Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
equation groupie
Feb 7, 2004

debased and dread pilled

JustFrakkingDoIt posted:

I use Comodo's free firewall. It works pretty well, gets good ratings from various security sites (or it did) but I've been told it's pretty dumb/overkill and Window's firewall + the one in your router is fine.

I'm pretty ignorant on the importance of firewalls for personal use though. I just like going on port scanner sites and seeing that my computer is totally stealthed. :c00lbert:

If you have a NAT device (and aren't forwarding ports 0-65535, obviously), then you are confused as to what effect your Windows firewall is having on those scans.

Adbot
ADBOT LOVES YOU

spasticColon
Sep 22, 2004

In loving memory of Donald Pleasance
I almost got hit twice on my desktop and a few times on my laptop with that fake AVG bullshit...while just browsing the SA Forums! I just had to hurry and close down firefox and log off my account. Is there a way to prevent this from happening? I'm running MSE on both machines and it comes up clear on both machines. My desktop runs Win7 Home Premium x64 and my laptop runs the x86 version.

Maniaman
Mar 3, 2006
Update flash and java, enable DEP and SEHOP.

spasticColon
Sep 22, 2004

In loving memory of Donald Pleasance

Maniaman posted:

Update flash and java, enable DEP and SEHOP.

I did all of this on my laptop just now and almost got hit again. On the SH/SC forum no less. Got that AVG popup again and it tried to get on my laptop again. I may just put Linux back on my laptop so I don't have to deal with this bullshit.

Kelson
Jan 23, 2005

Daynab posted:

I've decided to give it a try since hey, it's free, and it was amongst the top 3 pretty much everywhere. Seem's cool so far, thanks!

I guess.. content.. I rarely every get viruses these days but I got one of them annoying toolbar-installing and online search setting changers, which is partly why I want a firewall now. It wasn't exactly a virus, more like bloatware I guess, cause none of NOD32, malwarebytes or spybot detected anything even when I pointed them right at it.
Personal firewalls won't protect you from those. They serve primarily to make sure folks outside your computer can't poke your system for vulnerabilities, but the vast majority of attackers these days drop content exploits on websites which folks themselves go to (like SA's banner ads). Firewalls can also prevent outbound traffic on odd ports, but the vast majority of attackers use common ports for outbound to avoid such risks (80, 443, email ports, etc).

As far as avoiding personal exploitation; run an anti-virus for the old stuff (MSE works great), patch regularly, use noscript while browsing, and enable all the anti-exploit security settings in windows (DEP, SEHOP, ASLR, etc).

NOTinuyasha
Oct 17, 2006

 
The Great Twist

spasticColon posted:

I almost got hit twice on my desktop and a few times on my laptop with that fake AVG bullshit...while just browsing the SA Forums! I just had to hurry and close down firefox and log off my account. Is there a way to prevent this from happening? I'm running MSE on both machines and it comes up clear on both machines. My desktop runs Win7 Home Premium x64 and my laptop runs the x86 version.

I never really understood how the forums manage to gently caress up school computers so quickly and consistently, then again goons :negative:

Wiggly
Aug 26, 2000

Number one on the ice, number one in my heart
Fun Shoe

spasticColon posted:

Is there a way to prevent this from happening?

Buy No-Ads. :smugbert:

Daynab
Aug 5, 2008

Kelson posted:

Personal firewalls won't protect you from those. They serve primarily to make sure folks outside your computer can't poke your system for vulnerabilities, but the vast majority of attackers these days drop content exploits on websites which folks themselves go to (like SA's banner ads). Firewalls can also prevent outbound traffic on odd ports, but the vast majority of attackers use common ports for outbound to avoid such risks (80, 443, email ports, etc).

As far as avoiding personal exploitation; run an anti-virus for the old stuff (MSE works great), patch regularly, use noscript while browsing, and enable all the anti-exploit security settings in windows (DEP, SEHOP, ASLR, etc).

Thanks for the advice, that's what I already do for the most part. I was just under the impression though that if a program was trying to access the internet and modify settings when it's not even supposed to go online, it would detect it.

Kelson
Jan 23, 2005

Daynab posted:

Thanks for the advice, that's what I already do for the most part. I was just under the impression though that if a program was trying to access the internet and modify settings when it's not even supposed to go online, it would detect it.
That can be true for certain firewall products and certain trojans. Unfortunately, the toolbar you cited likely accesses the Internet literally using your browser, so it'll bypass your firewall as well (or you'll do the Egyptian). In general, things like firewalls work best for preventing remote hosts from popping your box. They don't do a very good job stopping stuff inside your system from getting out (unless it is some of that rare bad stuff which doesn't use port 80).

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock
So was this some new 0day exploit, or did people get infected due to unpatched flash/java/acrobat reader?

