Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Bald Stalin
Jul 11, 2004

Our posts

BorderPatrol posted:

Anyone here use Counterspy/VIPRE security software? I've been using them for a few years now and they are one of the most underrated security companies I've seen, their stuff is very good (they originally made the first versions of the Microsoft Antispyware product)

We use CounterSpy enterprise. It works well enough but there are a lot of bugs and false positives. Also many times it's failed to stop/remove what malwarebytes anti malware fixed straight away.

A relatively up to date CounterSpy agent was detecting Utimaco Safeguard (encryption software) as a trojan and quarantining an important .dll file crippling my laptops. If I was using a brand new updated version of Safeguard I could understand but this version has been out for many many months.

Adbot
ADBOT LOVES YOU

BillWh0re
Aug 6, 2001


Sanctum posted:

So I finally installed WinXP SP3 only 2 days ago and just today, browsing the internet, I notice my HD running too much, check processes and see acrord32.exe using 1.2 gigs of memory. I haven't been viewing any .pdf's since I booted. 5 minutes later my window is greyed out and I have a fake anti-virus program pretending to scan my system.

There have been lots of exploited PDF files around lately and it looks like that's what happened here. That acrord32.exe was using 1.2gb suggests that the PDF probably contained some Javascript that was spraying the heap in preparation for triggering a vulnerability. You don't say what AV you're using but detection of these PDFs varies greatly between antivirus vendors and is generally pretty poor across the board so it could easily have slipped through embedded in a webpage somewhere.

The sad thing is most people don't care as much about updating Acrobat reader as other software but the reality is it is just as much in the line of fire as a web browser or email client. I imagine it also doesn't help that a lot of the time if someone pirates Photoshop or other Adobe software they'll redirect the update domain to 127.0.0.1 in the hosts file to stop it phoning home -- I'm not totally sure but I imagine this also stops updates to Acrobat reader.

Sanctum posted:

:haw: prunnet.exe among other things in my processes now. I kill and delete everything, but I still have some randomly generated .dll's in system32 created at the same time which have hooked themselves into my winlogon.exe so I can't kill them or delete them. They generate new registry values every time I reboot so the same processes keep popping up no matter how many times I remove them from my registry and delete the files I can delete.

Is there any way to use an image of a CD-ROM/floppy boot disk and load it from the HD using boot.ini? I have no floppy drive, my DVD drive isn't recognized in my BIOS menu and I got nothing but my HD to boot to. Which is SATA, and every other HD in this house is IDE so I can't even put it in a different computer to just delete the goddamn files hooked into my winlogon.exe. :bang:

Whatever happened to being able to boot to a DOS prompt anyways. gently caress you safe mode with command prompt.

How did you install Windows without any way to boot from CD? Can you boot from a USB memory stick? If so, you can probably get an install of Knoppix or an Ubuntu LiveCD going and mount the Windows drive from there.

averagebloke
May 8, 2004

BillWh0re posted:

The sad thing is most people don't care as much about updating Acrobat reader as other software but the reality is it is just as much in the line of fire as a web browser or email client.

This is a good point.

Once I've cleaned a system, removed the old system restore points, updated to the latest security patches and installed an anti virus product I always update the trifecta of Adobe Flash, Java and Adobe Reader to try and prevent reinfection. Is there anything else that I should be doing?

BillWh0re
Aug 6, 2001


averagebloke posted:

This is a good point.

Once I've cleaned a system, removed the old system restore points, updated to the latest security patches and installed an anti virus product I always update the trifecta of Adobe Flash, Java and Adobe Reader to try and prevent reinfection. Is there anything else that I should be doing?

That's pretty much all I can think of although if Office is on there you'd want to update that as well, basically anything that can open embedded in a browser, or that embeds a browser itself, needs to be kept up to date.

-Dethstryk-
Oct 20, 2000

BillWh0re posted:

That's pretty much all I can think of although if Office is on there you'd want to update that as well, basically anything that can open embedded in a browser, or that embeds a browser itself, needs to be kept up to date.
This is where something like Secunia's PSI comes in handy.

