Contextual scan on MediaTubeCodec_ver1.668.3.exe was clean but upon executing it got Trojan.FakeAlert.TF installed in multiple places which disabled all hotkeys, BD, & Explorer(how did they do that?). As of Thurs,<link removed> was still trying to get u to d/l MediaTubeCodec_ver1.668.3.exe . This trojan is well done from both a technical & human engineering point of view & I only recovered because I image OS 1/wk, save registry 1/3days & have BartPE.
So for those who 'clean installed' by doing AV scan then killing alot of processes including AV then running install exe, this sequence is no longer safe. With ATI drivers+.. I guess I'll have to image my drives b4 installing.
Question: Whois leads ultimately to site whose TS is in Russian so who can I report this to so we can waterboard these guys! I've got alot of scan logs & screenshots from the attack.
Your help is MUCH appreciated. Thanks- bye- Larry
/applications/core/interface/file/attachment.php?id=2384" data-fileid="2384" rel="">link.txt