communications relay login

WHY???

Started By:
jdcollins, Thu 28 Oct, 2021 4:09 AM
Views:
9333
Replies:
26
    • Commendation
      Commendation (150 Points)

      Awarded during the UFP Award Ceremony to those who go above and beyond for the community

      Unlocked Sat 26 Jun, 2021 9:20 PM

      0.24% have received this achievement

    • Highly Decorated
      Very Rare (100 Points)

      Receive every medal the UFP has to offer

      Unlocked Sat 25 Sep, 2021 9:17 PM

      0.18% have received this achievement

    • The Fool
      Rare (50 Points)

      Got pranked on April 1st

      Unlocked Thu 01 Apr, 2021 11:25 AM

      0.46% have received this achievement

    • Admiral
      Rare (50 Points)

      Receive a promotion to the rank of Admiral

      Unlocked Sat 18 Jun, 2022 9:10 PM

      0.22% have received this achievement

    • Eternal Servitude!
      Uncommon (25 Points)

      Be a registered user for five years

      Unlocked Sun 31 Jul, 2022 10:06 PM

      75.65% have received this achievement

    • tlhIngan SuvwI'
      Common (10 Points)

      Be a member of the House of Kular

      Unlocked Tue 12 Feb, 2019 12:02 PM

      13.07% have received this achievement

    ACHV. Points
    1030
    Reputation
    10
    Join Date
    Jul 31 2017
    Posts
    3,013
    Location
    St. Louis, Missouri, USA
    0
    • Users who disliked
    • None
    1
    • Users who liked
    • Miles
    Reply With QuoteQuote
    #16
    Ok, I'm back up (partially). Still got a lot to do but wanted to get on here and see what was up.
    Sounds like them ♥♥♥♥♥♥♥s decided to get on my Discord...hopefully resetting my password will keep them out. I just hope I won't have to get a new account or anything. Will resetting password be enough?
    YAY! And. . . sorry about that. I was afraid it would be GlobeImposter 2. It's been going around it seems.

    As for your password? Probably. Depending on the way you configure your passwords.
    My Discord PW goes something like:
    DSCO-)*^xxxxxxxx)*&x(&*xxxxxxxxxxxxxxxxxxxxxxxxx-xxxxx[xxxxxxxxxxxxxxxxx
    where x=something, for example. And it matches absolutely none of my other passwords. I have a vault. A big, third-party vault.
    "And when I saw the breadth of my domain, I wept, for there were no more worlds left to conquer."
    • The Never Ending Sacrifice
      Very Rare (100 Points)

      Win a Short Story Competition

      Unlocked Sat 08 Apr, 2017 11:32 AM

      0.04% have received this achievement

    • Pillar of the Community
      Very Rare (100 Points)

      Be a registered user for 10 years

      Unlocked Sat 28 Aug, 2021 2:05 AM

      34.53% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Captain
      Uncommon (25 Points)

      Ascend the ranks to reach the Captains chair

      Unlocked Mon 29 Nov, 2021 10:23 AM

      0.67% have received this achievement

    • Command Material
      Common (10 Points)

      Sit and pass the Academy Command Exam

      Unlocked Sat 05 Aug, 2017 3:02 PM

      4.57% have received this achievement

    • Old School Gamer
      Common (10 Points)

      Be a member of Starfleet Tactical

      Grandfathered

      7.01% have received this achievement

    ACHV. Points
    750
    Reputation
    6
    Join Date
    Aug 28 2011
    Posts
    621
    Location
    Breda, Noord-Brabant, the
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #17
    Ehm, as far as I'm aware the globeimposter 2 variant is pretty well known and near-complete decryption should be doable with a little effort. It's a variant of the origional Globeimposter with, as far as i can tell, little real changes. The encryption isn't total, and probably only a few mb's of each file actually is encrypted. So if there's large files involved, they should be recoverable for the most part.

