Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Tevruden
Aug 12, 2004

KillHour posted:

I had an awesome idea for a virus the other day, and was wondering if anyone had seen something like it, or knew if it was even possible. It would search for known router firmwares and replace them with a modified version that has the virus embedded in it. It would then proceed to reinfect any computers you cleaned and hooked back up to the network. If done right, it would be hell on earth to discover what was really happening.

I haven't seen anything like that, but I have seen trojans that will attempt to bruteforce SOHO routers and then change the DNS settings on them to redirect the traffic to name servers controlled by the author of the trojan.

Adbot
ADBOT LOVES YOU

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.
Anyone come across one that redirects webpages to websiteblockonline.com? I've thrown just about everything I've got against this machine and it turns up nothing. The only real useful google result on it is dated July 11, 2010 and it says to run malwarebyes (which I have). There is nothing except for local host in the host file, superantispyware, spybot, a2 free, eset online scanner, and bit defender online scanner find nothing. I have no proxy settings to remove. Basically I cannot find any good reason for this be going on and really don't want to have to flatten and reload this machine.

Maniaman
Mar 3, 2006
I don't see anywhere you've mentioned ComboFix. I would give that a shot. It seems to find and remove lots of nasty things most other tools won't find or touch.

Also check the network settings and make sure it didn't change the DNS servers. I've seen lots of them change the DNS servers to an infected IP address that takes care of the redirecting.

Ted Stevens
Jun 2, 2007

by T. Finn

abominable fricke posted:

Anyone come across one that redirects webpages to websiteblockonline.com? I've thrown just about everything I've got against this machine and it turns up nothing. The only real useful google result on it is dated July 11, 2010 and it says to run malwarebyes (which I have). There is nothing except for local host in the host file, superantispyware, spybot, a2 free, eset online scanner, and bit defender online scanner find nothing. I have no proxy settings to remove. Basically I cannot find any good reason for this be going on and really don't want to have to flatten and reload this machine.

Have you tried running HijackThis? That can usually show me a lot of redirects and other interesting things.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

Maniaman posted:

Also check the network settings and make sure it didn't change the DNS servers. I've seen lots of them change the DNS servers to an infected IP address that takes care of the redirecting.

This is the most likely cause if you've already checked proxy settings. Perhaps you're even lucky enough to be sending DNS traffic to servers in Russia!

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.
Forgot to mention that I've run combofix (it keeps detecting rootkit activity but doesn't resolve anything). Also ran Hijackthis! it found nothing out of the ordinary and the DNS is set for automatically assign from the gateway.

I'm stumped here. I think I might give the Dr. Web live CD a try.


edit: Dr. Web found nothing

abominable fricke fucked around with this message at 14:57 on Jul 16, 2010

Ted Stevens
Jun 2, 2007

by T. Finn
It could be a really deep rooted rootkit. At this point, it would probably just be better to reinstall Windows. After all, how much time have you already sunk in this?

Here's my last resort threat removal. Generally, at this point, if there's something there, I'd just reformat anyway.

GMER- Rootkit detector http://www.gmer.net/

Hitman Pro- It detected a rootkit that nothing else found. I think it's only a 10 day trial or something http://www.surfright.nl/en

BlackLight- Rootkit remover. It's found things other programs didnt. http://www.f-secure.com/en_EMEA/products/technologies/blacklight/

univbee
Jun 3, 2004




Try The Conficker removal tool at http://www.bdtools.net/. Also, if this is a Vista or 7 machine and you have access to the Microsoft Desktop Optimization Pack (through MSDN or whatever), you can set up an official Microsoft Emergency Rescue Disc (6.0 if it's Vista, 6.5 if it's Windows 7), which has an offline spyware scanner that actually works well on rootkits I've found.

Oddhair
Mar 21, 2004

univbee posted:

Try The Conficker removal tool at http://www.bdtools.net/. Also, if this is a Vista or 7 machine and you have access to the Microsoft Desktop Optimization Pack (through MSDN or whatever), you can set up an official Microsoft Emergency Rescue Disc (6.0 if it's Vista, 6.5 if it's Windows 7), which has an offline spyware scanner that actually works well on rootkits I've found.

Do you know where it would reside on MSDN?

