Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Luigi Thirty
Apr 30, 2006

Emergency confection port.

Cojawfee posted:

I don't think people really go for infecting files anymore. It's mostly just install something, and try to get some money.

If you're really clever, you'll encrypt their files and try to get money like the Russian extortion virus.

Adbot
ADBOT LOVES YOU

brc64
Mar 21, 2008

I wear my sunglasses at night.

Luigi Thirty posted:

If you're really clever, you'll encrypt their files and try to get money like the Russian extortion virus.
I can think of all kinds of ingenious things for viruses to do. It's a good thing I'm not a programmer. :ninja:

hairy
Jun 21, 2006
pyro
I had a friend bring me her friends laptop to scan. It had Antivirus2009, Vundo and a few other trojans. After scanning with bitdefender, ccleaner, Malwarebytes, AVG, MS Live, MS Defender, XCleaner, F-Secure BlackLight, Sophos Anti-Rootkit & RootkitRevealer it still exhibited the following behavior. The DNS file was clean. When I tried to install several other AV products it prevented them from being installed/run by generating a Windows Crash every time. I did get some stuff to install by renaming the exe.

If I opened MS Explorer 6 or 7 or 8 beta or Firefox and searched for variations of rootkit remover, rootkit cleaner etc. the browser would instantly close/crash. Sometimes I would get as far as the download link for the antivirus product and the instant it started downloading it would close/crash. If I searched/downloaded anything else the browsers were as stable as a rock.

Unfortunately she took the laptop back to her friend and then their relationship broke up so I won't have a chance to complete.

I bet Superantispyware would have finished the job.

hairy fucked around with this message at 23:02 on Jan 7, 2009

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.
^^^^^^

I bet it would have too

do it
Jan 3, 2006

don't tell me words don't matter!

brc64 posted:

I can think of all kinds of ingenious things for viruses to do. It's a good thing I'm not a programmer. :ninja:
Doesn't even have to be that clever. I've had about six clients who paid $50 for Rapid Antivirus.

Loretta Trampface
Sep 12, 2006

by T. Finninho
One of my friends is having virus problems. He said he deleted one earlier and that since then he can't log into windows except in safe mode. What happens is that it does a little bit of something then loops back to the black screen where you choose if you want to start in safe mode or not. Safe mode seems to work fine, but he has some virus on there that makes any search engine results link to virus sites. I don't know if he did get rid of the previous virus or really what happened there at all.

I gave him the ultimate boot cd and he's running a scan on his hard drive right now, but have any of you seen things that will cause this? How did you fix this problem?

Atomic Mitten
Jul 3, 2004
Glove of doom
It's probably TDSServ, we could do with a megathread for it in Haus to be honest it's becoming that much of a problem.

bazaar apparatus
Dec 1, 2006

Whenever my body starts to feel sick, I just stop being sick and be awesome instead.

do it posted:

Doesn't even have to be that clever. I've had about six clients who paid $50 for Rapid Antivirus.

Heh my coworker had one of those yesterday. The thing installed like 12 different fake spyware/antivirus scanners and they wondered how they could possibly be getting so many popups when they have so many programs trying to block them

Not to mention they uninstalled the McAfee suite we install on all of our users' computers because "it told them to"

and yeah I know McAfee sucks

A little backstory
Apr 24, 2004

Let's call her Elizabeth, because that's her name.
.

A little backstory fucked around with this message at 09:10 on Nov 1, 2013

Stanley Pain
Jun 16, 2001

by Fluffdaddy

A little backstory posted:

Hay here is question:

I hate install Windows and never have had it go smooth on a first try, so, can I make a new Windows install on cleaned HDD, make Image or Ghost and keep to hav eclean install without "real" installation?


Hay, here is answer, wrong thread bub.

GREAT BOOK OF DICK
Aug 14, 2008

by Ozma
I've started scanning a machine I received from a client and so far it's found a total of 275 adware/spyware/malware infections. That's not even with using SuperAntiSpyware or Malwarebytes (I haven't gotten that far.) The original problem was a couple days ago the PC was able to access the Internet just fine but now it can't. I looked at it and it was unable to even obtain a DHCP address from the router. I ruled out the possibility of a bad cable or a bad onboard NIC so I could only presume some kind of infection had ruined the network connection. The worst part so far has been the fact that this PC only has XP SP1 installed. :ughh:

Didn't see any hidden TDSServ entries in the Device Manager. Would that be obvious if I showed hidden devices and searched through the list for "TDSServ"? I've never encountered a PC with that yet.

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius
When you show hidden devices, it will always be under "Non Plug and Play Devices" the one with the gray diamond for the symbol. You'd think there would be some kind of security hotfix to block this thing since it breaks all your antiwares.

