Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
ymgve
Jan 2, 2004


:dukedog:
Offensive Clock

Honey Im Homme posted:

http://sites.google.com/site/koironauthree/pe-builder-bartpe-plugins/sophos-anti-virus-plugin

With UBCD or hirens or whatever I guess!

But this is just a standard AV scanner, isn't it? I want something that locates any discrepancies between the file system as seen from outside the OS and the file system as seen from inside the OS.

Kelson's idea is closer, but I haven't really done much shell scripting.

Adbot
ADBOT LOVES YOU

URL grey tea
Jun 1, 2004

IT'S A SAD THING THAT YOUR ADVENTURES HAVE ENDED HERE!!

Honey Im Homme posted:

http://sites.google.com/site/koironauthree/pe-builder-bartpe-plugins/sophos-anti-virus-plugin

With UBCD or hirens or whatever I guess!
http://drop.io/new_savpkg

Grab sbav_10_sfx.exe

Follow this KB
http://www.sophos.com/support/knowledgebase/article/52011.html

Creates a Slax bootable disc with SAV for Linux and the newest IDEs

If it works, switch to Sophos or something

Trisk
Feb 12, 2005

So my father has some kind of virus on his computer that was sending out spam emails to people in his address book. I told him to install MSE and scan he said it found some stuff and took care of it yet today I check my email and I've got four more spams from him. Any of you guys know what this is so I can point him in the right direction or are these emails too generic to make an identification from?

FCKGW
May 21, 2006

Trisk posted:

So my father has some kind of virus on his computer that was sending out spam emails to people in his address book. I told him to install MSE and scan he said it found some stuff and took care of it yet today I check my email and I've got four more spams from him. Any of you guys know what this is so I can point him in the right direction or are these emails too generic to make an identification from?



Honestly that's too generic. Hit his system with ComboFix and MalwareBytes and see what comes up.

Grand Fromage
Jan 30, 2006

L-l-look at you bar-bartender, a-a pa-pathetic creature of meat and bone, un-underestimating my l-l-liver's ability to metab-meTABolize t-toxins. How can you p-poison a perfect, immortal alcohOLIC?


All right, I've just started seeing this everywhere the last couple days:



Anyone know if this is on my end or something going around? None of my scans have found anything on my system.

Scott808
Jul 11, 2001
http://deletemalware.blogspot.com/2010/03/how-to-remove-online-protection-tool.html

Grand Fromage
Jan 30, 2006

L-l-look at you bar-bartender, a-a pa-pathetic creature of meat and bone, un-underestimating my l-l-liver's ability to metab-meTABolize t-toxins. How can you p-poison a perfect, immortal alcohOLIC?


Well that sucks. I've already run Malware, Super, and Spybot without any of them finding it. Guess I'll try this google one.

Edit: Awesome, nothing. And I can't boot into safe mode, bluescreens and reboots immediately. gently caress I wish I had Win 7 so I could just reinstall.

Grand Fromage fucked around with this message at 16:51 on Mar 26, 2010

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.
This isn't really a virus, but I doubt there's enough material out there for a "generic exploit" thread.

http://www.theregister.co.uk/2010/03/26/open_source_wireless_sniffer/

quote:

Keykeriki not only allows researchers or attackers to capture the entire layer 2 frames, it also allows them to send their own unauthorized payloads. That means devices that don't encrypt communications - or don't encrypt them properly - can be forced to cough up sensitive communications or be forced to execute rogue commands.

At the CanSecWest conference in Vancouver, Dreamlab Senior Security Expert Thorsten Schroder demonstrated how Keykeriki could be used to attack wireless keyboards sold by Microsoft. The exploit worked because communications in the devices are protected by a weak form of encryption known as xor, which is trivial to break. As a result, he was able to intercept keyboard strokes as they were typed and to remotely send input that executed commands on the attached computer.

Sounds pretty cool, but seems like unlike most other ways of screwing with a computer you'd need an actual visual on the screen to be able to tell what was going on with your spoofed commands.

Next up in specs for secure data handling: Faraday cages.

bebaloorpabopalo
Nov 23, 2005

I'm not interested in constructive criticism, believe me.