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

abominable fricke posted:

Anyone come across one that redirects webpages to websiteblockonline.com? I've thrown just about everything I've got against this machine and it turns up nothing. The only real useful google result on it is dated July 11, 2010 and it says to run malwarebyes (which I have). There is nothing except for local host in the host file, superantispyware, spybot, a2 free, eset online scanner, and bit defender online scanner find nothing. I have no proxy settings to remove. Basically I cannot find any good reason for this be going on and really don't want to have to flatten and reload this machine.

This stuff usually happens for a couple of reasons:
hosts (scanner probably would have got this)
DNS poison (you say you've checked)
LSP Hijack (not as popular as it used to be)

Maybe just to be safe take a look in the HOSTS file, and if you're at wit's end and don't care maybe try LSPFix.

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.
Ted Stevens, Hitman Pro found it. Thank you so much. Let's talk about me having your e-love child.

Ted Stevens
Jun 2, 2007

by T. Finn
Glad to hear it worked. I did a ton of research doing AV solutions and hitman did a great job finding poo poo others didn't.

So, that redirect problem is gone and everything?

And abominable, I'd love to be your e-child donor. At least I'd be getting some kinda sex :)

Ted Stevens fucked around with this message at 03:07 on Jul 17, 2010

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

Ted Stevens posted:

Glad to hear it worked. I did a ton of research doing AV solutions and hitman did a great job finding poo poo others didn't.

So, that redirect problem is gone and everything?

And abominable, I'd love to be your e-child donor. At least I'd be getting some kinda sex :)

The redirect problem is gone, as it turns out the machine was infected with a variant of TDSS that had infected the keyboard driver. Sneaky fuckers.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.
SANS ISC went to Yellow Alert for the second time in the roundabout three years I've been watching to call attention to the .LNK vulnerability discussed a bit earlier in this thread. There are a few mitigation options mentioned, but honestly most of them are non-starts in a real-world enterprise environment. Disabling icons on shortcuts domainwide, for instance, would go over just peachy.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.
Somewhat reasonable mitigation for the .LNK vulnerability:

http://blog.didierstevens.com/2010/07/20/mitigating-lnk-exploitation-with-srp/

Basic idea is using software restriction policies to prevent everything from running, then excluding your C: and any other hard drives that happen to be present in your environment. This runs into issues when you're in a situation with dissimilar numbers of hard drives -- about half of the ones in my environment have recovery partitions and half don't, for instance -- and where CD/DVD-ROMs may or may not be present depending on the situation, but it's a start.

FCKGW
May 21, 2006

KillHour posted:

I had an awesome idea for a virus the other day, and was wondering if anyone had seen something like it, or knew if it was even possible. It would search for known router firmwares and replace them with a modified version that has the virus embedded in it. It would then proceed to reinfect any computers you cleaned and hooked back up to the network. If done right, it would be hell on earth to discover what was really happening.

Funny you mention that ...
http://arstechnica.com/security/news/2010/07/millions-of-soho-routers-vulnerable-to-new-version-of-old-attack.ars

Xenomorph
Jun 13, 2001
The whole "just listing directory contents / viewing icons" is a great argument as to why people should have the on-access antivirus installed.

Lots of people makes claims like "I don't run antivirus and my system is fine! I don't open unknown files."

Well, with this LNK issue, it really may not be fine.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

Xenomorph posted:

Well, with this LNK issue, it really may not be fine.

This reminds me, Safari's been vulnerable to an exploit that forces it to drop arbitrary files onto the desktop for well over a year, last I checked. Good thing they have jack poo poo for a share in the PC browsing market.

edit: iirc Apple wasn't fixing it because the vulnerability didn't actually run the file, just dumped it on the user's desktop.

m2pt5
May 18, 2005

THAT GOD DAMN MOSQUITO JUST KEEPS COMING BACK

Xenomorph posted:

Well, with this LNK issue, it really may not be fine.

There was an exploit a couple years ago that involved WMF files (I think) where all you had to do to invoke the code was for Windows to access the file. (Or run into it embedded in a web page.)

