MCAntiMalware
MCAntiMalware copied to clipboard
[False Positive]
Resource URL full plugin Anti-Malware Version Version: <MCantiMalware13.9>
Additional context I have tested these plug-ins on the local Windows, and they can be started. When I put them on the Centos7.9 server, they were all infected (all these plug-ins were transferred from this machine) and then the core was replaced. Java has also been replaced, and the system has been reinstalled, and it is still the same. I really don't know how to solve this infection problem. latest.log
- Not a false-positive
- You must redownload EVERY plugin off spigot again. If you keep any of the jars then the malware will just re-spread. Once every plugin is re-downloaded make sure to scan BEFORE starting the server. If anything is still infected delete the jar and report the resource
- Not a false-positive
- You must redownload EVERY plugin off spigot again. If you keep any of the jars then the malware will just re-spread. Once every plugin is re-downloaded make sure to scan BEFORE starting the server. If anything is still infected delete the jar and report the resource
I have re-downloaded from the official website, and there is no problem. I even reinstalled the system, installed java, started the server, and re-downloaded all the plug-ins. The startup is still the same. I use centos official download for centos7.
- Not a false-positive
- You must redownload EVERY plugin off spigot again. If you keep any of the jars then the malware will just re-spread. Once every plugin is re-downloaded make sure to scan BEFORE starting the server. If anything is still infected delete the jar and report the resource
I know what you said, but I can't help it, it's been 6 days for me.
There's definitely malware if you're getting logs like that and if you're getting logs like that, then you're still installing something that's malicious.
- Not a false-positive
- You must redownload EVERY plugin off spigot again. If you keep any of the jars then the malware will just re-spread. Once every plugin is re-downloaded make sure to scan BEFORE starting the server. If anything is still infected delete the jar and report the resource
I even downloaded from Centos to my windows computer again, although the startup also reported an error, but I replaced the new QuickShop and it started again.
Did you replace any of the other plugins? If not, then ofc it's still spread. If you leave even ONE infected plugin, then it'll keep spreading
There's definitely malware if you're getting logs like that and if you're getting logs like that, then you're still installing something that's malicious.
Did you replace any of the other plugins? If not, then ofc it's still spread. If you leave even ONE infected plugin, then it'll keep spreading
Did you replace any of the other plugins? If not, then ofc it's still spread. If you leave even ONE infected plugin, then it'll keep spreading
This is definitely not an infected plugin, because I downloaded them directly from the official website of these plugins and replaced them directly (delete and replace them after downloading all). I've tried it more than 70 times and finally I'm running out of patience today and my team is having a headache with this amazing problem.
Did you make sure to scan them before putting them on the server? If not, then it's obvious at least one is infected. Like I said, scan BEFORE replacing them
您是否确保在将它们放在服务器上_之前对其进行扫描?_如果没有,那么很明显至少有一个被感染了。 就像我说的,在更换它们之前扫描
Did you make sure to scan them before putting them on the server? If not, then it's obvious at least one is infected. Like I said, scan BEFORE replacing them
I have scanned these, and they are all normal and no problem, 0 infection.
Well then, it could be the server jar if you're 100% sure it's not the plugins
Well then, it could be the server jar if you're 100% sure it's not the plugins
Well then, it could be the server jar if you're 100% sure it's not the plugins
I also considered this, and replaced Server.jar, all at one time. I re-installed a terminal on my computer, and it was no problem, including Server.jar. If you throw it up, it will report infection directly (including Java also replaced together).
Well then, it could be the server jar if you're 100% sure it's not the plugins
I have been very puzzled, and I suspect that Java17 is officially infected with the infection again. I changed the Java of native, zulan, and Oracle.
You're most likely installing something that's infected. You'll most likely want to try replacing EVERYTHING all at once, if you haven't already. If it still infects what's on the server then I'm not sure.
You're most likely installing something that's infected. You'll most likely want to try replacing EVERYTHING all at once, if you haven't already. If it still infects what's on the server then I'm not sure.
I'm already very suspicious. The virus is with me. I pretend that everything is a virus (whispering or laughing). I will try again tomorrow and the day after tomorrow. I have not slept for 49 hours to solve this problem, and it has not been solved yet.
Can you maybe provide a list of links where you download each plugin so we can check ourself?
Can you maybe provide a list of links where you download each plugin so we can check ourself?
Tomorrow and the day after tomorrow, I'm really tired.
Yeah no problem. For me, asking something online always implies the other side answers when he wants to and has time, no need to stress.
Some seem to be closed and can't be found. I sent the following and you need to change the .jar 新建文本文档 (8).txt WTF:WTF.txt Hub:Hub.txt
Not too sure going off the links as is. The WTF & Hub jar are known malware. Assuming this issue is still happening, something's fucky.