GREAT BOOK OF DICK
Aug 14, 2008

by Ozma

brc64 posted:

I tested VIPRE Enterprise here and loved it. My boss proposed it to the owner as an alternative to OfficeScan (which STILL isn't Server 2008 compatible), citing better protection and management AND lower cost (which means we can make more money from it). Owner dismissed the idea without even giving it 2 seconds of thought. :(

Is the owner some kind of OfficeScan fanboy? We just finished ridding our network of that poo poo and forced CDW to give us a refund on it AND exchange it with Kaspersky. $12,000 and a 400 user license later, we're now securing our systems with it and so far it's found plenty of infections that TrendMicro and Symantec did not. That's for a three year license and they even threw in a free, one year subscription to Kaspersky Internet Security for the first 300 users who ask our department for an activation key. That's not even the best part, either. When we e-mail the company employee instructions to obtain Kaspersky and their activation code, the e-mail also tells them to call Kaspersky for further support. :toot:

Doc Faustus
Sep 6, 2005

Philippe is such an angry eater

Otacon posted:

I'm on my third computer today that's crossed my desk with TDSSrv, and it's only 2pm.

Signs that you are infected with TDSSrv: Windows XP refuses to boot, either blue-screening during the black loading screen, or freezing before it gets to login.


Whoa, thanks for posting this. I just forwarded this one to everyone in my little group; you may have saved one computer from the scrap heap already.

1997
Jan 20, 2008

calmer than you are

Otacon posted:

Has anyone here worked with Geeksquad? How efficient were those MRI disks?

Incredibly efficient. Virus removal is almost completely automated, with any remaining bits needing manual removal. Mounts to Windows installations, has the ability to clean and modify the registry even if something like TDSSrv prevents boot up. Has all sorts of Winsock and dll fixes that are automated too. Much better than it was before last summer. Basically we just have to run it once for it to pave through what it finds and 99% chance there will be a usable system to come out of it in the end. We rarely have to restore units and even more rarely see them come back again for the same problems, unless the customer was an idiot and re-infected themselves. There's multiple scans that we use to give a system a clean diagnosis, we don't rely on just one.

Also today some guy laughed at me when I told him we'd have to charge for his virus removal even though we installed his antivirus software like a week ago (on a brand new PC) because he's been using Limewire. Once you mess with P2P/BitTorrent, you're on your own and you gotta pay. Basically he thinks we were responsible for telling him NOT to and should do it free. Whatever, no.

Otacon
Aug 13, 2002


1997 posted:

Incredibly efficient. Virus removal is almost completely automated, with any remaining bits needing manual removal. Mounts to Windows installations, has the ability to clean and modify the registry even if something like TDSSrv prevents boot up. Has all sorts of Winsock and dll fixes that are automated too. Much better than it was before last summer. Basically we just have to run it once for it to pave through what it finds and 99% chance there will be a usable system to come out of it in the end. We rarely have to restore units and even more rarely see them come back again for the same problems, unless the customer was an idiot and re-infected themselves. There's multiple scans that we use to give a system a clean diagnosis, we don't rely on just one.

Also today some guy laughed at me when I told him we'd have to charge for his virus removal even though we installed his antivirus software like a week ago (on a brand new PC) because he's been using Limewire. Once you mess with P2P/BitTorrent, you're on your own and you gotta pay. Basically he thinks we were responsible for telling him NOT to and should do it free. Whatever, no.

I had a guy yesterday call in, and asked me about Limewire - then, he put me on speakerphone so his crotchspawn could hear me say "Limewire will put viruses on your computer." Then, the kid said "Well, how else am I supposed to get music?"

My response? "You pay for it in iTunes."

GreenFuz
Aug 30, 2000

by Peatpot

GREAT BOOK OF DICK posted:

Is the owner some kind of OfficeScan fanboy? We just finished ridding our network of that poo poo and forced CDW to give us a refund on it AND exchange it with Kaspersky. $12,000 and a 400 user license later, we're now securing our systems with it and so far it's found plenty of infections that TrendMicro and Symantec did not. That's for a three year license and they even threw in a free, one year subscription to Kaspersky Internet Security for the first 300 users who ask our department for an activation key. That's not even the best part, either. When we e-mail the company employee instructions to obtain Kaspersky and their activation code, the e-mail also tells them to call Kaspersky for further support. :toot:

Kaspersky is probably going to be a tougher sell, at least to people who've heard about their site getting hacked with a SQL injection. How the hell did your boss get CDW to refund you for TM, and how smoothly did the deployment go? Oh yeah, and did you notice any performance gains when moving to Kaspersky? OfficeScan is a bloody pig.

brc64
Mar 21, 2008

I wear my sunglasses at night.