Midelne posted:

Sounds pretty cool, but seems like unlike most other ways of screwing with a computer you'd need an actual visual on the screen to be able to tell what was going on with your spoofed commands.

If you can remotely send keystrokes, it's trivial to install software that would allow for a full takeover.

Frabba
May 30, 2008

Investing in chewy toy futures

Doody the Clown posted:

If you can remotely send keystrokes, it's trivial to install software that would allow for a full takeover.

Assuming the victim is still running on an admin account, sure, that could be considered trivial. If they're running in Vista/Win7 on a standard user account, they would need to remotely capture the keystrokes for an admins password as well to bypass UAC.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

frabba posted:

Assuming the victim is still running on an admin account, sure, that could be considered trivial. If they're running in Vista/Win7 on a standard user account, they would need to remotely capture the keystrokes for an admins password as well to bypass UAC.

Yeah, that was my thought as well. Besides that, you would also need -- ideally -- a computer that has not locked from inactivity but that has no one watching it, since your spoofed input is going to be exactly as visible as normal input from the keyboard.

Epikhigh
Apr 4, 2009
Well...got XP Antivirus 2010 from thepiratebay :/

mAlfunkti0n
May 19, 2004
Fallen Rib

Grand Fromage posted:

Well that sucks. I've already run Malware, Super, and Spybot without any of them finding it. Guess I'll try this google one.

Edit: Awesome, nothing. And I can't boot into safe mode, bluescreens and reboots immediately. gently caress I wish I had Win 7 so I could just reinstall.

This is why you need a copy of UBCD4Win. It is my primary tool of choice for cleaning up nasty stuff that refuses to allow you to function in safe mode.

Edit : http://www.bleepingcomputer.com/forums/topic296821.html

mAlfunkti0n fucked around with this message at 21:51 on Mar 27, 2010

Capnbigboobies
Dec 2, 2004

Epikhigh posted:

Well...got XP Antivirus 2010 from thepiratebay :/

You should run firefox or chrome with a adblock filter/plugin. I find this dramatically cuts down on XP Antivirus infections. A friend of mine kept infecting his machine with that crap from some bullshit "scene release" website. I installed Adblock plus and that stopped. (I hope)


Also of course a AV should be run.

NOTinuyasha
Oct 17, 2006

 
The Great Twist

Epikhigh posted:

Well...got XP Antivirus 2010 from thepiratebay :/

I recently fixed up a laptop that got XP Antivirus even with Firefox. I have no idea if the idiot was even using it, but all the links to IE had been deleted and Firefox was set as default. I don't care about ads, but this sort of poo poo is reason enough to run noscript and adblock. Advertising money is basically blood money at this point, all the real profit comes somewhere down the line from malicious, unattended installs of XP antivirus.

Jetsetlemming
Dec 31, 2007

i'Am also a buetifule redd panda

NOTinuyasha posted:

I recently fixed up a laptop that got XP Antivirus even with Firefox. I have no idea if the idiot was even using it, but all the links to IE had been deleted and Firefox was set as default. I don't care about ads, but this sort of poo poo is reason enough to run noscript and adblock. Advertising money is basically blood money at this point, all the real profit comes somewhere down the line from malicious, unattended installs of XP antivirus.
I don't know what ads could do without flash, plugins, and js, which are what noscript blocks. I'll turn adblock off on sites that rely on ad revenue that I like (Ars Technica recently had a bitchfest about people blocking ads), but I won't ever turn off Noscript.

Epikhigh
Apr 4, 2009

Capnbigboobies posted:

You should run firefox or chrome with a adblock filter/plugin. I find this dramatically cuts down on XP Antivirus infections. A friend of mine kept infecting his machine with that crap from some bullshit "scene release" website. I installed Adblock plus and that stopped. (I hope)


Also of course a AV should be run.

I was running the most updated Firefox along with Adblock Plus + Noscript. I also was using MSE.

NOTinuyasha
Oct 17, 2006

 
The Great Twist

Jetsetlemming posted:

I don't know what ads could do without flash, plugins, and js, which are what noscript blocks. I'll turn adblock off on sites that rely on ad revenue that I like (Ars Technica recently had a bitchfest about people blocking ads), but I won't ever turn off Noscript.

