MoonPoint Support Logo

 

Shop Amazon Warehouse Deals - Deep Discounts on Open-box and Used ProductsAmazon Warehouse Deals



Advanced Search
April
Sun Mon Tue Wed Thu Fri Sat
   
15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30      
2025
Months
AprMay Jun
Jul Aug Sep
Oct Nov Dec


Fri, Mar 28, 2025 9:22 pm

Windows Files Flagged as Malware by Avira Rescue System Scan

Some antivirus companies provide "rescue system" software that you can download for free and used to create bootable DVDs or flash drives to boot a PC outside of windows and scan the system for viruses and other malware. The software can be used if a system won't boot because of the malware. Avira, a German antivirus company, provides Avira Rescue System antivirus software that can be used to scan a system running a Microsoft Windows operating system. The ISO file that you download to create a bootable DVD or flash drive contains the Ubuntu Linux operating system, but you don't need to be familiar with a Linux operating system to use the software.

[ More Info ]

[/security/antivirus/avira] permanent link

Sun, Apr 14, 2024 9:21 pm

NortonLifeLock Scam

Earlier this week, a user forwarded me an email she received purporting to be a notification regarding an automatic renewal of a subscription to "Norton Life-Lock" wondering if it was legitimate and she would be charged $399 for the product.

Norton LifeLock scam

The message included the following text:

This email confirms that your subscription has been renewed for another 1 year with Norton Life-Lock for $399.00 on April 11th,2024.

This subscription will Auto-Renew every year unless you turn it OFF. No later than 24 hour before the end of the subscription period.

To cancel this subscription, Call: +1(844)962-1087

An online search of the 844-962-1087 number showed it is not a number associated with Norton LifeLock, a clear indication that the email was a scam where the scammer attempts to get people to call a number to cancel an expensive "subscription" for a well-known product or company. I assume those who call the number will be asked to provide their credit or debit card information, so someone pretending to be a customer service representative for the company can supposedly look up the account information to "cancel" the subscription. If credit card information is provided, the scammer can then use it for fraudulent charges or sell the information to others. Another indicator that a message such as this is fraudulent is poor English. E.g., "...unless you turn if OFF. No later than 24 hour before the end of the subscription period." Proper English would be "...unless you turn it OFF no later than 24 hours before the end of the subscription period." I.e., there should not be a period before "No later" and "hours" should be used rather than "hour." Another indication that the email is a fraud attempt in this case is that the sender hyphenated the product name, i.e., "Life-Lock" whereas if you go to the Norton website and look at their consumer products or visit the NortonLifeLock website, you can see that the name of the product is listed as "LifeLock" not "Life-Lock." The Wikipedia LifeLock page also shows the product name is not hyphenated. Such phishing emails purporting to be notifications of upcoming charges for NortonLifeLock have been prevalent for years — the NortonLifeLock website has a January 11, 2022 article " Keep an eye out for Norton email scams" warning people about such attempts and showing similar scam messages regarding their product.

Unfortunately, such scams can deceive enough people to make sending such messages profitable for scammers. People anxious to avoid a charge of several hundred dollars for a product they may not even be using may call the number and provide credit/debit card or banking information that the scammer may use to fraudulently charge their credit or debit card or steal money from a banking account.

[/security/phishing] permanent link

Mon, Mar 04, 2024 9:46 pm

Accessing ClamWin scan results when the option to save a report is grayed out

I ran a scan with ClamWin, a free and open-source antivirus program for Microsoft Windows systems, on a user's system recently when she thought the system might be infected with malware. I ran the ClamWin scan after I scanned the system with McAfee AntiVirus, the active antivirus program on the system providing real-time protection, which did not find any malware. The scan, which ran for many hours, flagged many files as containing malware. It was difficult to note the names and locations of files flagged as containing malware when they were flagged as the results would scroll quickly by as the program went on to scan other files. As I assumed I would be able to save the results to a file when the scan completed, that did not concern me. However, when the scan completed I was unable to save the results to a file because the button that would allow me to save the results was grayed out.

