McAfee "Lifesave" failed to save my computer!


Recommended Posts

  On 06/03/2018 at 19:08, warwagon said:

What user going to password protect their AV? ;)

Expand  

every webroot customer ;) and iirc doesnt symantec retail products also allow the feature?, SEP deffo does, the default is "symantec"

  On 06/03/2018 at 19:08, Mando said:

every webroot customer ;) and iirc doesnt symantec products also allow the feature, SEP deffo does, the default is "symantec"

Expand  

I guarantee this guy would have voluntarily disabled webroot per "Dells" instructions.

  On 15/02/2018 at 23:23, techbeck said:

You can literally type in any service tag on Dell's site and get the warranty/order info.  And service tags are not hard to figure out.  A lot of time, you just need one service tag number and another can just be one character different.

Expand  

Yup, its a great feature for sys adms but so open to abuse, esp as Dell Service tags are only what 8 chars max?

  On 06/03/2018 at 19:10, warwagon said:

I guarantee this guy would have voluntarily disabled webroot per "Dells" instructions.

Expand  

not in future he wont :) 

  On 06/03/2018 at 18:56, Mando said:

thats exactly whats happened mate, they get into the system, "fix it" while dropping the real backdoor payload and your now a dormant bot machine for them to C&C whenever they need.

 

if it was me personally or professionally, id be nuking that system from orbit, low level format the drive and do a clean install and use good paid for AV mate.

 

Also add Warwagons advice to what else to do.

Expand  

Yea, I would nuke Windows and start fresh. Never really know what they left behind...

Yeah after something like that i'd wipe the system even myself, reinstall everything, and make sure had a good Av installed and kept up to date.  Though don't think Av would've been much help with this issue 

 

 

  On 06/03/2018 at 19:17, Jim K said:

Yea, I would nuke Windows and start fresh. Never really know what they left behind...

Expand  

exactly any payload dropped before replacing the remove mcafee (lets say rootkit for a giggle) a lot of then installed platforms can miss these, depending how smart the rootkit type is.

 

workwise id probs dispose of the drive to be safe, due to my industry.

Also change your bank password immediately, as in yesterday. There was one person who let these people on their computer, I heard about it but never actually saw the computer (it was a bartender who told me his wife was on the phone with a Microsoft, I was actually out on the town at the time), I told him to her it was a scam hang up and not to pay it. Well, she paid it and after the credit card paid it she thought it must be legit.

 

They must have left team viewer or some other remote assistance app running on their computer. She must have also saved her banking login and password in internet explorer. They called back a month later to tell her that "they feel bad and want to give her a refund, but oops they accidentally gave her $25,000" So they would like it if she could send that money back to them.

 

Long story short, there was $25,000 extra in her checking account. They logged into her bank and transferred $25,000 from her savings to her checking. She did not transfer the money to the scammers.

 

Once I finally looked at her computer it got formatted and I think she even upgraded to an ssd.

 

So ya, change your bank password immediately. 

  • Like 2

Long Long Time ago while testing Live One Care, i got system very infected with a rootkit virus,  accepted a file from so called friend in a game i was playing, opened the file, program did not alert on it,  so i figured yay safe lol, Moral of this story don't accept files from strangers,  make sure passwords changed periodically,  in the end due to shop at the time not able to get rid of that infection permently, ended up having to downgrade parts from AMD XP 2500+  to AMD Sempron at the time.    

 

This is main reason why i stick with Avast antivirus lately,  a little uneasy when i use Defender,  I guess i was scammed then to or stupid clicker one or the other lol.  

 

 

  On 06/03/2018 at 19:11, Mando said:

Yup, its a great feature for sys adms but so open to abuse, esp as Dell Service tags are only what 8 chars max?

not in future he wont :) 

Expand  

in future Microsoft will call and he will...

  • Like 2
  On 06/03/2018 at 15:28, Vince800 said:

So after slating both McAfee & Dell - Nothing to do with either. Being duped into a very obvious scam (iTunes Vouchers) you still seem to come across as if you think that this is really Dell.

Expand  

Definitely having to do with Dell - if not, HOW did the scammers get my personal Dell customer data with which to convince me they were NOT scammers? Either they are or were Dell employees, or have hacked Dell - which Dell had an obligation to make publicly known if it did occur!  Others here have also expressed a low opinion of McAfee, so go argue with them. The fact is that "McAfee Lifesave" DID NOT warn me of the presence of malware, no less protect me from it!

  On 07/03/2018 at 17:24, Howard Davis said:

Definitely having to do with Dell - if not, HOW did the scammers get my personal Dell customer data with which to convince me they were NOT scammers? Either they are or were Dell employees, or have hacked Dell - which Dell had an obligation to make publicly known if it did occur!  Others here have also expressed a low opinion of McAfee, so go argue with them. The fact is that "McAfee Lifesave" DID NOT warn me of the presence of malware, no less protect me from it!

Expand  

Can I ask Howard, what personal Dell data of your customer info did they have?

