That was it exactly. I understand how the test works but. Me being out of it of late forgot that my Asus Router is not my router at the moment, its in access point mode. Had to log into my crappy Verizon Actiontec router and sure enough, ICMP was turned on. Disabled it and all is well again. Thanks man.
Jaff ransomware server also hosting Dark Web PII fencing operation https://www.scmagazine.com/jaff-ran...ark-web-pii-fencing-operation/article/666461/
GPAA Ransomware Shows the Depravity of Some Ransomware Developers https://www.bleepingcomputer.com/ne...-the-depravity-of-some-ransomware-developers/
Decrypted: Kaspersky Releases Decryptor for the Jaff Ransomware https://www.bleepingcomputer.com/ne...y-releases-decryptor-for-the-jaff-ransomware/
Ouch! Also Linux based: With that kind of money payout, maybe the hackers will shift in mass to Linux platform and leave us Windows users alone.
Linux systems have been targeted a lot in the past 10 years. Because the bad guys know there are a lot of Linux based servers world wide. Most of the distros seems to very fast to patch things though. I been running Kubuntu for two years on my sisters computer and she know nothing about computers. When I get the urge I run Mint from a USB stick. It is a very fast OS even run form a USB stick.
http://www.majorgeeks.com/files/details/trend_micro_ransomware_file_decryptor.html or https://success.trendmicro.com/portal_kb_articledetail?solutionid=1114221
Do porn and your smart phone will go blind .................. https://www.bleepingcomputer.com/ne...omware-targets-the-us-with-fake-pornhub-apps/
https://blog.360totalsecurity.com/en/ransomware-decryption-tool-petya-wannacry-released/ Alternative download: http://www.majorgeeks.com/files/details/360_ransomware_decryption_tools.html
Petya malware behavior may change based on AV installed http://searchsecurity.techtarget.co...are-behavior-may-change-based-on-AV-installed
"Android’s WannaCry “SLocker” source leaks online A piece of mobile ransomware that mimics the methods of WannaCry malware has leaked online. The source code for the malicious software has been spilled to the web, allowing this “SLocker” to be downloaded and spread ad infinitum. The source code might also give security experts an easy way to ramp up protection against the malicious code..." https://www.slashgear.com/androids-...-leaks-online-heres-how-to-avoid-it-24492714/
Locky Ransomware Returns with Spam Campaign Pushing Diablo6 Variant https://www.bleepingcomputer.com/ne...s-with-spam-campaign-pushing-diablo6-variant/
Cerber ransomware using Magnitude EK and binary padding https://www.scmagazine.com/cerber-s...s-own-gate-and-binary-padding/article/681188/