BillWh0re
Aug 6, 2001


the LNK file exploit also works from a webpage, at least if the victim is using IE

Drighton
Nov 30, 2005

I had a fake antivirus try to shutdown the computer right toward the end of a Malwarebytes scan. It included a custom message in the prompt about the computer being compromised, but left the default 30 second delay - about enough time to shutdown -a. Only reason I mention it is because its a very clever and evil last effort (aka "gently caress You") by the virus and made me smile. If I had walked away and let the scan run like I normally do, the removal could have taken twice as long.

Drighton fucked around with this message at 23:15 on Jul 22, 2010

Ted Stevens
Jun 2, 2007

by T. Finn
This might sound a little lame, but what does the -a switch do? I tried doing a shutdown /? in cmd, but it did not show what it did.

Drighton
Nov 30, 2005

Its in there. It aborts the command.

Ted Stevens
Jun 2, 2007

by T. Finn
Thanks. Oh. I see it now. It would have been nice if they showed the switches in alphabetical order, though.

warning
Feb 4, 2004

ZZ Pops is all about hugs and high fives.
I ran across a variant of the TDSS rootkit that would let MalwareBytes run and scan but then it would close it when you clicked the show results button (so nothing would get cleaned). I give props to the guy who coded that, it pissed me off good and made me waste an extra hour.

sfwarlock
Aug 11, 2007

warning posted:

I ran across a variant of the TDSS rootkit that would let MalwareBytes run and scan but then it would close it when you clicked the show results button (so nothing would get cleaned). I give props to the guy who coded that, it pissed me off good and made me waste an extra hour.

So how did you defang it?

Ted Stevens
Jun 2, 2007

by T. Finn
Try Hitman Pro. I haven't seen any virus/trojan stop it, yet.

http://www.surfright.nl/en

Tapedump
Aug 31, 2007
College Slice
What's this horseshit?!

GIS "Starcraft 2" and the first result takes me here:


Click here for the full 1024x712 image.


Fantastic.

click click
Aug 9, 2006

The Eleonore exploit back is pretty nasty. It keeps getting updated with new exploits for security holes in browsers, adobe reader, flash player, java, and other programs, and will probe the victims computer for security holes in all the places it knows of. Petr M Ivanko (it's creator and seller), I'm coming for you, you fucker.

Ted Stevens
Jun 2, 2007

by T. Finn
I just had some weird dream/nightmare that my Windows 7 desktop computer somehow got completely hosed by some sort of Conficker worm/virus/rootkit something or other.

In this dream, I started up my computer, was just browsing the internet, suddenly got a pop up ad saying "Your computer is infected!" like they always do. I ignored it because it was a stupid pop up, then I clicked on the start menu and everything was changed. My "All Programs" pointed to a bunch of fake programs, my bookmarks were replaced by various "Windows 7 AV" links and porn advertisements and same with My Documents. I kept trying to close them, I scanned with MSE and MWB, but neither of them found ANYTHING. I restarted my computer, only to have my computer bombard me with all sorts of fake Windows errors saying there were tons of infections and registry errors. Again, I ran multiple virus scsns and nothing came up. IE and FF kept popping up with very audible porno movies and clips playing and I couldn't close them. I was embarrased because a bunch of people were watching me while this was happening. In desperation, I went to restore my computer from a backup, but none of my backups worked due to the virus. I freaked out and for the first time in my life felt as hopeless as your typical user. I couldn't do anything, nothing worked, and all my backups were gone.

Then I woke up in a cold sweat to my alarm clock going off.


I think I need a vacation.

KillHour
Oct 28, 2007


Ted Stevens posted:

I just had some weird dream/nightmare that my Windows 7 desktop computer somehow got completely hosed by some sort of Conficker worm/virus/rootkit something or other.

In this dream, I started up my computer, was just browsing the internet, suddenly got a pop up ad saying "Your computer is infected!" like they always do. I ignored it because it was a stupid pop up, then I clicked on the start menu and everything was changed. My "All Programs" pointed to a bunch of fake programs, my bookmarks were replaced by various "Windows 7 AV" links and porn advertisements and same with My Documents. I kept trying to close them, I scanned with MSE and MWB, but neither of them found ANYTHING. I restarted my computer, only to have my computer bombard me with all sorts of fake Windows errors saying there were tons of infections and registry errors. Again, I ran multiple virus scsns and nothing came up. IE and FF kept popping up with very audible porno movies and clips playing and I couldn't close them. I was embarrased because a bunch of people were watching me while this was happening. In desperation, I went to restore my computer from a backup, but none of my backups worked due to the virus. I freaked out and for the first time in my life felt as hopeless as your typical user. I couldn't do anything, nothing worked, and all my backups were gone.