    Have a look through some of the result here:
    (https://duckduckgo.com/?q=GlobeImpos...=v295-3&ia=web)

    I'd hold off on the full system wipe and look into it a bit before throwing in the towel. Regardless of that you do have to assume that everything you had access to that wasn't protected by 2-factor authentication (and possibly even some that did) is now in the hands of the script kidz that infected you.

    So the very first focus should be to make a list of every account you use, their method of authentication and then (from a liveboot machine) go to each one of them, try to access and if successful download everything you can, and close those accounts, and after you've got everything you could assess the damage.

    You also should keep the infected system off the net (period, no exceptions or excuses) recover everything you can (decrypt it perhaps) and then do a thorough wipe regardless of anything. I'm talking about writing the storage with 1's and then writing 0's (every single bit, even if its empty) before finally repartitioning and using the storage again.

    Only then should you consider connecting that machine back to anything that resembles a network.

    If you're looking for the cleanest and safe procedure to follow after the recovery process I would advise deleting every single account you've ever accessed from that machine. Not just changing passwords, and or email addresses, not just switching on 2fa, none of that.

    DELETE IT ALL!

    The email addresses used in those accounts should also be considered a liability from now on, and also be deleted.

    They only need one overlooked file or something they were able to hide a backdoor in/under/on and you're right back where you started, or even worse: motivating them to keep you as an active target for a while because you're a bit more challenging than a computer illiterate.

    Create new accounts for everything you NEED access to but do not use email adresses, naming or protection that's similar to the old ones and if possible use 2fa at all times.

    I know i sound overreacting but trust me i have been in your shoes myself and i can tell you they can hide trigger script or code in a document, music file, video file or even in a simple cookie.

    If like you mentioned the machine infected didn't contain financial or other things that you need for survival or income or whatever, especially if its only mp3's, avi's and the like, It's not worth the risk, destroy it!

    Keep in mind that EVERYTHING you did before you got infected is now a potential source of re-infection. you cannot use that ever again, without risking a repeat.

    Best of luck my friend, I do not envy you. But I found having to go through that process is in a way therapeutic. It also forces you to realize how much you accumulate across the net in the sense of no longer used accounts, and information/data that is useless, obsolete but not deleted and removed.

    Good luck!
    DeuZige
    DeuZige Medals
    𝔡𝔢𝔲ℨ𝔦𝔤𝔢 𝔅𝔯𝔢𝔡𝔞
    • Dedicated
      Rare (50 Points)

      Volunteer for 1+ year

      Unlocked Fri 05 Oct, 2018 12:21 AM

      0.54% have received this achievement

    • Eternal Servitude!
      Uncommon (25 Points)

      Be a registered user for five years

      Unlocked Sun 18 Apr, 2021 9:02 PM

      75.65% have received this achievement

    • Dean’s List
      Uncommon (25 Points)

      Pass all three Academy exams

      Unlocked Wed 02 Nov, 2016 9:03 AM

      3.98% have received this achievement

    • Chatterbox
      Uncommon (25 Points)

      Join the UFP Teamspeak

      Unlocked Fri 05 Oct, 2018 12:21 AM

      0.20% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Paragon of Duty
      Uncommon (25 Points)

      Sign three roll calls in a row

      Unlocked Sat 04 Mar, 2017 8:07 AM

      9.74% have received this achievement

    ACHV. Points
    440
    Reputation
    5
    Join Date
    Apr 18 2016
    Posts
    323
    Location
    Evansville, IN
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #18
     –  Last edited by jdcollins; Sun 31 Oct, 2021 8:00 AM.
    Ehm, as far as I'm aware the globeimposter 2 variant is pretty well known and near-complete decryption should be doable with a little effort. It's a variant of the origional Globeimposter with, as far as i can tell, little real changes. The encryption isn't total, and probably only a few mb's of each file actually is encrypted. So if there's large files involved, they should be recoverable for the most part.