You can still access the results of a scan in such cases, though, because when you exit from viewing the scan results, the program automatically appends the results to C:\ProgramData\.clamwin\log\ClamScanLog.txt. The ProgamData directory is a hidden directory that you won't see in the Windows File Explorer unless you have configured it to display hidden files and folders. You can see the directory is present if you open a command prompt window and issue the command dir /ah — the "/ah" tells the dir command to display files and folders with the attribute "hidden." E.g.:

C:\>dir /ah
 Volume in drive C is OS
 Volume Serial Number is 4445-F6ED

 Directory of C:\

08/21/2022  07:38 PM    <DIR>          $Recycle.Bin
07/08/2017  03:45 PM    <DIR>          $Windows.~WS
02/14/2024  10:43 AM    <DIR>          $WinREAgent
10/30/2015  02:18 AM                 1 BOOTNXT
08/21/2022  01:01 PM               112 bootTel.dat
02/28/2024  03:54 PM    <DIR>          Config.Msi
11/04/2011  01:20 AM            30,425 dell.sdr
07/14/2009  12:08 AM    <JUNCTION>     Documents and Settings [C:\Users]
03/03/2024  11:51 PM             8,192 DumpStack.log.tmp
03/04/2024  03:51 PM     6,373,736,448 hiberfil.sys
01/30/2012  09:36 PM    <DIR>          MSOCache
03/03/2024  11:51 PM     8,589,934,592 pagefile.sys
03/03/2024  09:48 AM    <DIR>          ProgramData
10/11/2023  09:00 AM    <DIR>          Recovery
03/03/2024  11:51 PM       268,435,456 swapfile.sys
01/28/2012  08:26 PM    <DIR>          System Recovery
03/04/2024  08:00 PM    <DIR>          System Volume Information
               7 File(s) 15,232,145,226 bytes
              10 Dir(s)  795,701,448,704 bytes free

C:\>>

Though the log file containing scan results is beneath a hidden directory, you can access it from a text editor such as Windows Notepad by typing in the directory path and file name, i.e., C:\ProgramData\.clamwin\log\ClamScanLog.txt when you choose Open to open a file, or you could open it from a command prompt window as shown below.

C:\&>notepad C:\ProgramData\.clamwin\log\ClamScanLog.txt

C:\&>

The ClamScanLog.txt file will contain the results of all scans run on the system, unless it was edited to remove prior results, with the results of the latest scan at the bottom of the file.

[/security/antivirus/clamav] permanent link

Tue, Apr 05, 2022 6:05 pm

Let's Encrypt Problem binding to port 80: Could not bind to IPv4 or IPv6

A couple of users notified me that they were receiving warning messages regarding the security certificate on their email server when they were checking email with Microsoft Outlook. I checked the expiration date on the security certificate for the email server with the OpenSSL command openssl s_client -connect pop3.moonpoint.com:995 (the system is using Dovecot, which is an open-source IMAP/POP3 software program providing users with the ability to download their email). Dovecot listens on TCP port 995 for POP3S secure email connections for downloading email. I could see the certificae was expired and I issued the quit command when I saw the "OK Dovecot ready" prompt. The email security certificate on the system is provided by Let's Encrypt, so I then tried renewing the certificate from the root account with the letsencrypt renew command, but was unsuccessful. I found the solution was to stop the Apache web server software running on the system, thanks to a post by JuergenAuer at Renewing certificate getting error: Problem binding to port 80: Could not bind to IPv4 or IPv6. After I stopped the web server software, I was able to reissue the letsencrypt command to renew the certificate without the "Problem binding to port 80" error message. I then restarted the Apache web server software and Dovecot.