How have you ruled out a bad onboard NIC? It IS SP1, there might be some exploit in SP1 that could block the internet. You might want to try installing SP3 downloaded from another computer. Or try Winsock Fix. And reinstalling the driver.

Raluek
Nov 3, 2006

WUT.

Cojawfee posted:

When you show hidden devices, it will always be under "Non Plug and Play Devices" the one with the gray diamond for the symbol. You'd think there would be some kind of security hotfix to block this thing since it breaks all your antiwares.

How have you ruled out a bad onboard NIC? It IS SP1, there might be some exploit in SP1 that could block the internet. You might want to try installing SP3 downloaded from another computer. Or try Winsock Fix. And reinstalling the driver.

And uninstall the nVidia firewall thing, if it has it. I had this issue recently, and that was the culprit. Never liked the thing anyways.

Jaketeck
Jul 6, 2004

<3 Robots

GREAT BOOK OF DICK posted:

I looked at it and it was unable to even obtain a DHCP address from the router. I ruled out the possibility of a bad cable or a bad onboard NIC so I could only presume some kind of infection had ruined the network connection. The worst part so far has been the fact that this PC only has XP SP1 installed. :ughh:

Didn't see any hidden TDSServ entries in the Device Manager. Would that be obvious if I showed hidden devices and searched through the list for "TDSServ"? I've never encountered a PC with that yet.

1. Ensure the DHCP client service is running.
2. Ensure the NIC is set for DHCP and not a Static IP.
3. If it still does not work download and run SYMNRT (Norton Removal Tool). If its an OEM machine traces of Norton Internet security can cause networking problems.
4. Download and run LSP Fix (AKA Winsock Fix).

I have yet to see a TDSS infection that blocks networking.

Otacon
Aug 13, 2002


As of yesterday, our shop found a new virus/rootkit disguising itself as a Microsoft Windows driver, signed by Microsoft themselves. Be careful out there!

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

Otacon posted:

As of yesterday, our shop found a new virus/rootkit disguising itself as a Microsoft Windows driver, signed by Microsoft themselves. Be careful out there!

Do you care to share any info, or are you going to hold out?

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

abominable fricke posted:

Do you care to share any info, or are you going to hold out?

Seconded, since signed code infections are rare to begin with, let alone code signed by Microsoft. Needs a lot more details, up to and possibly including VirusTotal stats.

GREAT BOOK OF DICK
Aug 14, 2008

by Ozma
Looks like the problem is fixed. It was a software issue as I suspected (probably a malware/spyware of some kind.) The most prominent infection was something called win32.keenwall, or at least sounded like that. I've already removed the antivirus logs so I'm not sure. After cleaning the system, I was able to boot into safe mode with networking and was grabbing an IP address from the router's DHCP and could browse websites just fine. It was working fine in normal Windows mode as well. Did some more cleaning with SAS and Malwarebytes. What's interesting is I ran SAS first and it didn't find anything. When I ran Malwarebytes after SAS, it found remnants of an adware program that SAS didn't find. Both programs had the latest definitions. Regardless, the system is working fine on my end now and I've removed Norton Internet Security, updated to SP3, installed AntiVir, etc.

Thanks for the tip on Norton Internet Security, I'll have to keep that in mind the next time I come across it.

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius

GREAT BOOK OF DICK posted:

Thanks for the tip on Norton Internet Security, I'll have to keep that in mind the next time I come across it.

The best idea is whenever you have a problem, look for Norton. Or just run the removal tool anyway. You won't believe how hosed up Norton leaves your computer after uninstalling. I've seen Norton totally block iexplore.exe, it never lets you access network shares, and sometimes blocks the internet entirely. Not to mention that the whole thing slows your computer to a stand still. I don't know how Symantec can still be allowed to sell that shitstorm.

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

Cojawfee posted:

The best idea is whenever you have a problem, look for Norton. Or just run the removal tool anyway. You won't believe how hosed up Norton leaves your computer after uninstalling. I've seen Norton totally block iexplore.exe, it never lets you access network shares, and sometimes blocks the internet entirely. Not to mention that the whole thing slows your computer to a stand still. I don't know how Symantec can still be allowed to sell that shitstorm.

But the geeks at Best Buy told me it's the best antivirus software there is...:laugh:

brc64
Mar 21, 2008

I wear my sunglasses at night.

abominable fricke posted:

But the geeks at Best Buy told me it's the best antivirus software there is...:laugh:
Best? You mean there are others?

Otacon
Aug 13, 2002


abominable fricke posted:

Do you care to share any info, or are you going to hold out?

Midelne posted:

Seconded, since signed code infections are rare to begin with, let alone code signed by Microsoft. Needs a lot more details, up to and possibly including VirusTotal stats.