    Have a look through some of the result here:
    (https://duckduckgo.com/?q=GlobeImpos...=v295-3&ia=web)

    I'd hold off on the full system wipe and look into it a bit before throwing in the towel. Regardless of that you do have to assume that everything you had access to that wasn't protected by 2-factor authentication (and possibly even some that did) is now in the hands of the script kidz that infected you.

    So the very first focus should be to make a list of every account you use, their method of authentication and then (from a liveboot machine) go to each one of them, try to access and if successful download everything you can, and close those accounts, and after you've got everything you could assess the damage.

    You also should keep the infected system off the net (period, no exceptions or excuses) recover everything you can (decrypt it perhaps) and then do a thorough wipe regardless of anything. I'm talking about writing the storage with 1's and then writing 0's (every single bit, even if its empty) before finally repartitioning and using the storage again.

    Only then should you consider connecting that machine back to anything that resembles a network.

    If you're looking for the cleanest and safe procedure to follow after the recovery process I would advise deleting every single account you've ever accessed from that machine. Not just changing passwords, and or email addresses, not just switching on 2fa, none of that.

    DELETE IT ALL!

    The email addresses used in those accounts should also be considered a liability from now on, and also be deleted.

    They only need one overlooked file or something they were able to hide a backdoor in/under/on and you're right back where you started, or even worse: motivating them to keep you as an active target for a while because you're a bit more challenging than a computer illiterate.

    Create new accounts for everything you NEED access to but do not use email adresses, naming or protection that's similar to the old ones and if possible use 2fa at all times.

    I know i sound overreacting but trust me i have been in your shoes myself and i can tell you they can hide trigger script or code in a document, music file, video file or even in a simple cookie.

    If like you mentioned the machine infected didn't contain financial or other things that you need for survival or income or whatever, especially if its only mp3's, avi's and the like, It's not worth the risk, destroy it!

    Keep in mind that EVERYTHING you did before you got infected is now a potential source of re-infection. you cannot use that ever again, without risking a repeat.

    Best of luck my friend, I do not envy you. But I found having to go through that process is in a way therapeutic. It also forces you to realize how much you accumulate across the net in the sense of no longer used accounts, and information/data that is useless, obsolete but not deleted and removed.

    Good luck!
    I've already formatted all my drives and re-installed my OS.

    So, you're saying that even though I formatted all of the drives during OS re-install that something could be left behind?

    I changed my e-mail passwords on my phone and away from home so as not to be linked to my home's wireless connection.
    Even changed password to Face Book.
    I've also been redoing log in and passwords to sites that involve purchases and I have no plans to link my new bank card (which I got early Saturday) to any site. Also ensured that no sites or passwords are being saved by my browser.
    I'm thinking about trying the Bit Locker that comes with windows. Anyone have any experience with it?

    I also just looked at link, I did not see the file format they used on me. It was a .xls and when opened was usually a full page of code.
    JdcollinsJdcollins Medals
    • The Never Ending Sacrifice
      Very Rare (100 Points)

      Win a Short Story Competition

      Unlocked Sat 08 Apr, 2017 11:32 AM

      0.04% have received this achievement

    • Pillar of the Community
      Very Rare (100 Points)

      Be a registered user for 10 years

      Unlocked Sat 28 Aug, 2021 2:05 AM

      34.53% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Captain
      Uncommon (25 Points)

      Ascend the ranks to reach the Captains chair

      Unlocked Mon 29 Nov, 2021 10:23 AM

      0.67% have received this achievement

    • Command Material
      Common (10 Points)

      Sit and pass the Academy Command Exam

      Unlocked Sat 05 Aug, 2017 3:02 PM

      4.57% have received this achievement

    • Old School Gamer
      Common (10 Points)

      Be a member of Starfleet Tactical

      Grandfathered

      7.01% have received this achievement

    ACHV. Points
    750
    Reputation
    6
    Join Date
    Aug 28 2011
    Posts
    621
    Location
    Breda, Noord-Brabant, the
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #19
    Regarding formatting drives and re-installing:
    The Globeimposter is usually working from a rootkit entry point. Ie. the infection itself is located somewhere the operating system does not have access to or is unable to see. Tracks, cylinders or blocks on the harddrive that for example ntfs and windows do not or cannot read or write.