GREAT BOOK OF DICK posted:

Is the owner some kind of OfficeScan fanboy?
My boss gave the owner a very nice proposal on VIPRE, but I'm told the owner just dismissed it off-hand saying that he "does not want to see us have to support something else". End of discussion.

There's a reason I started the Job thread...

Runcible Cat
May 28, 2007

Ignoring this post

GreenFuz posted:

Kaspersky is probably going to be a tougher sell, at least to people who've heard about their site getting hacked with a SQL injection. How the hell did your boss get CDW to refund you for TM, and how smoothly did the deployment go? Oh yeah, and did you notice any performance gains when moving to Kaspersky? OfficeScan is a bloody pig.
I found Kaspersky every now and then changed the received date of emails when they were moved into public folders. Which is a spectacular pain in the arse in a company that uses ~100 of the drat things to keep track of client emails and needs to be able to date-track them. The other deal-killer was the amount of time it took them to actually take it seriously and stop pointing me at Microsoft bug reports that had sod all to do with the problem I was reporting.

We are now on Sophos.

(Which is a bit of a pig when HD scanning but at least doesn't play silly buggers with our data.)

GREAT BOOK OF DICK
Aug 14, 2008

by Ozma

GreenFuz posted:

Kaspersky is probably going to be a tougher sell, at least to people who've heard about their site getting hacked with a SQL injection. How the hell did your boss get CDW to refund you for TM, and how smoothly did the deployment go? Oh yeah, and did you notice any performance gains when moving to Kaspersky? OfficeScan is a bloody pig.

Yeah, that whole SQL injection story came out a couple weeks after finishing the Kaspersky deployment. I linked my boss to it and his response was "Okay, so what? I don't have any account information, logins, etc. on their site." If you knew my boss like I have for the past couple years, you'd find out he's the type of person who would call Krispy Kreme and argue with the manager because the doughnut he received was cold upon arrival when it was supposed to be fresh and warm. He has little sympathy and patience for any vendor. If you don't meet his level of satisfaction, he will go over your head and find someone who will. That's how he got his CDW representative to take our TrendMicro purchase back and give us Kaspersky for the entire company. The deployment was okay for the most part. We had 10-15 machines out of 300 or so that didn't complete the automated installation. When I investigated, the majority of those machines were either turned off or locked up. The ones that were locked up were older machines (one had a 10GB hard drive with some local user profiles stored on it so the installation choked on a lack of free disk space.) The other problem we had were some mobile users who could no longer RDP their desktops because Kaspersky had its "Anti-Hacker" feature turned on by default. Apparently it's just a custom firewall set to block incoming RDP connections from the outside world. That's really it. Performance is about the same between Kaspersky and OfficeScan. I didn't notice any drastic differences, aside from OfficeScan's terrible default level of security. We also complete any scans or updates on all workstations after 10pm though when employees are gone.

Otacon
Aug 13, 2002


More on TDSServ/Anti Spyware 2009:

http://trollitc.com/2009/02/how-to-remove-antivirus-2009-from-your-computer-so-you-can-game-properly/

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.
$250,000 Bounty for Conficker Creator

The Register posted:

Microsoft is offering a $250,000 reward for information that leads to the arrest and conviction of the virus writers behind the infamous Conficker (Downadup) worm.

The bounty, announced Thursday, represents a revival of Microsoft's mothballed Anti-virus Reward Program, launched in 2003 and virtually moribund since 2004.

In 2003, Redmond put up a $250,000 reward for tips leading to the arrest and conviction of the virus writers behind the infamous SoBig and Blaster worms. It extend this offer to other examples of malware, but there's only ever been one payout.

Erstwhile college friends of German VXer Sven Jaschan, who was convicted of writing the Sasser worm, picked up a $250 payout for their efforts.

This all seemed much more impressive prior to the last couple paragraphs.

1997
Jan 20, 2008

calmer than you are

Otacon posted:

I had a guy yesterday call in, and asked me about Limewire - then, he put me on speakerphone so his crotchspawn could hear me say "Limewire will put viruses on your computer." Then, the kid said "Well, how else am I supposed to get music?"

My response? "You pay for it in iTunes."

Yeah, that's pretty much exactly what I tell them too.

We had a guy install Bearshare the morning after he got his computer back and then proceeded to lie to us on the phone, telling us that the very first thing he saw in the morning when he booted the PC up, was popups for viruses. We checked his PC when he brought it in and saw Bearshare and that it was installed that morning and that he had already been infected, then we promptly sent him back home with it because he didn't listen to us when we told him not to use that stuff anymore. Who the gently caress uses Bearshare still though?

