by butsch
20. February 2017 16:59
Well some Javascript library devlopers don't seem to understand that there is Ransomware. They could make sure all Security Firms know their code and trust it.
THREAT: Suspicious Attachment!script
Mcafee hat eine Malware mit dem Namen "Suspicious Attachment!script" entdeckt.
FILENAME: C:\Users\u3340437\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9FIW5LMY\modernizr[1].js
CLIENT: WSUB106764
TYPE: Potenziell unerwünschtes Programm
DAT: 2892.0
CATEGORY: Malware entdeckt
DESK/LAP: Workstation
OS: Windows 7
ZEIT: 02/17/17 09:46:09 UTC (Achtung UTC Coordinated Universal Time Timezone!)
What is Modernizr?
It's a collection of superfast tests – or "detects" as we like to call them – which run as your web page loads, then you can use the results to tailor the experience to the user.
https://modernizr.com/download#batteryapi-flash-setclasses
I would delete such a class from a security view. So does Mcafee Endpoint 10.5 on 20.02.2017
1004372e-e303-4e64-9e64-d72b7608f4f6|5|.0|27604f05-86ad-47ef-9e05-950bb762570c
Tags: