Solved

DO_NOT_TRUST_FIDDLER has hijacked a laptop

Posted on 2014-10-29
4
89 Views
Last Modified: 2015-04-12
I am having a problem with on of m laptops.   the DO_NOT_TRUST_FIDDLER seems to have hijacked a laptop at my company.   I can't find any software that would have installed it, and it's wreaking havoc with secured services, including email.   I can't find any method of removing it.  Does anyone have any experience?
0
Comment
Question by:OrderlyChoas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 58

Accepted Solution

by:
Gary earned 250 total points
ID: 40411806
0
 
LVL 6

Expert Comment

by:Wylie Bayes
ID: 40411836
I would do what the thread Gary posted says.. On top of that if it's only limited to one laptop I would download the latest copy of Kaspersky Rescue disk and burn it to a CD.  Boot the laptop off the cd and let the rescue disk run all the way through.  

If you can connect it to your network, wireless etc, so that it can pull down the latest definitions prior to it running the sweep, would be preferred.

If this is a known issue and has a fix, kaspersky rescue should find it and remove it.

http://support.kaspersky.com/us/4162
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 250 total points
ID: 40412698
lol. DO_NOT_TRUST_FIDDLER is the https interception certificate for this (free, legitimate) software

Fiddler is an intercepting proxy used for debugging https problems. If you are seeing its certificate errors in https traffic, that means the browser in question is being configured to send its traffic via fiddler; to investigate, you should look to see what the browser proxy settings are set to (if its localhost, then fiddler is installed locally; AV won't detect it as it is legitimate software)
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 40412700
@Gary: Lol, I see I gave a similar answer to that one too :)
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
This article will help to fix the below errors for MS Exchange Server 2013 I. Certificate error "name on the security certificate is invalid or does not match the name of the site" II. Out of Office not working III. Make Internal URLs and Externa…
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question