My boss found it, and briefly told me about it. I'm not going into work until tomorrow, but when I do I'll see if he can remember anything else. He basically said that he had done a few scans, was still having problems, and ran down the list of drivers one more time. He ran into one he didn't recognize, and upon checking the details he noticed it was signed, spoofing Microsoft - which is why he didn't find it in the first place. The only scanner that picked it up was....

Panda.

SASW missed it, MBAM missed it, Avast! missed it, Trend Micro missed it - the only thing that picked it up was Panda. Go figure.

Otacon fucked around with this message at 21:02 on Jan 9, 2009

BillWh0re
Aug 6, 2001


There are no known attacks to spoof existing executable digital signatures so either the signature doesn't work or this is a false positive from Panda. Since no one else detects it I would assume the latter.

Birth Ritual
Jul 22, 2004

After reading the first page of this thread I sought out ComboFix. When I start it I get a message that I have Norton Antivirus 2006 running and that I should stop it - but I've never had Norton-anything installed on my computer. The second time around I just continued anyway, ComboFix started doing it's thing, deleted some files and then stopped when it said something like "c:\Windows\system32 is not recognized as a executable, batch..." (I forget the rest). I restarted my computer and things seem fine.

The reason I was looking into this is that the Windows Automatic Update icon was telling me that Auto Updates was shut off and the Security Center was saying it was off, but in the Control Panel>Automatic Updates it was definitely set to 'on'. After the latest restart the notification is gone and Security Center is now saying it is on.

I'm going to guess that ComboFix got something, but I don't know...

bazaar apparatus
Dec 1, 2006

Whenever my body starts to feel sick, I just stop being sick and be awesome instead.

heat vision posted:

I'm going to guess that ComboFix got something, but I don't know...

It should have saved a log file to C:\Combofix.txt or something. Check that and see what it says.

ndb
Aug 25, 2005

I work at my university's IT department, specifically for the helpdesk.

On Friday I encountered two machines, both with a varient of WinAntivirus. One displayed a fake Windows Firewall window, and the other one had TWO varieties of WinAntivirus on it at the same time.

The first time it was easy to remove as it was a dumb variety of the virus - find the process that's running, kill it, search for it in Windows, delete everything that's in the folder (this one was in Application Data/Google), or at least everything relevant to the virus, remove it from Startup under msconfig, and to be safe run SuperAntiSpyware and MalwareBytes. Reboot a couple times to make sure it doesn't come up again.

The second one though I couldn't do anything. She took the laptop to Baylor Hospital's IT Department before she took it to our department. Somehow they messed it up - you can boot into Safe Mode, but you couldn't boot into regular Windows, as Chkdisk would run, report that the C:\ drive was in RAW format, and then it crashes giving you an Unknown Hard Error.

There was other weird things going on with her computer - there was an Administrator account that didn't appear under User Settings.

I did some Googling, and I was getting different reports on what this error means - and was getting everything from "It's a fake blue screen" to "It's memory". I consulted with my boss and he just told me that it's probably better to tell her to back up all her files and to reformat her disk.

Now that I think about it, it was probably a fake Chkdesk and fake blue screen. But how could you do that in Windows XP? This was before you even had a chance to log into a user.

big shtick energy
May 27, 2004


So we recently had Trojan.Linkoptimizer spread around the office where I work, and one of the infected systems was mine. Seeing as I didn't browse any non-company sites in IE, or run anything new, and the system had the patch (or should have, I believe it was pushed out) for the new remote vulnerability, I have no idea how I got infected.

Is that malware known for using autorun on external drives or something? Or was an internal company page or something compromised with a drive-by for IE?

BillWh0re
Aug 6, 2001


SecretFire posted:

So we recently had Trojan.Linkoptimizer spread around the office where I work, and one of the infected systems was mine. Seeing as I didn't browse any non-company sites in IE, or run anything new, and the system had the patch (or should have, I believe it was pushed out) for the new remote vulnerability, I have no idea how I got infected.

Is that malware known for using autorun on external drives or something? Or was an internal company page or something compromised with a drive-by for IE?

I think Symantec sometimes refer to the Conficker worm as Trojan.Linkoptimizer, perhaps because they have very similar obfuscation of the main DLL code.

If it's a Conficker variant it'll probably spread by all three of these:

- MS08-67 exploit (server service vulnerability that you say is patched)
- Writable shares with weak passwords, or unpassworded shares, on to which is copies the DLL file and sets up a scheduled task to run it
- USB drives where it creates an autorun.inf file full of random crap that still works becuase it has the proper autorun text in it, the actual DLL is in the RECYCLER folder on the drive

big shtick energy
May 27, 2004


BillWh0re posted:

I think Symantec sometimes refer to the Conficker worm as Trojan.Linkoptimizer, perhaps because they have very similar obfuscation of the main DLL code.

