Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
m2pt5
May 18, 2005

THAT GOD DAMN MOSQUITO JUST KEEPS COMING BACK

mindphlux posted:

http://www.com????

I believe repeating was referring to System File Checker.

Adbot
ADBOT LOVES YOU

Maniaman
Mar 3, 2006
System File Checker/SFC found no integrity violations.

Interestingly enough, the problem fixed itself when Windows Update installed Windows 7 SP1.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Finally ran across someone who was targeted by one of those cold call "Tech support" calls. I face palmed when the help desk contacted me but then something miraculous happened. The user DIDN'T let the person into their machine and actually hung up on them AFTER writing down the number they called from. Apparently they were watching the news the night before and it had run a story on this exact scam so they were aware enough to know that the person calling was full of poo poo. It made me so drat happy I almost shed a single tear/thought about ordering a medal to send them.

repeating
Nov 14, 2005

m2pt5 posted:

I believe repeating was referring to System File Checker.

Correct. My bad.


On the subject of the tech support cold calls, I've had people having them from "Norton", "Microsoft", and "HP" so far. The "Microsoft" rep told the customer they were calling because system errors were detected, and directed them to Event Viewer. They showed them all the scary yellow Warnings and red Errors and told them their computer was basically dying and wanted $400 for a yearly plan.

This is why I immediately hide the column with the icons if I'm ever in Event Viewer while remoted into a computer that a user is looking at.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Been seeing a lot of ZeuS activity pick up in my neck of the woods lately, 4th one i've had to remove in 2 days. They're also very conscious about how often they need to repack as well none of the major AV vendors have detected these Zbot executables when passing them through virus total.

Naramyth
Jan 22, 2009

Australia cares about cunts. Including this one.
Watch out for your android users who know enough to be dangerous

http://arstechnica.com/gadgets/news/2012/05/android-users-targeted-for-the-first-time-in-drive-by-download-attacks.ars

lunar detritus
May 6, 2009


What are the best tools for cleaning a computer in 2012?
I remember SUPERAntiSpyware was excellent many years ago, is that still true?

Dilbert As FUCK
Sep 8, 2007

by Cowcaster
Pillbug

gmq posted:

What are the best tools for cleaning a computer in 2012?
I remember SUPERAntiSpyware was excellent many years ago, is that still true?

I go Combofix=>SAS=>TDSSKiller
Then CCleaner Temp and Registry

Avalanche
Feb 2, 2007
Just got hit with the fake antivirus Trojan through a loving SA banner ad. MSE picked it up and removed it. It calls itself: Rogue:JS/FakePAV
I'm running windows 8 too with IE10...

Gonna reboot and do a full scan. Hopefully it wont reappear somewhere else. Not that it matters since this PC is getting a full format once the new win 8 build is released.

pokecapn
Oct 17, 2003

yeah, galo sengen

Avalanche posted:

Just got hit with the fake antivirus Trojan through a loving SA banner ad. MSE picked it up and removed it. It calls itself: Rogue:JS/FakePAV
I'm running windows 8 too with IE10...

Gonna reboot and do a full scan. Hopefully it wont reappear somewhere else. Not that it matters since this PC is getting a full format once the new win 8 build is released.

You didn't actually download any virus, the real virus would have been the executable that page would have recommended you download and run.

Dante
Feb 8, 2003

So I got hit with smarthdd on my work computer somehow (ads :argh:), is there a set protocol on how to remove this thing? I've scanned the past pages of this thread and googled around but there's roughly a million different recommendations using as many different programs and people keep complaining that it pops back up.

Bokito
Jul 25, 2007
Going Ape
I always use BleepingComputer.com:

http://www.bleepingcomputer.com/virus-removal/remove-smart-hdd

Dilbert As FUCK
Sep 8, 2007

by Cowcaster
Pillbug
if you use avira in the workplace delay the patch
http://www.maximumpc.com/article/news/bad_avira_antivirus_update_brings_windows_pcs_stand_still

otherwise have fun fixing everything tomorrow

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
http://labs.bitdefender.com/2012/05/no-more-root-kit-in-zeroaccess/

I'd like to think this is a good thing, but the negative side of me wants to believe it is because they're revising the component while just operating without the rootkit for a bit :(

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
http://www.securelist.com/en/blog?weblogid=208193522

Looks like the AV vendors are going buck wild over the latest "cyber attack" malware package that has been discovered although they're dating its first signs of infection going back as far as 2010. It is neat but they really fire up the hype on this stuff every time it happens. Still kind of unique in regards to how much functionality it has. 20 different plugins and the payload seems to be different from target to target. Guessing the higher profile or sought after target gets the additional programs deployed to them compared to your average user that got it installed on their home PC.

