Jump to content

Important Security Notice


BigBizkit

Recommended Posts

In response to post #76810703. #77394508, #77676363, #77698568, #77825388, #78386518, #79101688, #79101903, #79103693 are all replies on the same post.


Regnier1919 wrote: My Avast told me it had safely aborted a connection to Skyrimgems.com because it was infected with HTML:script-inf(susp) Could someone clarify have I downloaded an infected file from Nexus or is this something else?
bvanharjr wrote: Get rid of Avast altogether (it's bad nowadays), and use something better - or, if you are on Windows 10 (and version 1903 or HIGHER), use the built-in protection.

This comes from 5+ years of personally USING THEIR SOFTWARE. Their code is so filled with bugs that it's a miracle that my PC hasn't required me to reinstall Windows from scratch yet.

(not listing every issue I have with Avast - the final straw I had with 'em was with their exclusion system not working AT ALL - quarantining files THAT I PUT ON THAT LIST as "malicious & dangerous" - EVEN THOUGH THOSE FILES WERE 100% CLEAN.)
Dazner wrote: Avast is actually pretty good. I use it and mod skyrim extensively. Not many complaints there.
marijn211 wrote: I used Avast for around 2 years and found myself reinstalling Windows 2 times because of false positives on system files which after that had been removed, now I stick to Malwarebytes, it costs money for more protection than just weekly scans but if you donacdum on the internet that should be enough
trishaxuk wrote: Totally agree with this. I too was an avid user of Avast 4+ years (and previous to that, used AVG for 3+ years at home). In both cases; I eventually stopped using them because of many false positives which could not be rectified through a controllable whitelisting system, and their reporting mechanism and remedies for these problems was ineffectual.

Thankfully; Microsoft's previously poor AV products have much improved, so I use that for basic cover now. Malwarebytes is a solid product for all the stuff which gets through the cracks. Even the free/trial mode is a life saver. Sometimes I use Sophos too (as I get home license coverage from work). It's always been very solid (due to good support - not just the client software), but it can be a bit over hard on the machine performance for gamer type scenarios. It's best left on your 'work' machine..
quadraphone wrote: Systems Engineer here:

Don't make suggestions if you don't know what you are talking about. Windows Defender isn't a bad anti-virus product in real-world scores, it's better than nothing, but it isn't better than Avast. Avast consistently scores better in real-world tests and has less performance impact.

See for yourself:

https://www.av-test.org/en/antivirus/home-windows/

https://www.av-comparatives.org/consumer/
quadraphone wrote: Please limit recommendations to something you have expertise in. If you aren't a doctor or a nurse practitioner, don't hand out medical advice.
If you aren't an IT professional, don't hand out anti-virus recommendations.
quadraphone wrote: Malwarebytes is a great tool for removing malware infections, but as an anti-virus platform, it is below the middle of the pack in real-world tests. In short, the performance of it's resident protection modules are unacceptable.


This sounds like a malicious script stored in your browser cache.

For future use, you can use a free tool called CCleaner from Piriform to clean the caches of multiple browsers at the same time, and the Windows system temp files:

https://www.ccleaner.com/ccleaner/builds
Link to comment
Share on other sites

  • Replies 287
  • Created
  • Last Reply

Top Posters In This Topic

In response to post #76810703. #77394508, #77676363, #77698568, #77825388, #78386518, #79101688, #79101903, #79103693, #79103973 are all replies on the same post.


Regnier1919 wrote: My Avast told me it had safely aborted a connection to Skyrimgems.com because it was infected with HTML:script-inf(susp) Could someone clarify have I downloaded an infected file from Nexus or is this something else?
bvanharjr wrote: Get rid of Avast altogether (it's bad nowadays), and use something better - or, if you are on Windows 10 (and version 1903 or HIGHER), use the built-in protection.

This comes from 5+ years of personally USING THEIR SOFTWARE. Their code is so filled with bugs that it's a miracle that my PC hasn't required me to reinstall Windows from scratch yet.