I work in Infosec and i have a genuine professional interest.

 

It troubles me to know someone has been scammed like this.

  On 06/03/2018 at 19:17, Jim K said:

Yea, I would nuke Windows and start fresh. Never really know what they left behind...

Expand  

I downloaded and ran Malwarebytes, which I did not have previously. It found over 40 questionable files, two of which were definitely spy/malware. All are now quarantined. All sensitive passwords were changed after doing this. I never have done online banking and never would. I also did an in-depth scan with McAfee which gave me an all-clear, but I don't trust McAfee alone. I am more knowledgeable than the typical computer user, though not an expert. I can only conclude that MOST people have malware they are not aware of.

  On 07/03/2018 at 17:40, Mando said:

Can I ask Howard, what personal Dell data of your customer info did they have?

I work in Infosec and i have a genuine professional interest.

 

It troubles me to know someone has been scammed like this.

Expand  

Thank you for your concern. They told me a few things that I don't specifically recall, but what convinced me most was that they had the service tag number. I conclude they are or were Dell employees, or have hacked Dell for this information. 

  On 07/03/2018 at 17:49, Howard Davis said:

Thank you for your concern. They told me a few things that I don't specifically recall, but what convinced me most was that they had the service tag number. I conclude they are or were Dell employees, or have hacked Dell for this information. 

Expand  

Thanks, hmm trying to think how to obtain someones Service tag, via Dell, and you know what you have a point fellah, you can only enter a service tag, you cant check with anything else for a machine.

 

unless....if the first malware payload was a  RAT (remote access trojan) its easy to extract the Service tag from a  BIOS lookup on the hardware. 

 

Or

have you ever entered your dell service tag into Dells website, if so it could theoretically be gleamed from that from temp internet files.

 

outwith those two possibilities, im really struggling to figure out how it would be possible without what you have claimed in all honesty.

  On 07/03/2018 at 18:06, Mando said:

Thanks, hmm trying to think how to obtain someones Service tag, via Dell, and you know what you have a point fellah, you can only enter a service tag, you cant check with anything else for a machine.

 

unless....if the first malware payload was a  RAT (remote access trojan) its easy to extract the Service tag from a  BIOS lookup on the hardware. 

 

Or

have you ever entered your dell service tag into Dells website, if so it could theoretically be gleamed from that from temp internet files.

 

outwith those two possibilities, im really struggling to figure out how it would be possible without what you have claimed in all honesty.

Expand  

I don't recall ever inputting my service tag number. 

NEW PROBLEM - possibly related to malware? To my knowledge it is all quarantined. I've scanned again with Malwarebytes and nothing was found. 

 

Recently I've had the experience of the screen going black and the monitor indicating no signal is reaching it. After a brief interval, it would be OK.

Today this happened again and it took several minutes until the screen restored itself. 

My cables/connections seem OK. 

it could be a remote session or something trying to take over the main display but that's just speculating

 

I'd highly recommend you to backup important files and format/reinstall windows.

since you know you were compromised by a scammer there's a high possibility there are other hidden files that malwarebytes can't find or the virus/malware may have modified system files causing bugs.

Warwagon stated:

"I'd recommend a reinstall or at the very least roll that system back before you were scammed. Also check the programs and feature list for any remote assistance apps still installed on your computer, these may include.

 

Thanks - I did find a few of those you listed and they are gone.

By "roll back the system" I assume you mean a system restore to a date preceding the incident?

  On 07/03/2018 at 20:09, Howard Davis said:

Warwagon stated:

"I'd recommend a reinstall or at the very least roll that system back before you were scammed. Also check the programs and feature list for any remote assistance apps still installed on your computer, these may include.

 

Thanks - I did find a few of those you listed and they are gone.

By "roll back the system" I assume you mean a system restore to a date preceding the incident?

Expand  

you could yes, but id lean more towards a deletion of the drive partitions and a fresh install of Windows via install media.

  • Like 2

yes i recommend a full format of the hard drive, some malware can hide itself directly in the partition table itself so it can't be removed easily without a full format. I've had this happen to family members, it's a pain to even detect.

  On 07/03/2018 at 17:24, Howard Davis said:

Definitely having to do with Dell - if not, HOW did the scammers get my personal Dell customer data with which to convince me they were NOT scammers? Either they are or were Dell employees, or have hacked Dell - which Dell had an obligation to make publicly known if it did occur!  Others here have also expressed a low opinion of McAfee, so go argue with them. The fact is that "McAfee Lifesave" DID NOT warn me of the presence of malware, no less protect me from it!

Expand  

You're only basing your malware assumption based on what the scammers told you. Knowing how easily you gave in & purchased iTunes vouchers, it's not that far fetched that you may have fell foul of a phishing scam too. 

  • Like 2
  On 07/03/2018 at 20:09, Howard Davis said:

Warwagon stated:

"I'd recommend a reinstall or at the very least roll that system back before you were scammed. Also check the programs and feature list for any remote assistance apps still installed on your computer, these may include.