    Secondly when you format a drive, you do not format a drive. You merely remove the index in which the location of your data is registered. Then a new one is created, empty, after which only newly stored data is written and its location recorded in that index. As long as nothing new is written at any location, whatever was written on that location is still there. It's just not known that it is there and what it is that's there.

    Tools and methods can easily recover that data and reconstitute is into its origional form (toold like recuva do this).
    This can ofcourse be used malisciously by storing the malware code on an obscure rarely used drive location, keeping index of where the malware code is written seperate from the drive's and then after a format, and often even during the installation of the os, this malware code is reconstituted by the rootkit based malware having the drives or at least the system back infected before the OS is done installing.

    As far as using old accounts by simply resetting the password....

    You need to keep in mind that where ever they've had access to, they could have placed hidden things that could be of use to them at a later date.
    They could have recorded all the email adresses you use for account recovery and password reset purposes and found one of those to be based on a system that has a vulnerability they can exploit to gain access or to have BCC's sent somewhere they have access to. Every account not protected by a very good 2 factor authentication (ie. google authenticate or similar app) is a potential threat to your whole online existence. Even 2fa using sms's or using mail verification is a potential way in, depending on the resourses the hackers have to imploy more advanced techniques.An sms sent to one phonenumber can relatively easily trigger a duplicate to be sent to another (even spoofed maybe) destination.

    Passwords as a method of securing account access, sadly, is simply no longer safe, and not usable to secure an account anymore. The simple 2fa (a message, code or link sent to a phone or email adress) is also no longer reliable. The code generating apps like google authenticator or microsoft's one are the lowest account security measure safe anough to be kept after being completely ripped a new one like you've been. You said yourself, they managed to buy stuff in your name. That is (or should be) hard to do, even for good blackhatters.

    - - - Updated - - -

    And now i'm going to sleep, for realsies this time.
    DeuZige
    DeuZige Medals
    𝔡𝔢𝔲ℨ𝔦𝔤𝔢 𝔅𝔯𝔢𝔡𝔞
  1. Deputy Head of Gaming

    • Commendation
      Commendation (150 Points)

      Awarded during the UFP Award Ceremony to those who go above and beyond for the community

      Unlocked Sat 22 Dec, 2018 10:28 PM

      0.24% have received this achievement

    • Highly Decorated
      Very Rare (100 Points)

      Receive every medal the UFP has to offer

      Unlocked Fri 03 Jul, 2020 6:26 PM

      0.18% have received this achievement

    • Pillar of the Community
      Very Rare (100 Points)

      Be a registered user for 10 years

      Unlocked Thu 27 Apr, 2023 1:06 AM

      34.53% have received this achievement

    • At the Helm
      Rare (50 Points)

      Be Head of Starfleet Operations

      Unlocked Sun 14 Jan, 2018 6:00 PM

      0.07% have received this achievement

    • Dedicated
      Rare (50 Points)

      Volunteer for 1+ year

      Unlocked Fri 05 Oct, 2018 12:12 AM

      0.54% have received this achievement

    • The Fool
      Rare (50 Points)

      Got pranked on April 1st

      Unlocked Thu 01 Apr, 2021 11:35 AM

      0.46% have received this achievement

    ACHV. Points
    1265
    Reputation
    10
    Join Date
    Apr 26 2013
    Posts
    4,711
    Location
    Dubai
    0
    • Users who disliked
    • None
    2
    • Users who liked
    • Sul-Matuul
    • Jestersmith
    Reply With QuoteQuote
    #20
    Setup 2FA. Even your amazon account can be defended by 2FA Google Authenticator apps. When on Amazon visit your account > Login & Security settings.