Dogen
May 5, 2002

Bury my body down by the highwayside, so that my old evil spirit can get a Greyhound bus and ride
I had a run-in with System Fortress 2012 yesterday that was odd. It seems like when I got malwarebytes up and running using chameleon, the virus just uninstalled itself or something, because malwarebytes claimed not to pick up anything. The virus was gone, though, just leaving behind some trace crap like a start button icon. Mysterious. I guess it would make sense as a "poo poo I've been beaten don't analyze me" kind of thing, but I've never seen that behavior before, although admittedly I don't do a lot of virus removal these days.

Sab669
Sep 24, 2009

Hex Darkstar posted:

http://www.securelist.com/en/blog?weblogid=208193522

Looks like the AV vendors are going buck wild over the latest "cyber attack" malware package that has been discovered although they're dating its first signs of infection going back as far as 2010. It is neat but they really fire up the hype on this stuff every time it happens. Still kind of unique in regards to how much functionality it has. 20 different plugins and the payload seems to be different from target to target. Guessing the higher profile or sought after target gets the additional programs deployed to them compared to your average user that got it installed on their home PC.

We actually just had a brief discussion about Flame here at work, and I dunno, maybe it's just ignorance but I don't get what's so impressive about it. Screenshots and a keylogger? NO WAY!!

I guess the fact that it can turn on a microphone and transmit audio is kind of impressive, but people can turn on webcams and do the same with video so I didn't think anything of it.

What's really the significance, here?

edit; I forgot it can attack blutooth devices- that was actually pretty cool.

Sab669 fucked around with this message at 15:28 on May 30, 2012

Independence
Jul 12, 2006

The Wriggler

Sab669 posted:

We actually just had a brief discussion about Flame here at work, and I dunno, maybe it's just ignorance but I don't get what's so impressive about it. Screenshots and a keylogger? NO WAY!!

I guess the fact that it can turn on a microphone and transmit audio is kind of impressive, but people can turn on webcams and do the same with video so I didn't think anything of it.

What's really the significance, here?

edit; I forgot it can attack blutooth devices- that was actually pretty cool.

You can swap parts that you need in and out of the virus and it uses encryption. It's pretty sophisticated in that it can be tailored on the fly.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
That kind of functionality isn't new though, ZeroAccess and ZeuS/Spyeye all have module based components that can be added or removed on the fly. There's a few others as well, I believe TDL3 or TDL4 went to a modular system where it could be upgraded/downgraded in terms of functionality from the C&C servers to the infected endpoints.


http://www.scmagazineuk.com/united-nations-to-issue-warning-on-flame/article/243329/

United Nations is issuing an advisory regarding Flame :psyduck:

Hex Darkstar fucked around with this message at 21:22 on May 30, 2012

fatjoint
Sep 28, 2005
Fatjoint
The difference in this one is the use of the LUA script AND the level of sophistication. It's like finding a terrorist bomb, but when you go to defuse it it's built completely differently than you've encountered previously.

It says there's someone new out there trying to manufacture a very modular virus, very sophisticated virus - a weaponized virus.


http://www.networkworld.com/news/2012/053012-flame-malware-all-you-need-259713.html?hpg1=bn

fatjoint fucked around with this message at 21:49 on May 30, 2012

fatjoint
Sep 28, 2005
Fatjoint
Can one of you guys who deals with a lot of nasty stuff post a comprehensive "This is my tool set" post?

I know this is sad, but after I moved to server operations in IT land several years ago, I haven't had to deal with a single virus issue since - and since I'm so out of date - if something were to happen at work, a server actually becomes infected, I feel afraid that I wouldn't be able to deal with it...


Thanks,

angrytech
Jun 26, 2009

fatjoint posted:

I feel afraid that I wouldn't be able to deal with it...


Thanks,

If a server is infected, anything short of flatten/reinstall is asking for trouble.

Dyscrasia
Jun 23, 2003
Give Me Hamms Premium Draft or Give Me DEATH!!!!

angrytech posted:

If a server is infected, anything short of flatten/reinstall is asking for trouble.

Heck, if its worse than just the user account being infected ie the virus does not run when you log in as the admin, I just reinstall anyway. My reimaging process is quicker than dicking around fixing the virus. Of course with remote stuff, its not so easy.