[ More Info ]

[/security/encryption/openssl] permanent link

Sun, Oct 24, 2021 12:58 pm

Counting SSH break-in attempts by country

Yesterday, I installed Fail2Ban on a CentOS 7 server after noticing SSH break-in attempts by password guessing. Today, I checked the fail2ban log to see how many IP addresses were banned and whether after being banned for an hour there were any subsequent password guessing attempts from the same IP address. I saw that 40 IP addresses had been banned since I installed Fail2Ban last night and that some of those addresses had been banned multiple times. You can count the number of times an IP address has been banned by using the awk command awk '($(NF-1) = /Ban/){print $NF}' /var/log/fail2ban.log | sort | uniq -c | sort -n. You can pipe the output of that command to the wc command wc -l to count the total number of lines which tells you the number of IP addresses that have been banned as explained at Fail2ban logging.

[root@moonpoint ~]# awk '($(NF-1) = /Ban/){print $NF}' /var/log/fail2ban.log | s
ort | uniq -c | sort -n
      1 103.50.219.194
      1 104.200.134.181
      1 104.244.77.37
      1 107.189.14.174
      1 107.189.14.230
      1 107.189.14.41
      1 107.189.1.96
      1 107.189.31.223
      1 107.189.8.233
      1 183.157.169.70
      1 183.195.121.197
      1 205.185.123.33
      1 205.185.124.131
      1 209.141.42.29
      1 221.131.165.50
      1 221.131.165.56
      1 221.181.185.151
      1 221.181.185.198
      1 222.186.30.112
      1 222.187.254.41
      1 64.225.49.153
      1 71.9.165.219
      2 104.244.76.64
      2 107.189.12.163
      2 209.141.36.75
      2 209.141.40.64
      2 221.131.165.65
      2 222.186.30.76
      2 222.187.232.39
      3 107.189.13.104
      3 45.61.184.115
      3 70.62.137.84
      4 187.149.76.88
      4 189.85.145.113
      4 205.185.122.239
      4 209.141.57.74
      4 210.73.207.44
      4 222.186.42.137
      5 209.141.34.165
      5 89.211.207.62
[root@moonpoint ~]# awk '($(NF-1) = /Ban/){print $NF}' /var/log/fail2ban.log | sort | uniq -c | sort -n | wc -l
40
[root@moonpoint ~]#

[More Info]

[/security/attacks] permanent link

Sat, Oct 23, 2021 7:36 pm

Break-in attempts via SSH from 221.131.165.50

While checking on a problem on a test CentOS Linux system today, I issued the command journalctl -xe from the root account to get more details on the problem. Among the results displayed was an indication of attempts to break into the system by guesses for the password of the root account on the system.

# journalctl -xe
Oct 23 16:20:23 moonpoint systemd[1]: Unit mariadb.service entered failed state.
Oct 23 16:20:23 moonpoint systemd[1]: mariadb.service failed.
Oct 23 16:20:23 moonpoint polkitd[1684]: Unregistered Authentication Agent for u
Oct 23 16:21:35 moonpoint sshd[4558]: pam_unix(sshd:auth): authentication failur
Oct 23 16:21:35 moonpoint sshd[4558]: pam_succeed_if(sshd:auth): requirement "ui
Oct 23 16:21:37 moonpoint sshd[4558]: Failed password for root from 221.131.165.
Oct 23 16:21:38 moonpoint sshd[4558]: pam_succeed_if(sshd:auth): requirement "ui
Oct 23 16:21:40 moonpoint sshd[4558]: Failed password for root from 221.131.165.
Oct 23 16:21:40 moonpoint sshd[4558]: pam_succeed_if(sshd:auth): requirement "ui
Oct 23 16:21:42 moonpoint sshd[4558]: Failed password for root from 221.131.165.
Oct 23 16:21:42 moonpoint sshd[4558]: Received disconnect from 221.131.165.50 po
Oct 23 16:21:42 moonpoint sshd[4558]: Disconnected from 221.131.165.50 port 4518
Oct 23 16:21:42 moonpoint sshd[4558]: PAM 2 more authentication failures; lognam
Oct 23 16:21:55 moonpoint sshd[4561]: pam_unix(sshd:auth): authentication failur
Oct 23 16:21:55 moonpoint sshd[4561]: pam_succeed_if(sshd:auth): requirement "ui
Oct 23 16:21:57 moonpoint sshd[4561]: Failed password for root from 221.131.165.
Oct 23 16:21:57 moonpoint sshd[4561]: pam_succeed_if(sshd:auth): requirement "ui
Oct 23 16:21:59 moonpoint sshd[4561]: Failed password for root from 221.131.165.
Oct 23 16:21:59 moonpoint sshd[4561]: pam_succeed_if(sshd:auth): requirement "ui
Oct 23 16:22:01 moonpoint sshd[4561]: Failed password for root from 221.131.165.
Oct 23 16:22:02 moonpoint sshd[4561]: Received disconnect from 221.131.165.50 po
Oct 23 16:22:02 moonpoint sshd[4561]: Disconnected from 221.131.165.50 port 4175
Oct 23 16:22:02 moonpoint sshd[4561]: PAM 2 more authentication failures; lognam
[root@moonpoint ~]#