I could have more to do with other lovely plugins like Java or Adobe reader - as far as I know NoScript deals with that too. Either way I keep it on primarily because there are some really lovely sites that assault you with lots of worthless ad-driven scripts that slow my browser down. As for the ads themselves, I don't care at all. NoScript by itself seems to kill ads for 90% of all sites because they don't bother having fallbacks to plain images, including the SA ads, which are by the way notorious for having all sorts of malicious poo poo. Lowtax or whoever does it now can manually block whatever they want, but if that actually got to the root of the issue then the ads wouldn't make money. They're basically getting paid to let someone try and load malware on your system.

Tommy 2.0
Apr 26, 2008

My fabulous CoX shall live forever!
I've got a laptop running XP and SP3. I just ran malware bites and it snagged quite a bit (90 items) and I'm now able to view all the sites I wasn't before. I suspected it was XP anti-virus or some variant. Now, whenever I try to run a DOS boot disk or the XP install disk, my system shuts off immediately, not allowing me any options to format. What is going on?

Yakse
May 19, 2006
If I may take off my actor pants for a moment and pull my Analrapist stocking over my head.....

Grand Fromage posted:

Well that sucks. I've already run Malware, Super, and Spybot without any of them finding it. Guess I'll try this google one.

Edit: Awesome, nothing. And I can't boot into safe mode, bluescreens and reboots immediately. gently caress I wish I had Win 7 so I could just reinstall.

Probably a bit late in your case but the "repair safeboot key" option in sdfix sometimes fixes this problem. In cases where it doesn't malwarebytes, spybot and combofix usually do.

The process I usually use for cleaning system is Malwarebytes and spybot at the same time in safemode, check for anything suspicious in Autoruns while they run their scans(deleting the files for poo poo like xp antivirus as well as removing their entries), once MWB has finished/restarted go back into safemode and run combofix, choosing safemode if it has to restart in the middle of the scan. Then normal mode and run a scan with an antivirus(MSE if it has none, whatever it has otherwise).

Since having problems with Virut I also only use CD's for the tools I use burning a new one whenever combofix needs updated(like every three days), I would use lockable USB's if I trusted my coworkers/boss.

Tommy 2.0
Apr 26, 2008

My fabulous CoX shall live forever!
Update: Was able to START formatting with an XP disk, and 1/4th of the way through the system shut down. This ONLY happens when I try to do anything permanent to the hard dirve, and mostly when I am at the command prompts to do it. WTF? Are some viruses so bad they don't need the OS to load to do it or am I missing something? I'm about one click away from just ordering a new hard drive but am starting to get worried, due to lack of knowledge, that this thing has some how hosed the firmware on something?

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock
You got a problem, but the problem is physical errors on either the hard drive or in RAM. It's not because of a virus. Run memtest, try with a new drive if you don't find any errors.

Hipster_Doofus
Dec 20, 2003

Lovin' every minute of it.
That's really drat weird. When you say shutdown, I assume you mean it just powers off instantly? AFAIK no hard disk problem could cause that behavior, and I kinda doubt bad ram could either. Maybe the power supply? (Still weird though because you say it's only when working with the disk and/or at a cmd prompt.)

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.
You could also get that behavior if you live in a dusty environment with cats or some other similarly shed-happy fine-haired animal and never clean out the heatsink attached to your processor. High activity pushes the system into higher temperatures, system begins to overheat and shuts down.

Like they said, though, there's no realistic virus infection that can affect a reinstallation and format of Windows, because the code being run is coming directly from the (read-only) CD/DVD that you're using. You're looking at a physical problem that is almost certainly incidental to the virus infestation.

Tommy 2.0
Apr 26, 2008

My fabulous CoX shall live forever!
Thank you guys for the input. I suspected as much this was the issue, but wanted more informed input on the matter since it was coincidental with a virus infection. Would it most likely be a hard drive failure? Because the system was able to handle higher end games no problem for long periods of time.

And yes, it would power off completely. Totally, utterly, no power instantly.