If it's a Conficker variant it'll probably spread by all three of these:

- MS08-67 exploit (server service vulnerability that you say is patched)
- Writable shares with weak passwords, or unpassworded shares, on to which is copies the DLL file and sets up a scheduled task to run it
- USB drives where it creates an autorun.inf file full of random crap that still works becuase it has the proper autorun text in it, the actual DLL is in the RECYCLER folder on the drive

Wait...you can "share" the ability to schedule tasks? I had no idea.

BillWh0re
Aug 6, 2001


SecretFire posted:

Wait...you can "share" the ability to schedule tasks? I had no idea.

They're stored as .job files so with access to the C$ or ADMIN$ share you can just drop them I believe.

Nolgthorn
Jan 30, 2001

The pendulum of the mind alternates between sense and nonsense
I've got something really impressive on my Vista machine, I've been virus free for almost my whole life last I think I was about 14. It's causing my http not to work at all, I can run torrents or other Internet/network traffic just fine though, web pages will load but it often takes upwards of 20 minutes for that to happen.

Nod 32 antivirus, which to my knowledge for me has never let one slip by before now no longer updates and says it cannot connect to it's update database.

I ran a full scan and the only thing that came up was some weird adware in my temporary files.

Leonard Leroy
Feb 11, 2007

Filipino Box Spring Hog
Any good registry guards around? I was using Spybot for a bit, but that seems outdated, and it was kinda unpolished in the first place. Still, it was a good line of defense against malware.

Raluek
Nov 3, 2006

WUT.

Nolgthorn posted:

I've got something really impressive on my Vista machine, I've been virus free for almost my whole life last I think I was about 14. It's causing my http not to work at all, I can run torrents or other Internet/network traffic just fine though, web pages will load but it often takes upwards of 20 minutes for that to happen.

Nod 32 antivirus, which to my knowledge for me has never let one slip by before now no longer updates and says it cannot connect to it's update database.

I ran a full scan and the only thing that came up was some weird adware in my temporary files.

Did you check your hosts file? Could be that or maybe your DNS got changed to something weird. Try 4.2.2.2 or something as a test.

darkforce898
Sep 11, 2007

Leonard Leroy posted:

Any good registry guards around? I was using Spybot for a bit, but that seems outdated, and it was kinda unpolished in the first place. Still, it was a good line of defense against malware.

I still vote for TeaTimer from Spybot... works marvelously.

Leonard Leroy
Feb 11, 2007

Filipino Box Spring Hog

darkforce898 posted:

I still vote for TeaTimer from Spybot... works marvelously.

Ya, it really does. I just took a look around, and there's nothing else free that does the same.

Capnbigboobies
Dec 2, 2004

darkforce898 posted:

I still vote for TeaTimer from Spybot... works marvelously.

The problem with Teatimer is that if we install it on all the computers we are constantly fixing, the users would just mash accept or even worse delete a benign process/program/registry key.

Jonny 290
May 5, 2005



[ASK] me about OS/2 Warp

Capnbigboobies posted:

The problem with Teatimer is that if we install it on all the computers we are constantly fixing, the users would just mash accept or even worse delete a benign process/program/registry key.

TeaTimer and other "bong! security alert" programs - GREAT if you can understand what it's asking, terrible if you don't. TT should never be installed for end users IMO, they either blindly click accept or block on every popup.

Capnbigboobies
Dec 2, 2004

Jonny 290 posted:

TeaTimer and other "bong! security alert" programs - GREAT if you can understand what it's asking, terrible if you don't. TT should never be installed for end users IMO, they either blindly click accept or block on every popup.

I agree 100%, I always uncheck teatimer and the other thing SpyBot uses when I install it on a computer I am fixing. For us awesome computer guys we can use teatimer, but we never really run into spyware that often anyways.

Sent from my iPad
Jun 19, 2000

Just finished cleaning off a friend's computer that got infected with TDSServ. Seems to be completely gone now, thanks to SUPER Antispyware and ComboFix.

NOD32 only picked up on the problem when it noticed the SYSTEM account trying to download a Win32/Kryptik.EH trojan from an external website. That website is tied to a domain name, which surprisingly enough isn't through Domains By Proxy. I'll probably call the administrative contact tomorrow morning to ask why he's hosting malware.

Adbot
ADBOT LOVES YOU

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

zapf posted:

Just finished cleaning off a friend's computer that got infected with TDSServ. Seems to be completely gone now, thanks to SUPER Antispyware and ComboFix.

NOD32 only picked up on the problem when it noticed the SYSTEM account trying to download a Win32/Kryptik.EH trojan from an external website. That website is tied to a domain name, which surprisingly enough isn't through Domains By Proxy. I'll probably call the administrative contact tomorrow morning to ask why he's hosting malware.

It wouldn't surprise me if this is news to him.

  • Locked thread