When I checked the number of password guesses the attacker had tried by searching for the IP address in /var/log/secure, I found 183 attempts to log in.

[root@moonpoint ~]# grep "221.131.165.50" /var/log/secure | grep -c "Failed password"
183
[root@moonpoint ~]#

When I checked the location for the IP address 221.131.165.50 with the geoiplookup program, a program that is provided by the GeoIP package, I found the address allocated to an entity in China:

[root@moonpoint ~]# geoiplookup 221.131.165.50
GeoIP Country Edition: CN, China
[root@moonpoint ~]#

A check of the IP address on DShield at showed that IP address has been associated with many attempts at unauthorized access to systems by password guessing - see SSH Source Summary. The DShield IP Info: 221.131.165.50 report for the system currently lists 82,133 reports with 283 targets with activity first reported on 2021-09-26.

When I ran the journalctl command again later, I saw evidence of attempts from other IP addresses to gain unauthorized access to the system via SSH, so I installed fail2ban to automatically block IP addresses when a specific number of failed SSH login attempts have been detected from IP addresses.

Related

  1. Blocking SSH break-in attempts with fail2ban
    Date: October 23, 2021
  2. Finding which package provided a file on a CentOS Linux system
    Date: October 23, 2021
  3. Fail2ban Logging
    Date: April 9, 2016

[/security/attacks] permanent link

Mon, Oct 05, 2020 9:25 pm

Your electricity will be cut off in 30 minutes

At 11:55 AM EDT this morning, my wife received a recorded call stating our electricity would be cut off by Delmarva Power, our electric utility, in thirty minutes. She called for me to pick up the phone, but by the time I got to a phone in another room, the call was disconnected. She said the message had instructed her to hit "1" to speak to someone. The call sounded like a scam to me, since I didn't know of any issue with our electicity payments and also because I would have expected a letter well before a cutoff date and more than 30 minutes to pay any past due payment if someone called. It seemed to me an obvious attempt to panic a called party into providing a credit card to a scammer engaged in fraud, but I checked our bank account anyway and saw the last payment due had been deducted from our checking account about two weeks before the call and when I logged into Delmarva's website to check the status of our account, I saw the last payment credited and a balance of zero dollars.

Using *69, I was able to determine the listed calling number was 1-443-739-1747, but a search online for accounts of others receiving a call from a scammer using that number did not reveal other such activity. I called the number back to see how the scammer operated or to see if it might be a spoofed number, but just got a recorded message that the called party was not available, so I should leave a message. It sounded like a generic voicemail message. So, perhaps, the scammer spoofed the calling number as they often do to make it difficult to track down their identity.