Why people don't listen to us is beyond me.

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius
The entire thing is just messed up. Sometimes I see what should be a dumb teenager with some sort of torrent program, and think maybe kids have gotten with the times. And then I see someone with limewire and lots of lovely pornos "hidden" in the fonts directory.

URL grey tea
Jun 1, 2004

IT'S A SAD THING THAT YOUR ADVENTURES HAVE ENDED HERE!!
http://www.sophos.com/blogs/gc/g/2009/01/16/passwords-conficker-worm/

List of default passwords that Conficker attempts to use on ADMIN$ shares

Hope your domain controller isn't set up with any of these :<

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius
Good thing I use 1234asdf as my password, They missed it by one letter.

devmd01
Mar 7, 2006

Elektronik
Supersonik
Let's just say that if conficker hits my company, we are hosed, unless they have implemented reeeeally good detection rules in the IDSs.

Guess who is supposed to be monitoring the SAV server?

Guess who hasn't been able to get on the SAV system console to make sure everything is running as it should and change the virus alert notification email from the old admin to the new one because the server team can't figure out how to give me permissions to the security console?

e:

Orange Juilius posted:

List of default passwords that Conficker attempts to use on ADMIN$ shares

It doesnt have the most commonly used passwords on there. I'm safe. :smug:

devmd01 fucked around with this message at 20:13 on Feb 13, 2009

LordKain
Oct 8, 2006

hyperborean posted:



:xd:

That is awesome, and reminds me of something.

My wife works in a Jewish family's house every Friday and recently they had been having PC (WinXP) issues. So I head over about a week or so ago and check it out. Well, my wife had said that Norton was up and a few other windows, but I said I'd just have to take a look to be usre. So I look and Norton is up along with a few other windows. After a minute I realize that the other's don't say Norton 360 they say Antivirus 360. God damnit, another variant. So all the sudden the screen blanks and restores, except it's blown up and in some insanely small res that only shows about a quarter of the screen. After about 30 seconds it BSoDs (and I haven't done anything yet). Well I read the BSoD and towards the bottom it stops looking legit. It said something about checking your antivirus/antispyware or something. Then it says that it's restarting so I let it.

The BSoD goes away and the Windows loading screen pops up. So I'm thinking that was way to quick, especially considering the BIOS poo poo didn't popup and all that jazz. So I look at the screen again and under the little XP loading bar there was some text that went to the tune of:
Microsoft Security Center has detected that your antivirus program is out unregistered. Please register Antivirus 360 blah blah blah.
And then it loads back into the exact layout and windows as when I first saw it. So I fire up Malwarebytes and about an hour later I'm done.

Nothing major, I just thought it was interesting the type of tactics they used, including the mostly legit looking BSoD and Windows 'Security Center' warning. Man I wish I got screens of that stuff

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius
Sounds like a modified blue screen screen saver.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

Cojawfee posted:

Sounds like a modified blue screen screen saver.

Yeah, that's been there since one of the original WinXPAntivirus variants. Someone said it was original a SysInternals joke if I remember right.

I found another one that ran a fake chkdsk, but whoever was typing out the information hadn't been paying much attention and just kind of mashed number keys for drive stats. It was reporting like 10 petabytes of total drive space.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

I caught something from either Sherdog.com or Sportbikes.net

I had an up to date AVG running, I'm behind a NAT'd router, and had Windows firewall on.

After a couple minutes, routing table gets filled with static entries and the net becomes un-surfable. And I have a bazillion SMTP connections going, to all around the world.

Malwarebytes finds nothing. Neither does AVG. What should I try?

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

Bob Morales posted:

Malwarebytes finds nothing. Neither does AVG. What should I try?

SUPERAntispyware is pretty decent at finding late-model crap.

To clarify, do the static routes go away when you reboot?

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

Midelne posted:

SUPERAntispyware is pretty decent at finding late-model crap.

To clarify, do the static routes go away when you reboot?

I'm fairly sure.

I have been doing a route -f, then I hurry the hell up and get online (to update Malwarebytes, for example)

But it won't stay online long enough to run Windows updates.

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius

Midelne posted:

Yeah, that's been there since one of the original WinXPAntivirus variants. Someone said it was original a SysInternals joke if I remember right.

