Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

DO_NOT_TRUST_FIDDLER has hijacked a laptop

Posted on 2014-10-29
4
Medium Priority
?
107 Views
Last Modified: 2015-04-12
I am having a problem with on of m laptops.   the DO_NOT_TRUST_FIDDLER seems to have hijacked a laptop at my company.   I can't find any software that would have installed it, and it's wreaking havoc with secured services, including email.   I can't find any method of removing it.  Does anyone have any experience?
0
Comment
Question by:OrderlyChoas
  • 2
4 Comments
 
LVL 58

Accepted Solution

by:
Gary earned 1000 total points
ID: 40411806
0
 
LVL 6

Expert Comment

by:Wylie Bayes
ID: 40411836
I would do what the thread Gary posted says.. On top of that if it's only limited to one laptop I would download the latest copy of Kaspersky Rescue disk and burn it to a CD.  Boot the laptop off the cd and let the rescue disk run all the way through.  

If you can connect it to your network, wireless etc, so that it can pull down the latest definitions prior to it running the sweep, would be preferred.

If this is a known issue and has a fix, kaspersky rescue should find it and remove it.

http://support.kaspersky.com/us/4162
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 1000 total points
ID: 40412698
lol. DO_NOT_TRUST_FIDDLER is the https interception certificate for this (free, legitimate) software

Fiddler is an intercepting proxy used for debugging https problems. If you are seeing its certificate errors in https traffic, that means the browser in question is being configured to send its traffic via fiddler; to investigate, you should look to see what the browser proxy settings are set to (if its localhost, then fiddler is installed locally; AV won't detect it as it is legitimate software)
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 40412700
@Gary: Lol, I see I gave a similar answer to that one too :)
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to effectively resolve the number one email related issue received by helpdesks.
There are literally thousands of Exchange recovery applications out there. So how do you end up picking one that’s ideal for your business & purpose? By carefully scouting the product’s features, the benefits it offers you, & reading ample reviews f…
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question