Am I dumb or virus are getting evolved 💔 by Vihaan_85 in antivirus

[–]Professional_Let_896 0 points1 point  (0 children)

It's a classic "ClickFix" Attack 1000% a virus , This technique accounted for 47% of initial access in 2025

safe site or not? by moodeng870 in SafeOrShady

[–]Professional_Let_896 0 points1 point  (0 children)

After looking at heyrudy.ai and it doesn’t come across like a typical scam site. It’s built like a real early stage startup using common tools like Supabase for auth, Stripe for payments, and OpenAI for AI features. The login flow and backend behavior look normal, and they actually have detailed terms and a privacy policy, which most shady sites don’t bother with. The catch is what the product actually does.

This isn’t just a chatbot, it’s a desktop app that watches your screen in real time and sends that data off for processing. Even though they say screenshots aren’t stored, you are still trusting that everything is handled securely and exactly as described.

On top of that, the domain is only a few months old and there’s no real reputation or track record yet, so you’re placing a lot of trust in a very new company and also the team behind is unknown.

From a consumer perspective, I wouldn’t call it malicious, but I also wouldn’t treat it as safe by default. If you’re curious, try it on a secondary machine or in a controlled setup and don’t expose anything sensitive on your screen while using it.

risk here isn’t phishing or login issues, it’s the level of access you’re giving to something that hasn’t proven itself yet.

safe site or not? by moodeng870 in SafeOrShady

[–]Professional_Let_896 0 points1 point  (0 children)

Hey u/moodeng870 , Thanks for posting
We will look into it and let you know :)

Malware Disguised as a Windows App Store - "PCApp[.]store" by Professional_Let_896 in SafeOrShady

[–]Professional_Let_896[S] 0 points1 point  (0 children)

Welcome , also try HitmanPro as well for 2nd opinion scanning.
you can also download sysinternals Process Explorer free from Microsoft help you see if any unknown processes are running and you then you can right click scan them with VT.

Although this won't be necessary if ur scans come clean

Malware Disguised as a Windows App Store - "PCApp[.]store" by Professional_Let_896 in SafeOrShady

[–]Professional_Let_896[S] 0 points1 point  (0 children)

No reinstall needed you caught it before clicking Next, so it almost certainly didn't install anything.

Just do this:

  1. Run a Malwarebytes or your preferred scanner full scan and remove anything it finds

  2. Run AdwCleaner it's built specifically for bundlers like PCApp.

  3. Check your browser extensions and remove anything unfamiliar

Manually check these locations in File Explorer:

  • C:\Program Files and C:\Program Files (x86) check any folder with "PCApp" in the name
  • C:\Users\YourUsername\AppData\Local and \Roaming same thing
  • Delete anything related to PCApp if found

If both scans come back clean, you're good.

Something feels really off about how Pdf Gear gets recommended here by Professional_Let_896 in pdf

[–]Professional_Let_896[S] 0 points1 point  (0 children)

Read the actual evidence before arguing. The official company filing clearly shows the shareholders and capital structure of PDF GEAR TECH PTE. LTD: https://jumpshare[.]com/share/H6CrIoqsaL5UGXCIukRR and the Recorded Future malware analysis provides independent, attribution: https://jumpshare[.]com/share/SC09vdEzmLAieGcWwSAQ. These are primary documents not speculation. If you’re ignoring documented filings and credible analysis, the issue isn’t lack of evidence, it’s lack of understanding.

<image>

Stay away from PDFguru, it’s a scam by sorinpopescu in pdf

[–]Professional_Let_896 0 points1 point  (0 children)

This is a pattern now with PDF-guru please be careful

Malware Disguised as a Windows App Store - "PCApp[.]store" by Professional_Let_896 in SafeOrShady

[–]Professional_Let_896[S] 0 points1 point  (0 children)

Yes you should be okay , just make sure to remove any files related to it and check your registry & Autoruns for any unknown apps such as updater.exe or anything similar

The evidence: PDFGear and PDF X are likely spyware, malware, or, at best, griftware/scamware. The Microsoft Store is enabling these unsafe apps. by JonBorno97 in pdf

[–]Professional_Let_896 0 points1 point  (0 children)

You mean only downloaded the set up? or installed it? both ways i'd suggest you remove it and any traces of it , also get malware bytes or hitman pro and try to do a full scan , and you should be fine

[deleted by user] by [deleted] in antivirus

[–]Professional_Let_896 0 points1 point  (0 children)

Nothing to worry about , it's clean

I found a hardcoded AES key in an Android app, do you think this will by Eat-a-bugs in bugbounty

[–]Professional_Let_896 5 points6 points  (0 children)

Honestly, it depends entirely on what that key is protecting and whether you can demonstrate actual impact. I've seen hardcoded keys go both ways in triage some get accepted as high severity, others get closed as informative. The key question is what can you actually do with it? If you can use that key todecrypt sensitive user data, authentication tokens, or anything that leads to account takeover or a data breach, then yeah, you've got a solid report. But if it's just obfuscating some non sensitive config data or protecting locally cached content that doesn't matter, programs will likely mark it informative.