PopeOnARope
Jul 23, 2007

Hey! Quit touching my junk!

ymgve posted:

So was this some new 0day exploit, or did people get infected due to unpatched flash/java/acrobat reader?

Either or, with a usual spicing of stupidity. A lot of my recent calls start off with "Something on the Internet told me I have a virus" or "I clicked a link in my e-mail"

\/ Flash and java both have autoupdaters. There has to be a way to gently caress with group policy to get them to run automatically

And

\\// rkill is neat, but the problem is that it's got a pretty narrow range of process it can find. OTR is pretty awesome - it kills everything but itself.

PopeOnARope fucked around with this message at 04:53 on Feb 21, 2011

MeestarK
Aug 12, 2004
Its cold outside
Anyone know of any tools that will auto update flash/java? Seeing if there's anything out there for me to run after cleaning up a system for a customer before I look into making something myself.

coinstarpatrick
May 21, 2007

by T. Finn
In all my reading in this thread I've never seen anyone mention Rkill (I thought it was pretty well known?). This is a life saver when you are dealing with tricky malware. It kills malware processes instantly.

http://www.bleepingcomputer.com/forums/topic308364.html

Basically run it before you run MWB and SAS to insure they will run without issue, I've had great success with it.

Oddhair
Mar 21, 2004

MeestarK posted:

Anyone know of any tools that will auto update flash/java? Seeing if there's anything out there for me to run after cleaning up a system for a customer before I look into making something myself.

Not an auto-update, but Secunia PSI is free for non-commercial use and will alert you to potential security problems (sometimes non-existant ones; mine likes to inform me about previous versions of Chrome that aren't even installed (e.g. versions older than my install date for Chrome.)

I've been hit on these forums, as in I had Gmail and three SA tabs open and got the "your computer might be infected" fake pop-up. I had white-listed SA in AdBlock/Noscript but though it's still allowed in Noscript, it's blocked in AdBlock. I should probably buy no ads, since I have archives and Plat.

Bloody Antlers
Mar 27, 2010

by Jeffrey of YOSPOS
Ditto about having lots of fake AV hits from ads while browsing SA lately. I don't see why allowing flash ads is necessary..

IEatBabies
Sep 17, 2004

Oddhair posted:

Not an auto-update, but Secunia PSI is free for non-commercial use and will alert you to potential security problems (sometimes non-existant ones; mine likes to inform me about previous versions of Chrome that aren't even installed (e.g. versions older than my install date for Chrome.)

I have it disabled and never tried it, but the current version does have an option to auto-update programs.

Glass Joe
Mar 9, 2007

IEatBabies posted:

I have it disabled and never tried it, but the current version does have an option to auto-update programs.

I just upgraded, and this feature is spotty at best. I still have to do a lot of it manually.

hackedaccount
Sep 28, 2009
If you don't use Java on a regular basis, just uninstall it and then re-install it when you need it.

warning
Feb 4, 2004

ZZ Pops is all about hugs and high fives.

coinstarpatrick posted:

In all my reading in this thread I've never seen anyone mention Rkill (I thought it was pretty well known?). This is a life saver when you are dealing with tricky malware. It kills malware processes instantly.

http://www.bleepingcomputer.com/forums/topic308364.html

Basically run it before you run MWB and SAS to insure they will run without issue, I've had great success with it.

This looks awesome. I will bookmark it and report back. Thanks for sharing.

pienipple
Mar 20, 2009

That's wrong!
I was browsing the forums at work while waiting for closing time and got hit with Antivira AV. :mad: it's one of the easy ones, just ctrl-alt-del, kill process, clean up with malware bytes, remove proxy, but dammit. So annoying.

jet_dee
May 20, 2007
Blah blah blah Nationstates is cool blah blah blah

pienipple posted:

I was browsing the forums at work while waiting for closing time and got hit with Antivira AV. :mad: it's one of the easy ones, just ctrl-alt-del, kill process, clean up with malware bytes, remove proxy, but dammit. So annoying.

I admit to being a little clueless here, how the hell does this even happen? I rotate between IE, Chrome and Firefox at work but I stick to sites which are 100% SFW content, would so get fired if I was caught on the forums.

pokecapn
Oct 17, 2003

yeah, galo sengen

jet_dee posted:

I admit to being a little clueless here, how the hell does this even happen? I rotate between IE, Chrome and Firefox at work but I stick to sites which are 100% SFW content, would so get fired if I was caught on the forums.

Ad networks get tricked by unscrupulous advertisers who will run normal ads for a while before replacing them with ones that also contain a java/flash/pdf/browser exploit. If you don't keep your poo poo up to date, and sometimes even if you do but there's some currently unpatched vulnerabilities everyone knows about, you'll get hit. And as easy as it is to happen at home, it's even easier at work since updates for some of those get rolled out and you can't update the programs yourself.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

hackedaccount posted:

If you don't use Java on a regular basis, just uninstall it and then re-install it when you need it.

