All Questions
63
questions
0
votes
1
answer
288
views
Do viruses survive in other drive and than re infect after resetting the PC?
Backstory:
I got infected while installing some shady software and at that time I kept Windows Defender off, (I have very much faith on my shady website) by turning its features off. But when I ...
2
votes
2
answers
2k
views
Is there malware that can run without user interaction after a download from the internet?
Is there malware that can run from a simple download from the internet autonomously without user interaction/initiation?
I know there are worms that can do that, but I assumed they needed to be opened ...
0
votes
0
answers
176
views
What is the steps to be taken when you suspect a linux malware has infected your computer?
Using Linux is a different beast entirely but sometimes malware can blend as seemingly harmless system binaries like this post
Bpfdoor
Like this post which documents a highly evasive Linux malware.
...
0
votes
0
answers
266
views
Sextorsion then Trojan
I received an email containing blackmail about videos that the hacker said he recorded. He said that he recorded the user of the laptop masturbating and he is asking for money to delete them otherwise ...
0
votes
0
answers
18
views
I ran an exe file on my computer [duplicate]
I downloaded a crack file today, Idk why I thought its safe to run, now my pc is infected.
I already used Tronscript, kaspersky and hitman
what else do you guys suggest me to do?
thanks in advance.
...
0
votes
0
answers
1k
views
Hijacking a WhatsApp session
If a device running a WhatsApp account has already be compromised. Can the attacker steal session cookies/encryption keys on the device and establish a persistent connection to receive calls and ...
0
votes
1
answer
1k
views
Windows defender detected and quarantined this: HTML/Phish.GR!MSR. Is there anything further I should do to check my computer has been affected?
Windows defender detected the trojan HTML/Phish.GR!MSR and quarantined it.
After that, I scanned the computer with Malwarebytes and it found nothing.
I can find very little information online about ...
0
votes
1
answer
1k
views
Can a video file contain code that shares your identity? [duplicate]
Could a video file contain code that reveals and sends your ip/mac address or give access to personal files to somebody else? Would normal video players (like VLC) be able to notice that kind of ...
0
votes
1
answer
1k
views
Check USB mouse for malicious code
When I first used this mouse and keyboard, my PC died shortly after. Today I used it and it somehow corrupted my Linux.
I once put a clean Linux on a laptop and plugged this mouse in and left it, ...
3
votes
4
answers
927
views
How does the government install a trojan horse on somebody's mobile phone?
I am reading a news article (in italian) in which the police snooped on the Dean of a university by a trojan horse that the police had installed on his mobile phone.
In particular, the trojan horse ...
1
vote
0
answers
369
views
Is this javascript code malicious? [closed]
a friend visited this site:
h-t-t-p-s://adidastore.buzz/adidass/tb.php?_t=1614958342
I malformed the url so no one accidently clicks on it
Below is the code the site is serving.
I don't know ...
1
vote
0
answers
300
views
Virustotal alerts for Surfshark VPN [closed]
Virustotal is giving some alerts for the Windows installation of Surfshark VPN. I am sure they are false positives, I just wanted to hear what other users say about this...
1
vote
1
answer
3k
views
Can a malware steals my Facebook c_user, xs, and datr Cookies?
Just as the title suggests. I have a PasswordStealer on my PC and I'm afraid that it can do that. AFAIK, that malware can record keystrokes and steal saved passwords which I don't mind because I don't ...
4
votes
2
answers
1k
views
Was there ever any malware found in Debian/Ubuntu packages?
With over 30,000 projects packaged by Debian, it doesn't seem too unlikely that some of them may contain malware. On Ubuntu's side, the review process is apparently rather superficial, aimed at ...
0
votes
2
answers
454
views
How do I know that the ISO image of the Linux distribution I have downloaded does not contain the NSA backdoor?
I have downloaded the ISO image of Kubuntu 20.10 and installed it.
I am afraid that the ISO image may have been tainted (for example, by the NSA) to insert a backdoor into it.
As I see it, there are ...