[/security/scams] permanent link

Thu, Aug 27, 2020 9:30 pm

Turning off McAfee AntiVirus Plus realtime protection temporarily

To temporarily turn off the realtime antivirus protection in McAfee AntiVirus Plus, e.g., so you could move a file to another system for analysis that it might deem malware or to scan the system with other antivirus software, you can take the following steps:
  1. Open the program and click on the gear (cog) icon at the upper, right-hand corner of the window.
  2. Under the PC Security section of the Settings, you will see "Real-Time Scanning." When you click on "Real-Time Scanning" you will have the option of turning off the real-time monitoring for 15 minute intervals from 15 to 60 minutes or you can select "When I restart my PC" or "Never."

If you select a timed option, the protection will automatically turn back on after that period of time. You can also turn on protection again prior to that time by modifying the "Real-Time Scanning" setting again.

If you wish to view or restore items McAfee AntiVirus Plus has quarantined, you can click on "Quarantined items" under Settings, which will show you all files in the quarantine area, if any.

Note: these steps were tested on McAfee® AntiVirus Plus version 16.0

[/security/antivirus/mcafee] permanent link

Thu, Jun 18, 2020 7:44 pm

Verifying a website's security certificate with openssl

You can verify a website's security certificate from a command line interface (CLI), such as a shell prompt, by using OpenSSL, which is available for Linux, macOS, Microsoft Windows and other operating systems — for a Windows version, see the instructions at How to install the most recent version of OpenSSL on Windows 10 in 64 Bit. To check a certificate, you can issue the command openssl s_client -connect example.com:443 -showcerts, substituting the fully qualified domain name (FQDN) of the site you wish to check for example.com. The output for example.com is shown below.

$ openssl s_client -connect example.com:443 -showcerts         CONNECTED(00000003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = US, ST = California, L = Los Angeles, O = Internet Corporation for Assigned Names and Numbers, OU = Technology, CN = www.example.org
verify return:1
---
Certificate chain
 0 s:/C=US/ST=California/L=Los Angeles/O=Internet Corporation for Assigned Names and Numbers/OU=Technology/CN=www.example.org
   i:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA
-----BEGIN CERTIFICATE-----
MIIHQDCCBiigAwIBAgIQD9B43Ujxor1NDyupa2A4/jANBgkqhkiG9w0BAQsFADBN
<text snipped>
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: 907C391C745555481A141A04D65B7CD175BD5E052FF39EFD17B30848D535F0D1
    Session-ID-ctx:
    Master-Key: 9DC337D789BB8DB7CCE82BBC3EAD28C4A9E98016C98D35AD9A6B737C0B76AE3118881303F7E7890BEE0567FFC402B5F9
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - b1 7d 3a 56 0e 17 8f 5a-37 b0 4b 03 dd de 8d 98   .}:V...Z7.K.....
    0010 - 59 36 bb 73 43 e2 95 2a-9b 2e de ef 99 5e 92 d8   Y6.sC..*.....^..
    0020 - 3a 16 b6 4d 78 2b c6 a4-58 a5 5b 2e c0 8a 1f a6   :..Mx+..X.[.....
    0030 - e6 35 dd 8d 77 fb 4e 09-82 94 c0 8c 6e f8 56 41   .5..w.N.....n.VA
    0040 - 9a bb 82 a6 b1 30 5d bc-38 24 00 9c a6 a3 10 c5   .....0].8$......
    0050 - 6f cc e8 c8 25 62 6f e0-8f 7d 1a d9 18 6a db 32   o...%bo..}...j.2
    0060 - 48 07 df b0 15 fc 98 a0-5d 27 93 df 20 4c 6c ae   H.......]'.. Ll.
    0070 - cf 95 23 49 d0 c0 57 10-c1 8b 12 fa b0 c4 33 41   ..#I..W.......3A
    0080 - 2f 21 cf df dc 9a 1f 44-68 a3 76 81 0f b8 04 ab   /!.....Dh.v.....
    0090 - 59 e7 c4 29 79 28 f9 45-43 82 b9 a0 5a e5 6d 5a   Y..)y(.EC...Z.mZ

    Start Time: 1592522720
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
closed
$

If you wish to check on whether a particular cipher is supported, you can use the command openssl s_client -cipher followed by the particular cipher for which you wish to connect and then -connect followed by the FQDN, a colon, and then the HTTPS port, port 443, as shown below for example.com. If you see the response "handshake failure" as in the example below, the cipher is not supported.