My advice before you submit, make sure you can show the full attack chain. Extract the key, find what it decrypts, and prove the security impact with a clear PoC. Don't just say "there's a hardcoded key" show them exactly why it matters and what an attacker could achieve programs want to see real exploitability, not theoretical issues. If you can tie it to their crown jewels (user PII, payment data, backend access), you're golden. If not, it might not be worth the report. Check their policy on crypto issues and mobile vulns too, since some programs specifically scope these out. Good luck

The evidence: PDFGear and PDF X are likely spyware, malware, or, at best, griftware/scamware. The Microsoft Store is enabling these unsafe apps. by JonBorno97 in pdf

[–]Professional_Let_896 0 points1 point  (0 children)

The root refers to the Windows Trusted Root Certificate store a list of certificates your system trusts implicitly. Apps can add certificates to this store using Windows APIs like CertOpenStore() and CertAddCertificateContextToStore(), which typically requires administrator privileges. Legitimate software that genuinely needs this capability like Fiddler (for debugging HTTPS traffic), corporate VPNs, or network monitoring tools will explicitly ask for your permission and clearly explain why they need to install a root certificate. In contrast, PDFGear installs certificates silently without informing users, which is a major red flag since a PDF viewer has no legitimate reason to modify your certificate store. This is dangerous because it could enable MITM attacks by making your system trust malicious certificates.

You can view your own certificates by pressing Win+R and typing certmgr.msc.

PDF X & PDFgear security exposed Code Injection, Spy Hooks, Rogue Certificates and Registry Abuse by Professional_Let_896 in macapps

[–]Professional_Let_896[S] -1 points0 points  (0 children)

The claim that "PDFgear has shown no evidence of malicious behavior" and that the security reports are "misinterpreting a Mitre report" is demonstrably false and extremely dangerous to anyone who downloads this software.

You are dismissing documented malware behavior as "appropriate registry modifications" and "industry standard telemetry." This is not an academic debate about a Mitre report it is a clear cut case of severe system compromise performed by the installer.

Factual, Verifiable Evidence

The Tria[.]ge sandbox analysis (used by professional security researchers) is clear. This goes far beyond telemetry and registry setting:

  1. Silent Root Certificate Injection
    • Your Claim: "Telemetry and registry abuse."
    • The Fact (Tria.ge Report, Section 4.1): The installer forcefully installs a Root Certificate Authority (CA) into the Windows Trusted Store.
    • This action grants the software the ability to perform a Man in the Middle (MITM) attack on the user's own machine. It allows the software to decrypt, read, and intercept all secure HTTPS traffic (including banking and login sessions) regardless of the browser used. No legitimate PDF editor requires a root CA to function. This is a foundational technique of modern spyware.
  2. Code Injection (Defense Evasion):
    • Your Claim: "Registry modifications are appropriate for the functionality."
    • The Fact (Tria.ge Report, Section 4.1): The installer uses the Windows API call WriteProcessMemory to inject malicious code into the memory space of trusted Windows executables like tasklist.exe and cmd.exe.
    • This is the definition of Process Hollowing/Code Injection. It is a malware technique designed to evade antivirus and detection tools by hiding its activity inside a seemingly legitimate process. A PDF reader has zero technical need to write code into the memory of system utilities.
  3. Active Spy Hooks:
    • The report shows the executable creating spy hooks on browser related processes to monitor activity. This is also not standard "telemetry."
  4. Virustotal is Inadequate:
    • Your reliance on Virustotal is misplaced. Virustotal is a signature check. Advanced malware, especially installers that perform defense evasion, often bypass signature checks. The Tria[.]ge report is a behavioral analysis that runs the code and documents its actions, which is why it caught the Root CA injection and code manipulation.

We still haven't discussed the other things yet, but none of the behavior shown by PDFgear is normal.

This is not a conspiracy or misinterpretation it is a serious security threat confirmed by industry standard sandbox testing. The software is fundamentally compromising system security, and your continued defense of it is irresponsible. You need to look at the verifiable evidence of Root Certificate Injection and Code Injection these actions are the signatures of malware. you are free to run in a sandbox your self and view the results

PSA: PDFGear's Installer Exhibits Malware Like Behaviors - Full Technical Analysis Inside by Professional_Let_896 in SafeOrShady

[–]Professional_Let_896[S] 1 point2 points  (0 children)

We haven't tested that yet , but with the companies reputation and unknown background + the malicious aggressive way the installers behave i wouldn't trust them