(not listing every issue I have with Avast - the final straw I had with 'em was with their exclusion system not working AT ALL - quarantining files THAT I PUT ON THAT LIST as "malicious & dangerous" - EVEN THOUGH THOSE FILES WERE 100% CLEAN.)
Dazner wrote: Avast is actually pretty good. I use it and mod skyrim extensively. Not many complaints there.
marijn211 wrote: I used Avast for around 2 years and found myself reinstalling Windows 2 times because of false positives on system files which after that had been removed, now I stick to Malwarebytes, it costs money for more protection than just weekly scans but if you donacdum on the internet that should be enough
trishaxuk wrote: Totally agree with this. I too was an avid user of Avast 4+ years (and previous to that, used AVG for 3+ years at home). In both cases; I eventually stopped using them because of many false positives which could not be rectified through a controllable whitelisting system, and their reporting mechanism and remedies for these problems was ineffectual.

Thankfully; Microsoft's previously poor AV products have much improved, so I use that for basic cover now. Malwarebytes is a solid product for all the stuff which gets through the cracks. Even the free/trial mode is a life saver. Sometimes I use Sophos too (as I get home license coverage from work). It's always been very solid (due to good support - not just the client software), but it can be a bit over hard on the machine performance for gamer type scenarios. It's best left on your 'work' machine..
quadraphone wrote: Systems Engineer here:

Don't make suggestions if you don't know what you are talking about. Windows Defender isn't a bad anti-virus product in real-world scores, it's better than nothing, but it isn't better than Avast. Avast consistently scores better in real-world tests and has less performance impact.

See for yourself:

https://www.av-test.org/en/antivirus/home-windows/

https://www.av-comparatives.org/consumer/
quadraphone wrote: Please limit recommendations to something you have expertise in. If you aren't a doctor or a nurse practitioner, don't hand out medical advice.
If you aren't an IT professional, don't hand out anti-virus recommendations.
quadraphone wrote: Malwarebytes is a great tool for removing malware infections, but as an anti-virus platform, it is below the middle of the pack in real-world tests. In short, the performance of it's resident protection modules are unacceptable.
quadraphone wrote: This sounds like a malicious script stored in your browser cache.

For future use, you can use a free tool called CCleaner from Piriform to clean the caches of multiple browsers at the same time, and the Windows system temp files:

https://www.ccleaner.com/ccleaner/builds


Following the Vice article, Avast stopped the harvesting and selling of browsing history, bought stock back in the company Jumpshot that was responsible, and closed the company down.

https://www.vice.com/en_us/article/wxejbb/avast-antivirus-is-shutting-down-jumpshot-data-collection-arm-effective-immediately
Link to comment
Share on other sites

In response to post #78606028.


pufthemajicdragon wrote: IT engineer here. You know what the absolute worst thing is for password security? Complex passwords. Counter-intuitive, I know, right? But longer and more complex passwords lead to people reusing more passwords and saving them in Word or Excel documents on their desktops. That's why Microsoft has minimal complexity requirements but encourages (and in some cases requires) MFA. And the cool thing about MFA? A 6 character simple password is no less secure (and arguably more secure) than a 12 character complex password as long as you use MFA.

And what's funny is seeing supposed security people talk about brute forcing like it's still how accounts get cracked. "Gotta make the passwords harder to guess!" as if anybody's trying to guess it. Nah, legit hackers don't brute force anymore. If they want your password, they send you phishing e-mails, malware with keyloggers, malware that takes advantage of password manager vulnerabilities (and you thought that would keep you safe), or the real good ones take advantage of website vulnerabilities to steal hashes (oh, look, what happened to Nexus). I do still see brute force attacks, but only in business and they're pretty lazy attacks against outdated protocols where the attacker figures "if they're still using PPTP then they're probably using stupid simple passwords".

But what this really boils down to is Nexus screwed up by having bad security and instead of fixing their $%^& they make their users jump through hoops that meet (outdated) "security best practices" but don't actually improve security.


I use really complicated passwords, long complicated passwords. Never two times either. Write them down? You bet I write them down, in pen and paper offline.

MFA? started looking into that. But umm... where do I get the other piece from? My home phone? That is about all I have to get something else on.
Link to comment
Share on other sites

  • 2 weeks later...
In response to post #78606028. #79124798 is also a reply to the same post.


pufthemajicdragon wrote: IT engineer here. You know what the absolute worst thing is for password security? Complex passwords. Counter-intuitive, I know, right? But longer and more complex passwords lead to people reusing more passwords and saving them in Word or Excel documents on their desktops. That's why Microsoft has minimal complexity requirements but encourages (and in some cases requires) MFA. And the cool thing about MFA? A 6 character simple password is no less secure (and arguably more secure) than a 12 character complex password as long as you use MFA.