Then I woke up in a cold sweat to my alarm clock going off.


I think I need a vacation.

It's funny that to us this is a serious nightmare scenario.

univbee
Jun 3, 2004




Oddhair posted:

Do you know where it would reside on MSDN?

Strangely enough, it's under "Servers" for some reason. It's just called "Desktop Optimization Pack" and there's no point in downloading the older ones, I think you can just download 2010 Refresh and you're good.

Oddhair
Mar 21, 2004

That's great, thanks, I see it now.

Moderator
Jul 8, 2010
;)

(USER WAS PUT ON PROBATION FOR THIS POST)

Mr. Fahrenheit
Feb 9, 2007

by T. Finn
Edit: Nevermind, I guess i loving spoke too soon, I'm still getting redirected. I've run Malware Bytes, Ad-Aware, AVG, Avast, ComboFix and now Hitman Pro. Does anyone have any suggestions.

I had a virus that hosed with my proxy setting, should it be set to auto detect proxy setting for this network for firefox? because I just changed it to that and it didn't redirect me on the link that I had just been redirected on before I changed it. E: No it wasn't that either. gently caress this is frustrating. Should I post my Hijack This log here or something?

Mr. Fahrenheit fucked around with this message at 07:46 on Jul 30, 2010

Stanley Pain
Jun 16, 2001

by Fluffdaddy

Mr. Fahrenheit posted:

Edit: Nevermind, I guess i loving spoke too soon, I'm still getting redirected. I've run Malware Bytes, Ad-Aware, AVG, Avast, ComboFix and now Hitman Pro. Does anyone have any suggestions.

I had a virus that hosed with my proxy setting, should it be set to auto detect proxy setting for this network for firefox? because I just changed it to that and it didn't redirect me on the link that I had just been redirected on before I changed it. E: No it wasn't that either. gently caress this is frustrating. Should I post my Hijack This log here or something?

Best bet is for a quick re-install.

warning
Feb 4, 2004

ZZ Pops is all about hugs and high fives.
If it gets past combofix it gets reimaged.

That is my motto.

Proud Christian Mom
Dec 20, 2006
READING COMPREHENSION IS HARD
pull the drive and run it through another machine's AV

Posts Only Secrets
Jan 22, 2005
Breaking the NDA...
If it showed signs of tdss in the past, run Tdsskiller on it. Looks like it was just updated too.

http://support.kaspersky.com/viruses/solutions?qid=208280684

Its a quick scan that usually takes less then a minute and picks up infected drivers that some AV's don't always detect as TDSS.

Adbot
ADBOT LOVES YOU

FCKGW
May 21, 2006

Zeus Botnet v3 has reared it's ugly head and emptied out about $1 million from UK bank accounts in a currently undetected botnet scheme.

The Register posted:

The Zeus Trojan associated with the account ran a "man in the browser" attack. While earlier versions simply recorded banking login credentials and forwarded them back to hackers, the latest version of Zeus also performs illegal online banking transactions. The malware is sophisticated enough to wait for the entry of secondary authorisation data needed to make transfers - such as a date of birth - by victims onto compromised machines.

Accounts balances from compromised machines were manipulated to disguise transfer from compromised accounts to phishing mules, located in the UK. These transfers were only carried out when the account balance was over £800, a tactic possibly designed to avoid the early detection of fund transfers from compromised accounts by making sure marks still had enough money to obtain cash from ATMs.

The Register had a great article on it, but this part stuck out for me.

The Register posted:

It also found that the exploit pack used to seed to attack had claimed a much larger number of victims - as many as 300,000 machines. The vast majority were Windows boxes, but 4,000 Mac machines were also hit.

This attack works through a browser plug-in, making secondary authentication methods useless and creates false bank statements on the fly, hiding any transfers from the victim's accounts.

I'm sure we're bound to see more of these attacks crop up in the future. Social Engineering still works on any platform.

  • Locked thread