Gothmog1065
May 14, 2009
I figured this would be the best place to ask, but a co worker sent this link to our entire department. Sorry it's the mobile version, but that's what he gave.

This sounds like Conficker in a way, but is this bullshit? The logistics of it just don't seem possible.

angrytech
Jun 26, 2009

Gothmog1065 posted:

I figured this would be the best place to ask, but a co worker sent this link to our entire department. Sorry it's the mobile version, but that's what he gave.

This sounds like Conficker in a way, but is this bullshit? The logistics of it just don't seem possible.

No it's legit. It's the DNSChanger virus.

vx15i
Feb 9, 2003
Is what bullshit? DNS changer is a trojan.

Gothmog1065
May 14, 2009

angrytech posted:

No it's legit. It's the DNSChanger virus.

Thanks, got a google hit with the FBI website. Trying to figure out impact and stuff from work since the guy who gave the link gave nothing else.

mindphlux
Jan 8, 2004

by R. Guyovich

fatjoint posted:

Can one of you guys who deals with a lot of nasty stuff post a comprehensive "This is my tool set" post?

I know this is sad, but after I moved to server operations in IT land several years ago, I haven't had to deal with a single virus issue since - and since I'm so out of date - if something were to happen at work, a server actually becomes infected, I feel afraid that I wouldn't be able to deal with it...


Thanks,

this isn't comprehensive, but my standard attack vector is boot safe mode then

rkill -> fixTDSS/TDSSkiller -> combofix -> MBAM

if I run into anything major combofix can't handle, I'll research and bring out virus-specific tools, or if it's horrible usually recommend just flattening the system, since it works out to be more cost effective for clients.

would love to hear other people's attack plans though, since this is just what has been working for me, and by no means definitive.

MeruFM
Jul 27, 2010
I feel like the scarier part of Flame isn't so much that it's so complex and dangerous, but that it's obviously made by a professional team. SQL for storage, managed library use, script language with C extensions, and extremely modular.
Not to mention it seems like a pretty targeted virus.

It would be interesting to see how this kind of code stacks up to the hacker style which is enigmatic to me.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
http://www.foxnews.com/scitech/2012/05/30/powerful-flame-cyberweapon-tied-to-powerfully-angry-birds/

And now for something completely hilarious. Yes the title specifically states "Powerful ‘Flame’ cyberweapon tied to popular Angry Birds game" their reason? Both use LUA scripting. poo poo I guess Blizzard is in bed with them too since their UI mods use LUA too oh god i've been supporting cyber warfare!

m2pt5
May 18, 2005

THAT GOD DAMN MOSQUITO JUST KEEPS COMING BACK

Hex Darkstar posted:

http://www.foxnews.com/scitech/2012/05/30/powerful-flame-cyberweapon-tied-to-powerfully-angry-birds/

And now for something completely hilarious. Yes the title specifically states "Powerful ‘Flame’ cyberweapon tied to popular Angry Birds game" their reason? Both use LUA scripting. poo poo I guess Blizzard is in bed with them too since their UI mods use LUA too oh god i've been supporting cyber warfare!

Garry's Mod uses Lua heavily as well. (It's not an abbreviation, all-caps is wrong.)

I don't think much can properly be said about this article outside of ":foxnews: :lol:".

Hex Darkstar
May 28, 2004

I think I need another liver transplant.

m2pt5 posted:

(It's not an abbreviation, all-caps is wrong.)


:doh: whoops!

Yea everyone at the office seems to be getting a laugh out of that article plenty of "Well it is fox news what else would they publish? Something with merit or legitimate facts? Nah"

bbcisdabomb
Jan 15, 2008

SHEESH

Hex Darkstar posted:

powerful-flame-cyberweapon-tied-to-powerfully-angry-birds


I was really suprised when this went to Fox News instead of The Onion.

lunar detritus
May 6, 2009


Goddamnit, I got infected by "Security Shield" and I have no idea how it happened. First virus in years. :argh:

And apparently now I'm infected by Zeroaccess. :argh:

Hex Darkstar
May 28, 2004

I think I need another liver transplant.

bbcisdabomb posted:

I was really suprised when this went to Fox News instead of The Onion.