And what's funny is seeing supposed security people talk about brute forcing like it's still how accounts get cracked. "Gotta make the passwords harder to guess!" as if anybody's trying to guess it. Nah, legit hackers don't brute force anymore. If they want your password, they send you phishing e-mails, malware with keyloggers, malware that takes advantage of password manager vulnerabilities (and you thought that would keep you safe), or the real good ones take advantage of website vulnerabilities to steal hashes (oh, look, what happened to Nexus). I do still see brute force attacks, but only in business and they're pretty lazy attacks against outdated protocols where the attacker figures "if they're still using PPTP then they're probably using stupid simple passwords".

But what this really boils down to is Nexus screwed up by having bad security and instead of fixing their $%^& they make their users jump through hoops that meet (outdated) "security best practices" but don't actually improve security.
patchling wrote: I use really complicated passwords, long complicated passwords. Never two times either. Write them down? You bet I write them down, in pen and paper offline.

MFA? started looking into that. But umm... where do I get the other piece from? My home phone? That is about all I have to get something else on.


Umh... like any other common application nowadays? Either use MFA via phone or E-mail? It's an extra layer of security after all, one which can very very hardly be cracked in any way outside of mistakes from the user-side.

Hardly, everything is possible... but that's stuff which should be common practice by now and luckily is for many companies handling sensible data.
Link to comment
Share on other sites

Is this related to that time many accounts were exposed in a data breech and passwords stolen while the site Admin, or whoever, failed to inform Nexus users of the breech until much later? Perhaps I'm wrong about action being taken to inform of the breech, but I cannot remember ever being informed unless it had been posted via Nexus Site news back then. Fortunately for me, the password I used back then was only used on the Nexus. I received an email from a hacker trying to con me out of bit coins by attempt to scare me by flashing an old Nexus password. I was able to trace the breech back to Nexus mods via a (Have I been had check) which is where I first found out about the Nexus breech.

 

Regardless, I barely have any trust in this site anymore . Of course I still use Nexus, but I find it funny the site actually wants us to buy premium for faster downloads when I would not even trust this site with a phone number. LOL

Link to comment
Share on other sites

  • 1 month later...
In response to post #78606028. #79124798, #79577573 are all replies on the same post.


pufthemajicdragon wrote: IT engineer here. You know what the absolute worst thing is for password security? Complex passwords. Counter-intuitive, I know, right? But longer and more complex passwords lead to people reusing more passwords and saving them in Word or Excel documents on their desktops. That's why Microsoft has minimal complexity requirements but encourages (and in some cases requires) MFA. And the cool thing about MFA? A 6 character simple password is no less secure (and arguably more secure) than a 12 character complex password as long as you use MFA.

And what's funny is seeing supposed security people talk about brute forcing like it's still how accounts get cracked. "Gotta make the passwords harder to guess!" as if anybody's trying to guess it. Nah, legit hackers don't brute force anymore. If they want your password, they send you phishing e-mails, malware with keyloggers, malware that takes advantage of password manager vulnerabilities (and you thought that would keep you safe), or the real good ones take advantage of website vulnerabilities to steal hashes (oh, look, what happened to Nexus). I do still see brute force attacks, but only in business and they're pretty lazy attacks against outdated protocols where the attacker figures "if they're still using PPTP then they're probably using stupid simple passwords".

But what this really boils down to is Nexus screwed up by having bad security and instead of fixing their $%^& they make their users jump through hoops that meet (outdated) "security best practices" but don't actually improve security.
patchling wrote: I use really complicated passwords, long complicated passwords. Never two times either. Write them down? You bet I write them down, in pen and paper offline.

MFA? started looking into that. But umm... where do I get the other piece from? My home phone? That is about all I have to get something else on.
Kulze wrote: Umh... like any other common application nowadays? Either use MFA via phone or E-mail? It's an extra layer of security after all, one which can very very hardly be cracked in any way outside of mistakes from the user-side.

Hardly, everything is possible... but that's stuff which should be common practice by now and luckily is for many companies handling sensible data.