I found another one that ran a fake chkdsk, but whoever was typing out the information hadn't been paying much attention and just kind of mashed number keys for drive stats. It was reporting like 10 petabytes of total drive space.

yes, but the original ones simply just put the actual screen saver in system32 (but changed the filename) and left it at that. This one appears to have been modifed. Poorly at that, as the real screen saver takes real information from your system.

Sanctum
Feb 14, 2005

Property was their religion
A church for one

BillWh0re posted:

How did you install Windows without any way to boot from CD? Can you boot from a USB memory stick? If so, you can probably get an install of Knoppix or an Ubuntu LiveCD going and mount the Windows drive from there.
I honestly have no idea since I haven't changed jumper settings on my HDs or DVD drive, but BIOS refuses to recognize the DVD drive now.

So what I had must have been Anti Spyware 2009 bundled with some other serious poo poo because after following the steps to remove that I've noticed I have web results randomly hijacked and bring me to a different page. When it's some innoculous google search I'll occasionally click on a link to wikipedia or something and each time I try it I get taken to a different fake search page. But as if hijacking my search results and re-directing me wasn't scary enough, when I search for something relating to spyware all of the results take me to fake sites unless I copy the URL manually instead of clicking it.

On top of that, I had to change the name of the SuperAntiSpyware installer to run it, and attempting to scan my computer results in a BSOD. :wth: I give up, this virus wins, I'm re-installing windows even if it means I'll have to do it by dropping an old IDE drive into my computer to boot to.

Hank Killinger
Jul 13, 2008
Doesn't automatic lockout of accounts on several authentication failures make it impossible/difficult to brute force an admin user password like the way conficker does? Is there any way for a malicious program to avoid the lockout?

Suspicious
Apr 30, 2005
You know he's the villain, because he's got shifty eyes.
The administrator account doesn't lock out.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

Suspicious posted:

The administrator account doesn't lock out.

And even if it did, it's not like Conficker is going anywhere on a network that uses one of those passwords. It'll be there for plenty long enough to try them all.

BillWh0re
Aug 6, 2001


Hank Killinger posted:

Doesn't automatic lockout of accounts on several authentication failures make it impossible/difficult to brute force an admin user password like the way conficker does? Is there any way for a malicious program to avoid the lockout?

These account lockouts happen and they loving kill a windows network so quickly when it gets Conficker. Though they're a good way to find out which computer is infected since all the requests come from it.

Even if it can't crack the account password it can still spread if someone logs on to the computer as a domain administrator as it will run with their account.

Otacon
Aug 13, 2002


Sanctum posted:

I honestly have no idea since I haven't changed jumper settings on my HDs or DVD drive, but BIOS refuses to recognize the DVD drive now.

So what I had must have been Anti Spyware 2009 bundled with some other serious poo poo because after following the steps to remove that I've noticed I have web results randomly hijacked and bring me to a different page. When it's some innoculous google search I'll occasionally click on a link to wikipedia or something and each time I try it I get taken to a different fake search page. But as if hijacking my search results and re-directing me wasn't scary enough, when I search for something relating to spyware all of the results take me to fake sites unless I copy the URL manually instead of clicking it.

On top of that, I had to change the name of the SuperAntiSpyware installer to run it, and attempting to scan my computer results in a BSOD. :wth: I give up, this virus wins, I'm re-installing windows even if it means I'll have to do it by dropping an old IDE drive into my computer to boot to.

The first sounds like an issue in C:\windows\system32\drivers\etc\HOSTS - open HOSTS in notepad, see if there are any other lines that don't begin with a #. If there are any others than 127.0.0.1, delete those additions.

The second is common with these viruses - they have a list of programs that won't run/install if they match the name of a known virus/malware scanner. Easiest way to get around these is to rename installer, install, and then log into Safe Mode as an Administrator to run the scanner.

This is of course, if you haven't already run a reinstall. Even though - some of these will crash the Windows Installer as it's trying to copy files from the CD. So, YMMV.

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

Bob Morales posted:

I'm fairly sure.

I have been doing a route -f, then I hurry the hell up and get online (to update Malwarebytes, for example)

But it won't stay online long enough to run Windows updates.

Nod32 will find it. I had that one last week. Does it look for a host on port 8221 or 9882 or 8991 or something like that?

It was sneaky. It wouldn't show any activity on netstat or tcpview but we could see it happening on our gateway. The only reason I found it is because my tech machine uses nod32 and I was scanning with something else offline and just happened to find it.

GREAT BOOK OF DICK
Aug 14, 2008

by Ozma

Bob Morales posted:

I caught something from either Sherdog.com or Sportbikes.net

I had an up to date AVG running, I'm behind a NAT'd router, and had Windows firewall on.