I didn't even notice that, not just angry birds but powerfully angry birds

gmq posted:

Goddamnit, I got infected by "Security Shield" and I have no idea how it happened. First virus in years. :argh:

And apparently now I'm infected by Zeroaccess. :argh:


Thankfully ZeroAccess is being distributed without the rootkit component so it is a bit easier to disinfect a machine. I think Malwarebytes is able to do it with just a single quick scan so that might be worth tossing on the machine to do the cleanup then just uninstall it when done. TDSSKiller seems to fail at detecting and cleaning the usermode infection (what is currently being distributed) so it isn't really worth running.

Chances are if you enable hidden/system files on your machine and go to C:\Windows\installer you'll see a hidden folder in there named {<random CLSID here>}, it won't be the only one with that naming convention but it should be one of few folders in that location that have the hidden/system attribute set. If ya open it up and see a folder named U and a file named "n" you've found where it is lurking. It may also throw itself into %userprofile%\AppData\Local\{<same CLSID as other>}

Hex Darkstar fucked around with this message at 22:36 on Jun 5, 2012

jimmsta
Oct 24, 2004

Shedding bell-end tears in the pocket of her resistance.
Grimey Drawer

Hex Darkstar posted:

I didn't even notice that, not just angry birds but powerfully angry birds



Thankfully ZeroAccess is being distributed without the rootkit component so it is a bit easier to disinfect a machine. I think Malwarebytes is able to do it with just a single quick scan so that might be worth tossing on the machine to do the cleanup then just uninstall it when done. TDSSKiller seems to fail at detecting and cleaning the usermode infection (what is currently being distributed) so it isn't really worth running.

Chances are if you enable hidden/system files on your machine and go to C:\Windows\installer you'll see a hidden folder in there named {<random CLSID here>}, it won't be the only one with that naming convention but it should be one of few folders in that location that have the hidden/system attribute set. If ya open it up and see a folder named U and a file named "n" you've found where it is lurking. It may also throw itself into %userprofile%\AppData\Local\{<same CLSID as other>}

Oh cool, you ran into the same variant as I did last week. I ended up using universal virus sniffer from http://dsrt.dyndns.org to eradicate it. That's one of my favorite tools for this sort of malware removal.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Yea i'm not sure if they ran into complications with the rootkit component of it but for at least the past 3+ weeks it has changed its distribution method to include only the user mode infection even on admin privileged accounts.

Not sure if that is because they're overhauling the component to be more compatible within x64 environments it had support but it was super easy to get rid of since it almost always relied on the same named DLL Each time (C:\Windows\System32\Consrv.dll) so that was almost a universal sign that the machine has been bad touched by ZeroAccess. I don't think it is for that reason mostly because the 32bit version is also only releasing the user mode component rather than the full blow rootkit so I guess we'll just wait and see.

lunar detritus
May 6, 2009


Malwarebytes worked after a couple of reboots (for some reason it keep detecting the same stuff after deleting/rebooting), thanks. It did screw with Windows Firewall though, it doesn't allow me to start its service. Same for MSE.

I was able to reinstall MSE but I have been unable to fix the firewall thing.

EDIT: I was able to fix it, apparently it was a permissions issue. :iiam:

Maybe what else it hosed up, the situation doesn't fill me with confidence. And I still have no idea how I got infected, I don't remember downloading anything weird lately.

lunar detritus fucked around with this message at 01:57 on Jun 6, 2012

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Might not have been something you downloaded, when was the last time you updated java, flash and acrobat? A lot of this poo poo spreads by drive by download through malicious ads. ZeroAccess did spread as cracks/other poo poo on random download sites though so that is another easy way of getting it. Crack for random program is modified to contain dropper for ZeroAccess and then bam that's all she wrote.

Older versions of ZeroAccess used to target known security programs and reset the NTFS permissions of the files to nothing/everyone and remove the "System" user from it so that it could not start as a system service. It might be doing the same again in newer versions.

I've also found instances where the malware that dropped it also made modifications to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" it will add the name of the executable (mcshield.exe, MsMpEng.exe, mbamservice.exe etc..) to there and set its own executable as a debugger for that program. Whenever you try to execute it the program will then disallow you from running those applications. This also breaks poo poo if you remove the malware because the debugger is no longer there and then it just won't let you open the file so either way until the key is removed that program is useless. Very annoying because it sometimes adds regedit as one of them so you usually have to dick around with renaming it or using an alternate program to first remove regedit.exe's entry and then proceed to clean up after that.

Adbot
ADBOT LOVES YOU

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

It's not the case any longer but knowing about regedt32 saved my bacon a couple of times with that.

  • Locked thread