that looked like it was from Amazon. However this was not the case. I did end up at Amazon, but I'm aware that other things could've taken place ...
2
votes
2
answers
310
views
Does attaching malware or virus in an email count as Phishing attack
I know that Phishing attacks try to gain access or sensitive information from the user or victim. This attack comes under the Social Engineering attack, where personal confidential data such as login ...
1
vote
0
answers
609
views
A PDF ran GetAdaptersAddresses. Should I be concerned?
I received and opened a PDF that ran:
GetTickCount
IsDebuggerPresent
SetWindowsHookExW
Sleep
GetAdaptersAddresses
These are the 2 files it wrote:
C:\Windows\ServiceProfiles\LocalService\AppData\...
0
votes
3
answers
496
views
Is it safe to open email links in a private window?
Sometimes there are links on the email you have to click because they are agrements, but they are coming from a different URL. As of now what I'm doing is opening a private window and pasting the link ...
0
votes
0
answers
46
views
WP Blog with phishing js file by a Google Search Result? [duplicate]
I wanted to check the WP homepage of a friend of mine, so I googled "rafaeltheissen be piano".
The first Google result seems to point to the official page: https://rafaeltheissen.com/
Here ...
0
votes
0
answers
142
views
ThinkPHP show my website as the req.host - did the request really come from my web server?
I have ThinkPHP wordpress garbage coming at my server https://medium.com/@knownsec404team/analysis-of-thinkphp5-remote-code-execution-vulnerability-5de8a0afb2d4
, for example:
/public/index.php?s=...
0
votes
1
answer
2k
views
Can a text file disguised as .xlsm be malicious?
A hour ago we receive a suspicious mail targeting some of our mailing lists. It contains a .zip file, itself containing a .xlsm file.
This .xlsm file appears to be recognized as an ASCII text file ...
1
vote
1
answer
215
views
How to protect a vulnerable Family Member?
I apologize if this isn't the best exchange to be asking in, but I'm a little new at this.
Problem: A close relation outside my local area with declining cognitive function is demonstrating ...
1
vote
2
answers
211
views
Is my email, pc or something else hacked?
Recently I registered iCloud account with my gmail account. Now I received fake email from "iCloud" on mail.com email address which I use frequently for registering accounts on various sites....
1
vote
2
answers
12k
views
What should I do if I'm receiving Tiktok verification code even I don't use and have deleted the application in my android device?
What should I do if I'm receiving SMS on phone giving in verification code of TikTok app despite I have deleted and no longer use the application in my Android device?
I got an international call ...
0
votes
1
answer
422
views
sendgrid delivered malware - what's the abuse reporting procedure [closed]
Sendgrid delivered me malware* - where should I report that?
There was no contact info in the headers and the only abuse contact I could find in whois was domain registrar Godaddy.
Last time I dealt ...
27
votes
4
answers
36k
views
Is a safelinks.protection.outlook.com link phishing?
Received an email which contain the below hyperlink
https://nam02.safelinks.protection.outlook.com/?url=http*3A*2F*2Factuallysale.com*2F&data=02*7C01*7C*7C548d20ace3ec4747fe1008d7d7d8b597*...
0
votes
1
answer
165
views
Do pharma hacks always redirect to attacker page or can it also be ads on the legit website’s page?
I'm trying to understand how a pharma hack works. Let's say someone searches for some illegal drug on google and clicks on a link with a domain name www.example.com.
Will that person be redirected ...
1
vote
3
answers
536
views
If we integrate CDR in our email solution, do we really need Sandbox as well?
In the case of social engineering attack vector is an email sent with a malicious attachment like XSL file, I am not really understanding where we will need Sandbox solution if we can just use CDR (...