Tommy 2.0 fucked around with this message at 00:42 on Jun 20, 2010

pooface
May 20, 2004
HMMM!!!
I just went to download combofix from here

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

As soon as I clicked the bleeping computer link under

"Next you should download ComboFix from one of the following URLs:"

NOD immediately said it blocked "win32/kryptik yi trojan.". Anyone think this can be a false positive?


Yesterday it blocked html/scrinject.b gen virus. I haven't had a virus prompt in a very long time. Anyone know where else to find combofix or should I be good since Nod apparently blocked it right away? I ran a full scan earlier today and it found nothing.

Ted Stevens
Jun 2, 2007

by T. Finn
When I worked on a computer that had McCrappy on it, it flagged my combofix file as some kind of trojan, too. Speaking of that, I need to download a new combofix file.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

pooface posted:

"Next you should download ComboFix from one of the following URLs:"

McAfee Enterprise routinely detects ComboFix as a trojan as well, though I don't recall right off-hand which one. When in doubt, upload to VirusTotal.com and wait a couple minutes for the results.

KillHour
Oct 28, 2007


I had an awesome idea for a virus the other day, and was wondering if anyone had seen something like it, or knew if it was even possible. It would search for known router firmwares and replace them with a modified version that has the virus embedded in it. It would then proceed to reinfect any computers you cleaned and hooked back up to the network. If done right, it would be hell on earth to discover what was really happening.

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

KillHour posted:

I had an awesome idea for a virus the other day, and was wondering if anyone had seen something like it, or knew if it was even possible. It would search for known router firmwares and replace them with a modified version that has the virus embedded in it. It would then proceed to reinfect any computers you cleaned and hooked back up to the network. If done right, it would be hell on earth to discover what was really happening.

Unless it is an unsecured network or unsecured setup page, I doubt this would be plausible. What I have seen though is where a virus sets up an adhoc network in a computers wireless control panel that broadcasts when no other network is present. What then happens is that people around the machine connect to the adhoc network and get infected or worse, the adhoc ssid is the same as ones that are legitimately used by businesses so machines that have connected to the legitimate ssid automatically connect to the malicious adhoc network absent of a real network.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

KillHour posted:

I had an awesome idea for a virus the other day, and was wondering if anyone had seen something like it, or knew if it was even possible. It would search for known router firmwares and replace them with a modified version that has the virus embedded in it. It would then proceed to reinfect any computers you cleaned and hooked back up to the network. If done right, it would be hell on earth to discover what was really happening.

You'd either have to have a modified version of every firmware version out there -- which is not plausible -- or pack around at least a subset of a Metasploit library to selectively break through the security surrounding the router's internals without triggering a denial of service condition. Any router worth its salt is going to at least make a token effort to prevent firmware or configuration changes without authentication, and it's unlikely that there's going to be a vulnerability affecting multiple vendors' router authentication mechanisms over the substantial number of firmware revisions you're likely to find in the wild even for a single given model number.

Something else you might like the sound of, though, is a virus I recall reading about a few years ago that appeared to be specialized for enterprise-level networks. Infected a host, retained that host's IP settings for reference, then sent out DHCP broadcasts indicating that the new default gateway was the infected host. Relayed the traffic to the original default gateway (iirc) and theoretically nobody was the wiser, but all enterprise traffic for that subnet now went through a compromised host.

Caveats for this story are that I wasn't aware DHCP supported partial updates of information like that, that I don't recall the details clearly, and that I haven't tried to find the article I read a few years ago.

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

Had a new (to me) one today, Security Tool. Looks like someone aping Antivirus 2009/XP using div windows instead of windows forms. The usual "you're infected with <xx> files give us $$$ to remove", however it's really egregiously in your face. The popup won't go away no matter how often you click "continue unprotected/cancel". It's got a nasty thing it'll do; close any program you open a fraction of a second after you open it. This includes cmd, anything launched from run menu, any exe run through explorer, .msi, etc. I was able to get around it by running cmd as local admin, safe mode will probably work too. Once you've done that it's pretty easy, just kill the randomly named .exe file out of processes (it was always a series of numbers for me), hijack this out the startup entries, and then delete its \documents and settings\ home temp folder. Procexp will tell you where its home folder is if you check before you kill it. Pretty sure it got in through a java exploit on the latest batch of Dells.