    Especially setup 2FA on portals/apps where you have your credit cards / corporate credit cards / debit cards / prepaid cards details put in. Most apps/portals come with this feature, it's just a matter of taking the time to go to your account settings and discovering them.

    About two or three years ago my steam was hacked and this is some sound advice I got from Laz and folks on TS. Since then I do this everywhere. Though most of my local banks also now have with pass + face lock feature as well - I practice this on every other app.

    Even NVIDIA Geforce Experience app has recently put this in.
    Mack Medals
    • Dedicated
      Rare (50 Points)

      Volunteer for 1+ year

      Unlocked Fri 05 Oct, 2018 12:21 AM

      0.54% have received this achievement

    • Eternal Servitude!
      Uncommon (25 Points)

      Be a registered user for five years

      Unlocked Sun 18 Apr, 2021 9:02 PM

      75.65% have received this achievement

    • Dean’s List
      Uncommon (25 Points)

      Pass all three Academy exams

      Unlocked Wed 02 Nov, 2016 9:03 AM

      3.98% have received this achievement

    • Chatterbox
      Uncommon (25 Points)

      Join the UFP Teamspeak

      Unlocked Fri 05 Oct, 2018 12:21 AM

      0.20% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Paragon of Duty
      Uncommon (25 Points)

      Sign three roll calls in a row

      Unlocked Sat 04 Mar, 2017 8:07 AM

      9.74% have received this achievement

    ACHV. Points
    440
    Reputation
    5
    Join Date
    Apr 18 2016
    Posts
    323
    Location
    Evansville, IN
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #21
    Regarding formatting drives and re-installing:
    The Globeimposter is usually working from a rootkit entry point. Ie. the infection itself is located somewhere the operating system does not have access to or is unable to see. Tracks, cylinders or blocks on the harddrive that for example ntfs and windows do not or cannot read or write.

    Secondly when you format a drive, you do not format a drive. You merely remove the index in which the location of your data is registered. Then a new one is created, empty, after which only newly stored data is written and its location recorded in that index. As long as nothing new is written at any location, whatever was written on that location is still there. It's just not known that it is there and what it is that's there.

    Tools and methods can easily recover that data and reconstitute is into its origional form (toold like recuva do this).
    This can ofcourse be used malisciously by storing the malware code on an obscure rarely used drive location, keeping index of where the malware code is written seperate from the drive's and then after a format, and often even during the installation of the os, this malware code is reconstituted by the rootkit based malware having the drives or at least the system back infected before the OS is done installing.

    As far as using old accounts by simply resetting the password....

    You need to keep in mind that where ever they've had access to, they could have placed hidden things that could be of use to them at a later date.
    They could have recorded all the email adresses you use for account recovery and password reset purposes and found one of those to be based on a system that has a vulnerability they can exploit to gain access or to have BCC's sent somewhere they have access to. Every account not protected by a very good 2 factor authentication (ie. google authenticate or similar app) is a potential threat to your whole online existence. Even 2fa using sms's or using mail verification is a potential way in, depending on the resourses the hackers have to imploy more advanced techniques.An sms sent to one phonenumber can relatively easily trigger a duplicate to be sent to another (even spoofed maybe) destination.

    Passwords as a method of securing account access, sadly, is simply no longer safe, and not usable to secure an account anymore. The simple 2fa (a message, code or link sent to a phone or email adress) is also no longer reliable. The code generating apps like google authenticator or microsoft's one are the lowest account security measure safe anough to be kept after being completely ripped a new one like you've been. You said yourself, they managed to buy stuff in your name. That is (or should be) hard to do, even for good blackhatters.

