Search the Community
Showing results for tags 'malware'.
Found 4 results
As you may have noticed, all advertising has been temporarily removed from AVSIM. Our advertising "engine" was upgraded a month ago and included in the upgrade was code that allowed a Trojan to be inserted into the system. The "package" chose its time and instances to "turn on", so the Trojan was not operating 24 x 7. The malware primarily affected IE9 browsers and was effectively blocked by all of the major virus protection programs. If you have been running IE9 and do not have an anti-virus program, we strongly suggest you do a scan of your system as soon as possible. Until we resolve the issues with our advertising back-end, we will leave the advertising off line. To our advertisers, we will extend your advertising by one day for every one that our advertising back-end is down. To everyone, please accept our apologies... This is a stark reminder that the Internet, no matter how hard we try otherwise to protect each other, is not a safe place and we must be on our guard at all times.
Greetings all, Thanks for this latest update. Once again the 'highly acclaimed' ESET NOD 32 AntiVirus deletes a key file on installation, as malware! (rxpGtnSim32.dll) The error message says in part: "Not designed to run on Windows or contains an error". As in the past, if I disable ESET everything installs and the GTN works as it should. This time its more annoying. It makes no difference if I use ESET's "Restore and Exclude from scans" option. I have no option but to reinstall. So if I start XP 11.11 with a GTN 750 enabled a/c it deletes the file necessitating a reinstall. I have tried to submit the file to ESET but it wouldn't send, saying tit can't find the file or it doesn't exist. Even after reinstalling and going to Program Data to selected it inside their "Submit for Analysis' routine. I will try again and report back. Meantime any comments? Have others found this problem? Does someones have an ESET work-around? Regards
Have you heard of the DNS Changer Malware threat? Are you infected? DCWG reports; "On November 8, the FBI, the NASA-OIG and Estonian police arrested several cyber criminals in “Operation Ghost Click”. The criminals operated under the company name “Rove Digital”, and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ and TDL4 viruses." DCWG continues; "The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet. Under a court order, expiring July 9, the Internet Systems Consortium is operating replacement DNS servers for the Rove Digital network. This will allow affected networks time to identify infected hosts, and avoid sudden disruption of services to victim machines." This protection comes to an end in July, and if your machine is infected with the Malware, you could loose your internet connection for a period of time. As of this writing, over 350,000 machines remain infected. To check to see if your machine is inflicted with the malware, and to fix it if it is, please go to the DCWG Site here.
The Malware insertion attack that occurred starting Wednesday afternoon was brought to a stop early Thursday by removing all advertising on our system. The Malware was being inserted via a vulnerability of OPEN-X, an open source advertising backend that we had been using. OPEN-X has had a number of vulnerabilities over the years, and a continuing problem with these kinds of issues. We could not afford to risk our member's safety by continuing to allow that to exist and which most likely would present threats to you with future issues of the same kind. Friday, we purchased a new, proprietary system with numerious protection schemes and have worked to bring all of our advertising back online. The new system presents some very powerful features for our advertisers, and we will be contacting them in the coming days to inform them of the new system. Bottom line is that our advertising system is now secure and does not present a potential threat of future exploits.