Or just disable the browser integration if the Java dependency is on a local program.

jet_dee
May 20, 2007
Blah blah blah Nationstates is cool blah blah blah

pokecapn posted:

Ad networks get tricked by unscrupulous advertisers who will run normal ads for a while before replacing them with ones that also contain a java/flash/pdf/browser exploit. If you don't keep your poo poo up to date, and sometimes even if you do but there's some currently unpatched vulnerabilities everyone knows about, you'll get hit. And as easy as it is to happen at home, it's even easier at work since updates for some of those get rolled out and you can't update the programs yourself.

Ah I see. My coworker just got hit with a few dozen trojans on a business trip to India, couldn't use her laptop for the majority of the duration. I think it was via a USB-stick. I recommended a new MS patch for disabling autorun on USB-devices actually but the company said IT regularly rolled out updates... I've been there six months and never been updated (do it all manually).

I've also been sent a couple of emails from here: http://www.skype-instant-downloads.com/
which purport to be Skype, providing a new version of the software for download, and stating in the email never to send your password, only to use them within Skype or this site... sneaky phishing groups :-S

Nomenklatura
Dec 4, 2002

If Canada is to survive, it can only survive in mutual respect and in love for one another.

Kelson posted:

As far as avoiding personal exploitation; run an anti-virus for the old stuff (MSE works great), patch regularly, use noscript while browsing, and enable all the anti-exploit security settings in windows (DEP, SEHOP, ASLR, etc).
So does that mean no Chrome? I use noscript with Firefox, but as far as I know there's no such beast with Chrome. (And, supposedly, Chrome is solid enough not to need it.)

I run W7 with DEP, UAC turned up to max, and keep things updated on a regular basis, but then again I was still under the circa-2010 assumption that x64 W7 wasn't rootable. Guess that's out the window. :smith:

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe

Nomenklatura posted:

So does that mean no Chrome? I use noscript with Firefox, but as far as I know there's no such beast with Chrome. (And, supposedly, Chrome is solid enough not to need it.)

I run W7 with DEP, UAC turned up to max, and keep things updated on a regular basis, but then again I was still under the circa-2010 assumption that x64 W7 wasn't rootable. Guess that's out the window. :smith:

Chrome has Adblock and a noscript equivalent (which is kind of a bitch to set up) but it also runs a lot of things in a sandbox like environment and I think Flash is going to be put in said sandbox (if it isn't out of beta already) so it's relatively secure. Someone more familiar with the current builds might clarify this.

e: and hey, if you know of a current Chrome vulnerability collect your $20k.

syscall girl fucked around with this message at 08:43 on Feb 26, 2011

Kelson
Jan 23, 2005

Nomenklatura posted:

So does that mean no Chrome? I use noscript with Firefox, but as far as I know there's no such beast with Chrome. (And, supposedly, Chrome is solid enough not to need it.)

I run W7 with DEP, UAC turned up to max, and keep things updated on a regular basis, but then again I was still under the circa-2010 assumption that x64 W7 wasn't rootable. Guess that's out the window. :smith:
I wouldn't say no Chrome, but the lack of a solid NoScript equivalent hurts. Google, to their credit, do a lot of actual parameter validation and so forth inside Chrome before it even goes to the OS. That's enabled them to dodge a couple vulnerabilities that pass through other browsers to pop the OS/user. On the other hand, the lack of a NoScript alternative allows pretty much rampant flash/js exploitation. The sandbox is nice, but they're not the only ones doing it and sufficient escape techniques bubble up to doubt its resilience long-term. x64 Win7 will keep you in the minority target space for the next year or two, which is a nice place to be at least :)

Mandatory Assembly
May 25, 2008

it's time to get juche
Lipstick Apathy
I just got a fake anti-malware while browsing SA. Called itself Win 7 Total Security 2011. I killed the process and Malwarebytes is currently scanning that system.

How can I protect my Windows box from this after I clean it?

Impotence
Nov 8, 2010
Lipstick Apathy

UncleSmoothie posted:

I just got a fake anti-malware while browsing SA. Called itself Win 7 Total Security 2011. I killed the process and Malwarebytes is currently scanning that system.

How can I protect my Windows box from this after I clean it?

Adblock, noscript, etc. Stop it from executing in the first place. EMET.

And by "clean" you mean "flatten and reinstall, along with wiping the MBR with a livecd"

PopeOnARope
Jul 23, 2007

Hey! Quit touching my junk!

UncleSmoothie posted:

I just got a fake anti-malware while browsing SA. Called itself Win 7 Total Security 2011. I killed the process and Malwarebytes is currently scanning that system.

