I really need some help on this one. I own my domain name and manage my email accounts associated with that name. I do side work repairing computers and setup devices on corporate networks. I frequently slave a HDD using USB-SATA from computers that are virus ridden to remove malware. I have three email addresses associated with my domain and have changed the email passwords to incredible complexity but, I continue to receive these Ransom emails from my own accounts.
My laptop has the webcam disable in the BIOS and there is no porn on my laptop. I have run, Malwarebytes, Avast Boot Scan, with no issues found. I am exhausted over this issue and since I RDP(using VNC) into my clients corporate networks, I now worry my computer is infected or could possibly introduce this into their network. I even printed one of the emails and tried to scan it into a PDF document. Avast quarantined the scan with the ransomware shield. I am concerned about using this laptop anymore in a corporate environment. Should I completely blow away the WIN10PRO and reload. These email’s continue and they are driving me crazy trying to trace the hole in my security. Any help from anyone experiencing these issues would be so appreciated.
I continue to receive these Ransom emails from my own accounts.They are harvested and spoofed https://en.wikipedia.org/wiki/Email_spoofing https://en.wikipedia.org/wiki/Email_address_harvesting
You dont say what info the mail contain but i guess related to this scam?
Sextortion Scam Uses Recipient’s Hacked Passwords
https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/
EDIT: Just notised that i have sendt you the above sextortion links before
I frequently slave a HDD using USB-SATA from computers that are virus ridden to remove malware.Recomended FREE program
MCShield >> http://www.mcshield.net/
surf the website for info and reviews
INFO: pdf.doc http://www.mcshield.net/download/Doc/MCShield_Help_EN.pdf
This is not a antivirus but a special tool that (only) target those malware types that try to jump disk. There is a limited amount of tricks they can use to do this and all are known, it detect this from behaviour and dont need signatures. The few signatures it contain is there to avoid false positives
Program works automatic and is install and forget
EDIT: since i posted this yesterday MCS Cloud show lots of new install and detections
New install 427 758
Detections 3237 5851
I am concerned about using this laptop anymore in a corporate environment. Should I completely blow away the WIN10PRO and reload.If you want it checked, see instructions here >> https://forum.avast.com/index.php?topic=194892.0
scroll down to step #2 Farbar Recovery Scan Tool
attach the two diagnostic logs and a expert will be notified to check logs
Thank you for the advice. I thought I had this one under control but then started to receive the emails from all of my accounts. I will check out your instructions, my arsenal tool Malware tools has never let me down in the past. I have jobs backing up and out of an abundance of caution, I have held back in case it was my computer. I have never been infected myself, despite servicing 50-75 computers a year. This one just gets under my skin >:(
you can check mail accounts and passwords here
Mail https://haveibeenpwned.com/
Password https://haveibeenpwned.com/Passwords
avast hack check https://www.avast.com/hackcheck