    - - - Updated - - -

    And now i'm going to sleep, for realsies this time.
    Well crap, sounds like the only thing I can do that will be reliable is trash all of my drives and buy new...is there anything that can completely wipe them?
    JdcollinsJdcollins Medals
    • The Never Ending Sacrifice
      Very Rare (100 Points)

      Win a Short Story Competition

      Unlocked Sat 08 Apr, 2017 11:32 AM

      0.04% have received this achievement

    • Pillar of the Community
      Very Rare (100 Points)

      Be a registered user for 10 years

      Unlocked Sat 28 Aug, 2021 2:05 AM

      34.53% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Captain
      Uncommon (25 Points)

      Ascend the ranks to reach the Captains chair

      Unlocked Mon 29 Nov, 2021 10:23 AM

      0.67% have received this achievement

    • Command Material
      Common (10 Points)

      Sit and pass the Academy Command Exam

      Unlocked Sat 05 Aug, 2017 3:02 PM

      4.57% have received this achievement

    • Old School Gamer
      Common (10 Points)

      Be a member of Starfleet Tactical

      Grandfathered

      7.01% have received this achievement

    ACHV. Points
    750
    Reputation
    6
    Join Date
    Aug 28 2011
    Posts
    621
    Location
    Breda, Noord-Brabant, the
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #22

    To quote one security firm analyzing malware samples:
    The sample referred to as GlobeImposter 2.0 isn’t just a junk copycat of the prolific Globe ransomware, but it’s shaping up to be one of the prevalent and most dangerous file-encrypting malware strains in the wild.
    GlobeImposter 2 has been identified as being a rootkit. If only for peace of mind I'd recommend at least wiping the drives. Here's a tool that will do the trick. Throwing the drives away is not needed though, I agree on that.


    CBL Data Shredder comes in two forms: you can either boot from it via a disc or USB stick (like with DBAN) or use it from within Windows like a regular program.

    To erase the hard drive that's running an operating system, you're required to boot to the program, whereas deleting another internal or external drive can be done with the Windows version.

    Data Sanitization Methods: DoD 5220.22-M, Gutmann, RMCP DSX, Schneier, VSITR

    In addition to the above, you can create your own custom method to include 1s, 0s, random data, or custom text with a custom number of passes.

    The bootable version tells you how large each drive is but that's about the only identifiable information given, whereas the Windows version makes it easier to know what drive you're about to wipe clean.

    The Windows version of CBL Data Shredder works with Windows XP through Windows 10.


    Which you decide on is up to you. I've had the experience of malware returning after a complete format and fresh install of Windows 10 myself, which is why i'm extra cautious on this point.

    Good luck!
    DeuZige
    DeuZige Medals
    𝔡𝔢𝔲ℨ𝔦𝔤𝔢 𝔅𝔯𝔢𝔡𝔞
  2. Fleet Admiral

    • Commendation
      Commendation (150 Points)

      Awarded during the UFP Award Ceremony to those who go above and beyond for the community

      Unlocked Sat 29 Jun, 2019 9:56 PM

      0.24% have received this achievement

    • To Infinity and Beyond
      Very Rare (100 Points)

      Reach ten-thousand posts on the forums

      Grandfathered

      0.02% have received this achievement

    • Highly Decorated
      Very Rare (100 Points)

      Receive every medal the UFP has to offer

      Unlocked Sun 27 Mar, 2016 2:00 PM

      0.18% have received this achievement

    • Set Phasers To Frag
      Very Rare (100 Points)

      Win an Annual Elite Force Tournament

      Unlocked Sun 28 Aug, 2016 7:24 PM

      0.04% have received this achievement

    • Top Brass
      Very Rare (100 Points)

      Reach the highest Starfleet Rank

      Unlocked Sat 17 Dec, 2016 10:30 PM

      0.03% have received this achievement

    • Hearthstone Tournament Winner
      Very Rare (100 Points)