How can I protect my Windows box from this after I clean it?

This question has been asked and answered three times on this page.

Nomenklatura
Dec 4, 2002

If Canada is to survive, it can only survive in mutual respect and in love for one another.

Biowarfare posted:

And by "clean" you mean "flatten and reinstall, along with wiping the MBR with a livecd"
This is the only option? It would seem that reinstalling every single time a dodgy ad shows up on SA would get to the point where it'd be pointless to even configure your programs, considering you're going to have them around for, like, a week max.

(And when you say "flatten and reinstall, do you mean "format"?)

angrytech
Jun 26, 2009

Nomenklatura posted:

This is the only option? It would seem that reinstalling every single time a dodgy ad shows up on SA would get to the point where it'd be pointless to even configure your programs, considering you're going to have them around for, like, a week max.

(And when you say "flatten and reinstall, do you mean "format"?)

Noscript does a whole lot to prevent the exploit from running in the first place, so you won't be getting hit nearly as much.

Nomenklatura
Dec 4, 2002

If Canada is to survive, it can only survive in mutual respect and in love for one another.

angrytech posted:

Noscript does a whole lot to prevent the exploit from running in the first place, so you won't be getting hit nearly as much.
No doubt, no doubt. I haven't run FF without noscript in ages; what concerns me more is Chrome, and the possibility of (say) some sort of JS or Java thing getting through. I've had a few things flag in MSE over the year or so that I've had this PC, but either it's during a scan of a non-active file or the active one flagging and killing them before they could do any harm.

I wouldn't have a problem with nuking windows and reinstalling, either, if the problem should come up; what concerns me is the data that is shared on the drive, as well as the data on the backup/media drive attached to it. I don't do cloud backups, as Canadian residential transfer limits make that prohibitively expensive, so any backup would be on a drive. But since theoretically any drive attached to a compromised system could become compromised, it raises the problem of having to sacrifice no small amount of difficult-to-replace personal data, media and the like, and incurring MASSIVE transfer charges in the attempt to do so.

(I'm thinking of getting an x64 W7 SP1 image just in case, but that doesn't fix the data problem.)

Again, I don't think I'm actually compromised, though I had a scare a little while ago with a website I accessed in Chrome that was clearly attempting to try some shenanigans that I nuked about as fast as human reaction time allows. Neither MSE nor Malwarebytes scans turn up anything. But if "flatten and reinstall" is the only solution to ANY sort of even possible infection, it raises a whole lot of very, very difficult questions.

(Edit: And, obviously, I use secunia, but that's as much of a convenience thing as anything else. Secunia makes updating trivial.)

Nomenklatura fucked around with this message at 02:43 on Feb 27, 2011

angrytech
Jun 26, 2009

Nomenklatura posted:

stuff

Ok man, seriously: run Ubuntu/Mint at home. That + NoScript will stop your worries.
(I'm assuming that this is your personal machine, disregard otherwise.)

Kelson
Jan 23, 2005

angrytech posted:

Ok man, seriously: run Ubuntu/Mint at home. That + NoScript will stop your worries.
(I'm assuming that this is your personal machine, disregard otherwise.)
OpenBSD with wget.

Atltais
May 21, 2004
And there was much rejoicing.

Kelson posted:

OpenBSD with wget.

GNU/Linux with wget. Eat something off of your foot and you've become RMS.

sfwarlock
Aug 11, 2007

angrytech posted:

Ok man, seriously: run Ubuntu/Mint at home. That + NoScript will stop your worries.
(I'm assuming that this is your personal machine, disregard otherwise.)

In a virtual machine if you have to.

Brian Fellows
May 29, 2003
I'm Brian Fellows
I've scanned the last couple of pages and didn't see anyone with my specific symptoms.

I get an Open File- Security Warning dialogue that says it's trying to startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\New Text Document.exe .

I certainly don't have a New Text Document setup as a startup program... Obviously I tell it to cancel instead of running.

I ran MSE and had a few Java exploits that it claims to have cleaned up. But I still get the startup issue. Anyone know what the gently caress?

Impotence
Nov 8, 2010
Lipstick Apathy
drop new text document.exe in a password-protected rar, upload and i'll take a look at it

You can also upload the exe on virustotal, anubis.iseclab.org, or google its md5sum to see what comes up

Impotence fucked around with this message at 01:56 on Feb 28, 2011

Adbot
ADBOT LOVES YOU

Knight007au
May 8, 2007
Today my copy of AVG 2011 picked up new text document.exe as a virus along with JUSCHED.EXE and a few registry entries pointing to thoses files. They both seemed to be related to one of those fake anti-virus things.

It's proably being told to startup in the registry.

  • Locked thread