 

Thanks - I did find a few of those you listed and they are gone.

By "roll back the system" I assume you mean a system restore to a date preceding the incident?

Expand  

Howard, if you would like i would happily give the machine a once over remotely if you wish, i would understand totally however if you were apprehensive doing so mate :) 

 

If you would rather try some of the tools yourself, ofc im happy to guide you.

 

I would suggest something like Avira bootable Linux distro on a usb stick, boot from that and scan windows as flat files (windows is offline at this point in time), bit like running an ubuntu live distro CD from disk.

  On 06/03/2018 at 18:56, Mando said:

thats exactly whats happened mate, they get into the system, "fix it" while dropping the real backdoor payload and your now a dormant bot machine for them to C&C whenever they need.

 

if it was me personally or professionally, id be nuking that system from orbit, low level format the drive and do a clean install and use good paid for AV mate.

 

Also add Warwagons advice to what else to do.

Expand  

I've eliminated all malware found by Malwarebytes, scanned again with McAfee, deleted all programs that could be used to take control of the computer, and changed all significant passwords. Along with two definite spyware/malware items, Malwarebytes found about 40 other suspicious files - all now quarantined. I'll do a system restore if considered advisable by a consensus of experts as we have on this forum. I see no need to do something as radical and risky as reinstalling the OS. I think the computer is 99% likely to now be secure. 

 

One other thing - I was told by the scammer that the IP address has been changed, and upon request he gave it to me. 

 

  On 07/03/2018 at 23:10, Mando said:

Howard, if you would like i would happily give the machine a once over remotely if you wish, i would understand totally however if you were apprehensive doing so mate :) 

 

If you would rather try some of the tools yourself, ofc im happy to guide you.

 

I would suggest something like Avira bootable Linux distro on a usb stick, boot from that and scan windows as flat files (windows is offline at this point in time), bit like running an ubuntu live distro CD from disk.

Expand  

Thank you for the offer. What would you charge for the service?

Given what I have already done (outlined in my last post, above), I think it safe to assume the computer is now secure - at least enough so, given that I do not do online banking and have changed my passwords. Your last sentence above recommends work I would not feel comfortable doing, as it is a bit beyond my level of expertise. 

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • Toshiba's massive 22TB X300 PRO hard drive is 29% off by Taras Buria Toshiba is offering its highest-capacity X300 PRO hard drive at a new all-time low price, allowing you to save 29% or $171 on the massive 22TB drive. The X300 PRO hard drive lineup offers good performance, and it is rated for high yearly workloads, which makes it a great option for creative professionals or other tasks that require storing a lot of data. The X300 PRO is a 7,200 RPM conventional magnetic recording (CMR) 3.5-inch SATA 6Gbps internal hard drive with 512MB of cache, which is also paired with the Toshiba Cache Technology for improved real-time responsiveness during high-demand loads. It also has additional features for better reliability, such as ramp loading (heads rest to a side of platters to prevent damage when the drive is idling or powered down) and shock sensors. Toshiba claims that the 22TB X300 PRO is rated for up to a 300TB/year workload rate and 1 million hours of mean time to failure (MTTF). This makes the drive a good choice for workstations, multimedia systems, or network-attached storage. Additionally, each drive has a limited five-year warranty for additional peace of mind. 22TB Toshiba X300 PRO High Workload Performance HDD - $428.99 | 29% off on Amazon US This Amazon deal is US-specific and not available in other regions unless specified. If you don't like it or want to look at more options, check out the Amazon US deals page here. Get Prime (SNAP), Prime Video, Audible Plus or Kindle / Music Unlimited. Free for 30 days. As an Amazon Associate, we earn from qualifying purchases.
    • The 4060 is the weak 8-GB version. They should have done better.
    • This is an example of why it is so difficult to have a conversation with conservatives - they refuse to operate in good faith. You say "Those are not rights. Those were special treatments that were taken away that non-trans whatever didn't get." Which means you either failed to read any of the links I provided or you are lying. The very first link is about how the U.S. Military is firing trans people out of the military because they are trans and denying them retirement benefits. What other groups does the military treat this way that would support your assertion that they had been treated as special previously? Does the miliary routinely fire large numbers of its members and deny them retirement and was heretofore not doing that to trans people? I fail to see the logic in your argument.
  • Recent Achievements

    • One Month Later
      Jaclidio hoy earned a badge
      One Month Later
    • Week One Done
      Yawdee earned a badge
      Week One Done
    • Week One Done
      eugwalker earned a badge
      Week One Done
    • First Post
      Ben Gross earned a badge
      First Post
    • One Month Later
      chiptuning earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      636
    2. 2
      +FloatingFatMan
      178
    3. 3
      ATLien_0
      144
    4. 4
      Xenon
      120
    5. 5
      wakjak
      108
  • Tell a friend

    Love Neowin? Tell a friend!