      Win the annual Hearthstone Tournament

      Unlocked Mon 04 Jul, 2016 6:08 PM

      0.01% have received this achievement

    ACHV. Points
    2415
    Reputation
    10
    Join Date
    Jan 25 2012
    Posts
    14,177
    Location
    Unimatrix 01
    Pronouns
    She/Her
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #23
    To quote one security firm analyzing malware samples
    I DuckDuckGo'd the quote there, and it's from an article in 2017 - https://myspybot.com/globeimposter-2-0/

    By this point, Laz is probably right, it's no longer fresh, it has probably be bought, and sold so many times!
    • The Never Ending Sacrifice
      Very Rare (100 Points)

      Win a Short Story Competition

      Unlocked Sat 08 Apr, 2017 11:32 AM

      0.04% have received this achievement

    • Pillar of the Community
      Very Rare (100 Points)

      Be a registered user for 10 years

      Unlocked Sat 28 Aug, 2021 2:05 AM

      34.53% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Captain
      Uncommon (25 Points)

      Ascend the ranks to reach the Captains chair

      Unlocked Mon 29 Nov, 2021 10:23 AM

      0.67% have received this achievement

    • Command Material
      Common (10 Points)

      Sit and pass the Academy Command Exam

      Unlocked Sat 05 Aug, 2017 3:02 PM

      4.57% have received this achievement

    • Old School Gamer
      Common (10 Points)

      Be a member of Starfleet Tactical

      Grandfathered

      7.01% have received this achievement

    ACHV. Points
    750
    Reputation
    6
    Join Date
    Aug 28 2011
    Posts
    621
    Location
    Breda, Noord-Brabant, the
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #24
    Hmz. thanks. didn't notice the date tbh. Thanks for being sharp there!
    DeuZige
    DeuZige Medals
    𝔡𝔢𝔲ℨ𝔦𝔤𝔢 𝔅𝔯𝔢𝔡𝔞
    • The Never Ending Sacrifice
      Very Rare (100 Points)

      Win a Short Story Competition

      Unlocked Sat 08 Apr, 2017 11:32 AM

      0.04% have received this achievement

    • Pillar of the Community
      Very Rare (100 Points)

      Be a registered user for 10 years

      Unlocked Sat 28 Aug, 2021 2:05 AM

      34.53% have received this achievement

    • Stepping Forward
      Uncommon (25 Points)

      Going from Clearance Level 3 to Clearance Level 4

      Unlocked Sat 29 Sep, 2018 1:28 PM

      1.91% have received this achievement

    • Captain
      Uncommon (25 Points)

      Ascend the ranks to reach the Captains chair

      Unlocked Mon 29 Nov, 2021 10:23 AM

      0.67% have received this achievement

    • Command Material
      Common (10 Points)

      Sit and pass the Academy Command Exam

      Unlocked Sat 05 Aug, 2017 3:02 PM

      4.57% have received this achievement

    • Old School Gamer
      Common (10 Points)

      Be a member of Starfleet Tactical

      Grandfathered

      7.01% have received this achievement

    ACHV. Points
    750
    Reputation
    6
    Join Date
    Aug 28 2011
    Posts
    621
    Location
    Breda, Noord-Brabant, the
    0
    • Users who disliked
    • None
    0
    • Users who liked
    • None
    Reply With QuoteQuote
    #25

    Ok, i just went with the Malwarebytes assessment of it as a rootkit. I didn't do extensive research into this one. I got flashbacks to my traumatic experience with the Copy-Paste malware that infected my PC about one or two months ago which did survive removing the partitions from the drives, recreating partitions, formatting the partitions, and installing windows fresh from USB. I've always known Malwarebytes to be accurate and so i trusted their designation as a rootkit.

    Apparently erroneous designation as a rootkit i know learned.

    Glad i'm not using Windows anymore as my daily driver. I use Windows only for gaming and recreational browsing. Anything serious needs to be done? Linux.
    DeuZige
    DeuZige Medals
    𝔡𝔢𝔲ℨ𝔦𝔤𝔢 𝔅𝔯𝔢𝔡𝔞