• This community needs YOUR help today. We rely 100% on Supporting Memberships to fund our efforts. With the ever increasing fees of everything, we need help. We need more Supporting Members, today. Please invest back into this community. I will ship a few decals too in addition to all the account perks you get.



    Sign up here: https://www.muzzleloadingforum.com/account/upgrades
  • Friends, our 2nd Amendment rights are always under attack and the NRA has been a constant for decades in helping fight that fight.

    We have partnered with the NRA to offer you a discount on membership and Muzzleloading Forum gets a small percentage too of each membership, so you are supporting both the NRA and us.

    Use this link to sign up please; https://membership.nra.org/recruiters/join/XR045103

Spyware - Virus -buffaloarms

Muzzleloading Forum

Help Support Muzzleloading Forum:

This site may earn a commission from merchant affiliate links, including eBay, Amazon, and others.

Griz44Mag

70 Cal.
Joined
Nov 12, 2017
Messages
4,326
Reaction score
4,382
Location
Republic of Texas, District of Krum
Twice now I have been doing a search and got a link for this company.
Both times my commercial grade protection software blocked them from a spyware\virus load attempt.
If you go to their website - be very darn careful and have a good protection system in place on your machine.
 
I just went there with no problems.

https://www.buffaloarms.com/
check your virus protection. It might not be up to date or it might be one of the freebie or cheap ones that don't don't look for this specific strain.
Mine updates multiple times daily and is a commercial product used by large companies with massive networks.
I run it on my machine because I do independent custom cost analysis on large construction projects for a national contractor.
 
I extracted these lines out of the virus scanner logs that were sent in for the reporting account.
They were dated to the exact time I got the warning flags.
I did cut out all of the binary instruction language section.

The incoming stream was trying to send a data stream out to the offender using the Chrome software module.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

[email protected]/Spy.Banker.JC C:\Program Files (x86)\Google\Chrome\Application\chrome.exeê NVhttps://sgtrek.com/jquery/jQuery.viewer.js CAVE-02\Billk

[email protected]/Spy.Banker.JCO C:\Program Files (x86)\Google\Chrome\Application\chrome.exeê NVhttps://sgtrek.com/jquery/jQuery.viewer.js CAVE-02\Billk

[email protected]/Spy.Banker.JC C:\Program Files (x86)\Google\Chrome\Application\chrome.exeê NVhttps://sgtrek.com/jquery/jQuery.viewer.js

This Microsoft report on this issue:

https://www.microsoft.com/en-us/wds...edia-description?Name=TrojanProxy:JS/Banker.M
 
Hawkeye - I strongly suggest you get some software that will scan your system and remove this manure.
Whatever you are using likely did not catch it.

Be careful out there - a lot of bad people want to steal from you.
 

Latest posts

Back
Top