I was surprised it went down so easy after I killed the initial process, usually these things have a backup watcher process that will automatically re-launch the program if someone closes it. I installed Kaspersky on the machine and it stopped it when I tried to reinfect so hooray for enterprise software I guess.

EDIT-oh yeah and it hides your desktop icons and changes your background to default blue. People were freakin'. Where's my icons??? I CAN'T READ EMAILS

Scaramouche fucked around with this message at 01:41 on Jul 14, 2010

BillWh0re
Aug 6, 2001


There's a new worm going around called Stuxnet that's exploiting a Windows vulnerability that isn't yet publicly disclosed.

The worm autoruns from USB sticks even if you have autorun disabled fully. It does this by exploiting a vulnerability in the way Windows parses .lnk shortcut files. Once run, it installs a rootkit that hides the files on the USB disk so you can't tell you (or it) are infected. From looking at the vulnerability today, it isn't specific to USB drives -- all that's needed to execute the worm is that you browse to the shortcut files from explorer.

The good news is it's relatively easy for anti-virus products to detect for the .lnk files in a way that (should) stop them running if you have an on-access scanner.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

BillWh0re posted:

The worm autoruns from USB sticks even if you have autorun disabled fully. It does this by exploiting a vulnerability in the way Windows parses .lnk shortcut files. Once run, it installs a rootkit that hides the files on the USB disk so you can't tell you (or it) are infected. From looking at the vulnerability today, it isn't specific to USB drives -- all that's needed to execute the worm is that you browse to the shortcut files from explorer.

When you say "browse to", do you mean open a folder containing the malicious .lnk, or does there actually need to be some selection or clicking of the file in question?

Either way, goddamn, that's slick.

BillWh0re
Aug 6, 2001


Midelne posted:

When you say "browse to", do you mean open a folder containing the malicious .lnk, or does there actually need to be some selection or clicking of the file in question?

Either way, goddamn, that's slick.

Just open a folder. The critical thing is that explorer loads the icon.

There's a thread on Wilders here: http://www.wilderssecurity.com/showthread.php?t=276994

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

BillWh0re posted:

There's a thread on Wilders here: http://www.wilderssecurity.com/showthread.php?t=276994

That was a fun read, thanks. Any opinion on the later posts suggesting that it was custom-made for targeted industrial espionage?

BillWh0re
Aug 6, 2001


Midelne posted:

That was a fun read, thanks. Any opinion on the later posts suggesting that it was custom-made for targeted industrial espionage?

I haven't looked at the usermode part of the payload yet but I might get a chance tomorrow. Frank Boldewin is a fairly well-respected reverse engineer though it looks like he's just seen a string rip from the executable and I think it'll probably be a day or two before anyone says for sure.

I'm more interested in how they managed to sign their rootkit drivers as Realtek. Gotta be some sweet drama there. Also there's no obfuscation at all on any of the kernel modules so I'd guess this is a completely different group to those that release most of the major malware families.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

BillWh0re posted:

I'm more interested in how they managed to sign their rootkit drivers as Realtek. Gotta be some sweet drama there.

Didn't seem to be any significant consensus at this point as to whether it was a valid signature or not, but yeah, I'd certainly be interested in knowing whether Realtek's CA had been subverted somehow. If so, that's, uh, substantial.

BillWh0re
Aug 6, 2001


Midelne posted:

Didn't seem to be any significant consensus at this point as to whether it was a valid signature or not, but yeah, I'd certainly be interested in knowing whether Realtek's CA had been subverted somehow. If so, that's, uh, substantial.

Windows tells you the signature is OK if you right-click properties the file. But the timestamp on it is expired and I'm not sure if it's since been revoked.

Adbot
ADBOT LOVES YOU

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

BillWh0re posted:

Windows tells you the signature is OK if you right-click properties the file. But the timestamp on it is expired and I'm not sure if it's since been revoked.

That's actually pretty interesting in and of itself. Seems like if you were just going to copy over a monkeyed signature that you'd take the time to spruce up the timestamp.

My completely unfounded guess is that something was thrown away that didn't get wiped.

  • Locked thread