After a couple minutes, routing table gets filled with static entries and the net becomes un-surfable. And I have a bazillion SMTP connections going, to all around the world.

Malwarebytes finds nothing. Neither does AVG. What should I try?

Use the latest version of Java and Adobe Reader. This cannot be stressed enough when you consider how many different things will surprise-infect you via a vulnerability in either of those. I watched a machine in a domain that was fine and sitting unused for a month contract Virtumonde because of an outdated Java install/infected .GIF image.

Otacon
Aug 13, 2002


Just finished a 2 day virus infection extravaganza. Installed a bad file, didn't scan first, walked away with Virut, MS Antispyware 2009, and some new form of rootkit that NOTHING would clean. It created a bunch of new drivers for devices I didn't even know existed. (Saitek Magic Bus? Who let the magic bus into my computer???)

Long story short, 5 repair installs, countless loops of Combofix/SDFix/Smitfraud, MBAM, SASW, Panda, Rootkit scanners, etc. All boils down to a nuke and reinstall.

I've learned my lesson.

I've also made a Ghost image.

(Virut turns all EXEs and all HTMLs into viruses. Every single EXE file in /Windows/ was infected. Look out for MS ANTISPYWARE 2009. It installs itself in C:\D&S\All Users\Application Data\CrucialSoft\MS AntiSpyware 2009\ and WILL NOT DELETE no matter HOW MANY TIMES YOU DELETE IT! Argg!)

Stanley Pain
Jun 16, 2001

by Fluffdaddy

Otacon posted:

Just finished a 2 day virus infection extravaganza. Installed a bad file, didn't scan first, walked away with Virut, MS Antispyware 2009, and some new form of rootkit that NOTHING would clean. It created a bunch of new drivers for devices I didn't even know existed. (Saitek Magic Bus? Who let the magic bus into my computer???)

Long story short, 5 repair installs, countless loops of Combofix/SDFix/Smitfraud, MBAM, SASW, Panda, Rootkit scanners, etc. All boils down to a nuke and reinstall.

I've learned my lesson.

I've also made a Ghost image.

(Virut turns all EXEs and all HTMLs into viruses. Every single EXE file in /Windows/ was infected. Look out for MS ANTISPYWARE 2009. It installs itself in C:\D&S\All Users\Application Data\CrucialSoft\MS AntiSpyware 2009\ and WILL NOT DELETE no matter HOW MANY TIMES YOU DELETE IT! Argg!)

Trannysurprise.exe is a no-click zone okay? :q:

Never heard of of Saitek Magic Bus. Sounds pretty drat awesome though.\


edit:

Are you sure the saitek magic bus is malware? Seems to be some kind of keyboard driver.

brc64
Mar 21, 2008

I wear my sunglasses at night.

Otacon posted:

It created a bunch of new drivers for devices I didn't even know existed. (Saitek Magic Bus? Who let the magic bus into my computer???)
There's a computer in the office here that used to try to install drivers for "Internet" every time you turned it on. That was my all time favorite.

devmd01
Mar 7, 2006

Elektronik
Supersonik
You know what I'm thankful for? A lightning storm that fried my parents router back in November. They live a thousand miles away. Because of that I made them get a WRT54GL and while I was there for Christmas I got it all tweaked with Tomato, wireless security and SSH enabled.

Fast forward to yesterday, and I get a call from my mom about some antivirus 2009 warning popup thing.

Thanks to the router having ssh all I had to do was talk my dad through downloading and running tightvnc server. I could take care of the rest through ssh tunneling, instead of talking him through things that would be a pain in the rear end to explain.

They apparently had some new variant called "XP Police 2009", though malwarebytes seems to have cleaned it right up. It's probably time to get Symantec Corp 7.5 changed out for AVG, update other possible infection vectors, and get noscript+adblock installed and explained.





Dammit, I just realized that they just got a 22" widescreen, and are still running it at 1024x768.

Adbot
ADBOT LOVES YOU

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

devmd01 posted:

They apparently had some new variant called "XP Police 2009", though malwarebytes seems to have cleaned it right up. It's probably time to get Symantec Corp 7.5 changed out for AVG, update other possible infection vectors, and get noscript+adblock installed and explained.

poo poo, I don't even want to think about trying to explain how to use Noscript to someone with minimal technical literacy. Good luck man.

  • Locked thread