$ openssl s_client -cipher 'ECDHE-ECDSA-AES256-SHA' -connect example.com:443
CONNECTED(00000003)
140497569793952:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:769:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 121 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : 0000
    Session-ID:
    Session-ID-ctx:
    Master-Key:
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1592522976
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
$

If the cipher is supported, you will see "connected" instead, as shown below.

$ openssl s_client -cipher 'ECDHE-RSA-AES128-GCM-SHA256' -connect example.com:443
CONNECTED(00000003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = US, ST = California, L = Los Angeles, O = Internet Corporation for Assigned Names and Numbers, OU = Technology, CN = www.example.org
verify return:1
---
Certificate chain
 0 s:/C=US/ST=California/L=Los Angeles/O=Internet Corporation for Assigned Names and Numbers/OU=Technology/CN=www.example.org
   i:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA
<text snipped>
   Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 27 d3 5d a3 cf ac 34 0b-92 af c6 00 17 0d 15 bc   '.]...4.........
    0010 - 6b be b4 92 dc 1a 01 97-98 9c f4 2b 68 f7 fd 69   k..........+h..i
    0020 - 1c fd 25 16 21 ba aa f9-43 2b 1a 4b 54 d8 48 37   ..%.!...C+.KT.H7
    0030 - 90 f7 2f 3f 76 d1 88 22-cf db 43 77 55 40 d2 41   ../?v.."..CwU@.A
    0040 - c8 3a 8c f5 75 02 9b 88-92 92 38 f3 53 46 e7 48   .:..u.....8.SF.H
    0050 - 9a bf 2d db 78 00 cd 12-2c 30 fc f8 81 20 e9 89   ..-.x...,0... ..
    0060 - c0 8f 3c e3 e6 22 69 af-cb cd b0 ec dd 06 1b c9   ..<.."i.........
    0070 - f3 82 cb ee 85 f1 c8 6a-27 29 5b 42 7e bb 87 60   .......j')[B~..`
    0080 - c3 17 4a ff 54 41 b3 1a-8e 3b e3 30 b6 48 fa 9d   ..J.TA...;.0.H..
    0090 - b3 50 a5 2b 73 8d 59 16-4c fd b4 24 54 48 14 08   .P.+s.Y.L..$TH..

    Start Time: 1592523392
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---

closed
$

[/security/encryption/openssl] permanent link

Fri, Jun 05, 2020 5:22 pm

Call from 616-465-0071 purporting to be from Amazon

My wife received a call today that was a recorded message purportedly about a suspicous Amazon charge for an iPhone. She asked me to pick up the phone, but by the time I got to the phone the call was disconnected. I used *69 to determine the calling number was 1-616-465-0071, though of course the number may have been spoofed. I searched online and didn't find anyone else reporting a fraudulent call from that number purporting to be from Amazon. I checked our Amazon account just to be certain there was no recent charge for something neither of us ordered, but I didn't see anything ordered after a recent purchase of ink for my wife's printer. I tried calling the number using *69 just to see whether I could get anyone at the other end or any identifying voice message, but only got the message "I'm sorry we can not connect your call at this time." Subsequent attempts I made to call the number resulted in a busy signal. At this point, I'm presuming the call was an attempt by a scammer to obtain information about our Amazon account or a credit card number associated with the account.

[/security/scams] permanent link

Valid HTML 4.01 Transitional

Privacy Policy   Contact

Blosxom logo