I am also an IT major, with a cyber security concentration. I gotta say, a true hacker isn't even going to go for the small fry's "12 character long" password. They're just gonna go directly hack the admins, which would give them access to all of the users passwords, even the 12 character long ones. The sad matter is that many of the vulnerabilities that are associated with these kind of breaches doesn't have anything to do with the nexus. It's Windows. Windows is extremely exploitable, perhaps one of the most exploitable software in history (even if its just my opinion).
In fact you could go in your windows computer right now, and delete an important file you need in order to operate your computer, and completely destroy your software. If you can do this, a hacker can do the same thing.
No, the real thing that needs to be protected is not just the data, but the actual database. In where if software is compromised, it can easily affect the company. From what I'm seeing, nexus mod's website is still slightly old fashioned compared to what could be improved, this is just from a glance.

In terms of constant mod manager updates, you gotta keep in mind that the actual files for the mods are also old fashioned, and if it isn't, trust me, it will be, I'd be shocked if it wasn't) , and so the way they're handled can be old fashioned as well.
Not every user on the nexus is computer savvy in wanting to upgrade to vortex, many are nervous they'll lose their mods, even the slightest change can destroy their whole game. It's that finicky, and so it's very stressful for them to not only create a hard to remember password that usually doesn't stop hacking attempts, but upgrade to completely new managers while installing, uninstalling mods. Very stressful!
This discourages new users, and makes old users wanna move on.

Also another vulnerability, there are many spam users that serve as bots. With Hackers becoming more advanced in programming, and not to mention desperate, they're finding new ways to get their software to get past the CAPTCHA, I think they're Youtube videos that show programs doing this. This combined with a super fluency of bots can further harm the confidentiality of the network.
The bots are the huge portion of why the nexus is being compromised so many different ways. As time goes on, these new gen bots capable of passing CAPTCHA (so like over 1,000 bots able to do this) this is gunna butcher the entire site and be very difficult to keep up with, as I'm sure admins do all day is remove fake user accounts for spam.
I can go on about what different improvements can be done.

Another fun note for those who wanna keep reading, it talks about the utilization of demilitarized zones

What Nexus and many other networks use in order to prevent unauthorized access from entering the system, is what's called a DMZ. (Demilitarized Zone).

This allows good traffic, such as coworkers and staff, while preventing malicious entry from gaining access such as black hats or script kiddies ;).DMZs consist of a router, firewall, etc. The stronger the DMZ is, the less likely you'll be gaining access. On the user side, you're able to get in no problem, but the trick is to make it so that despite your privileges you cannot access restricted areas. But devs can. If your DMZ is too strong, then nobody will be able to gain entry, this includes staff that really need to, its like a house with no windows and doors, keeps thieves out, but also keeps the home owner out too. :ohdear:
If you think about it, an overpowered password system begins to take the role of an overpowered dmz, in where users can't get in as easily, and have a hard time gaining access to their house(the network; their user profile) A bank their serves like this for good reason, however they too struggle when their customers can't gain access to their account when they need to. Its a give and take, the more money a criminal is likely to steal, the greater you need to make your dmz. The less likely a robber will get away with much, the more laxed a dmz can be to allow a continuous flow of the company, and a smooth availability of the network.


Edited by lefttounge
Link to comment
Share on other sites

  • 3 weeks later...

Yep, just gonna join here, of course this account is a 10minute mail account. Since the theft of accounts and passwords here on nexus I had to fight over all my secondary instagram, facebook and steam accounts. Luckily they were secondary for a reason and I had nothing heavy to worry about them more than some random Corean using them to contact with random girls around the world. Well, the fight is over and I took control of all my accounts again. And I wouldn't mind forgiving nexus. In the internet most of people is very unforgiving, but my thoughts were: 'Well, I've been using their site for free and enjoying it a lot, sure they have earned me understanding that s#*! happens and keep going'.

 

But now the attitude is forcing passwords security and what not, which wasn't the problem on the first but a security issue on their side... Surely I'm not gonna give them a good password so that they can lose it again... So now I have totally forgotten which my original account pasword was and I'll be using a new fire and forget account whenever I need one to download heavy mods, make a question in a mod page or see adult content... Which I think is not what nexus teams wants us users to do... but in the new envyroment is what I am going to do...

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

×
×
  • Create New...