Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Three-Phase
Aug 5, 2006

by zen death robot
A long time ago I remember hearing Steve Gibson say he will only browse the world wide web in a virtual machine inside his computer. I am starting to think that's not a bad idea, and I also heard suggestions of only doing online banking via something like a Live CD on your computer.

As far as Java goes, I do have a few apps on my computer that rely on Java (unfortunately, like Art of Illusion), so I need it, but I've disabled it in my browsers.

Adbot
ADBOT LOVES YOU

Khablam
Mar 29, 2012

It's a bit paranoid, any proper sandboxing does the same effective thing without being an enormous piece of poo poo to work with. As soon as you try to make working with a VM more convenient, you bridge any supposed 'gap' in a much more real and exploitable way than sandboxed processes.

The LiveCD thing is all about having a "known clean" system to use, but outside of some very narrow scenarios you can be sure to within reasonable doubt in ways that are wholly more convenient.

bull3964
Nov 18, 2000

DO YOU HEAR THAT? THAT'S THE SOUND OF ME PATTING MYSELF ON THE BACK.


Ceros_X posted:

Someone posted instructions (earlier this thread, I think) on how to make multiple installs of Java and set up the shortcut for legacy app so that it calls on only that version. I had a screen shot but it is gone now :/

Edit - found it: http://forums.somethingawful.com/showthread.php?threadid=3031934&pagenumber=80&perpage=40#post415690600

Does this help you?

I've done something similar in the past with some stuff, but other stuff needs to launch from the browser and gets a bit finicky. It's easy to target different versions of java if you have a self contained applet (like, for example, the Cisco ASDM). Things get a little wiggy when you have an interface that's primarily HTML, but then launches applets for sub-portions of the interface. Netscaler VPX is an example of this. Most of the nav is HTML, but if you want to drill down into the settings of any item, it launches an applet. In the later example, the last time I updated java, all browsers gave a "java not installed" error when I tried to get into any of the java portions of the interface despite the fact that it was in the middle of launching java when it gave the error.

I do most of the stuff from the command line anyways so it's not a huge deal. It's just sometimes you don't feel like looking up the syntax for a particular command when you could just log in and do it in two clicks.

bull3964 fucked around with this message at 04:45 on Jan 7, 2014

omeg
Sep 3, 2012

Khablam posted:

It's a bit paranoid, any proper sandboxing does the same effective thing without being an enormous piece of poo poo to work with. As soon as you try to make working with a VM more convenient, you bridge any supposed 'gap' in a much more real and exploitable way than sandboxed processes.

There are no application sandboxes that provide true process isolation, at least on Windows x64.

Khablam
Mar 29, 2012

omeg posted:

There are no application sandboxes that provide true process isolation, at least on Windows x64.
Sure, but the attack surface is smaller and all the less common than "my guest and host are networked together because actually using files I downloaded is tedious as all holy gently caress otherwise".
In theory you can be much safer, sure, but in practice people get lazy, and you're more likely to find common-garden malware that exploits network shares than an attack against a specific sandbox technique.

omeg
Sep 3, 2012

I wonder when we'll see first malware that exploits protected processes on Windows 8 to protect itself.

Tapedump
Aug 31, 2007
College Slice
What are your guys' thoughts on CryptoPrevent (by the Author of d7)?

http://www.foolishit.com/vb6-projects/cryptoprevent/

jre
Sep 2, 2011

To the cloud ?



Just had a machine owned by the Zeus trojan. :argh: Worryingly both trend WFBS and the Kaspersky rescue boot disc I normally use failed to fully detect all the components it installed. What do people use for ensuring machines are clean? We're going to nuke the affected machine but I wanted to scan other machines on the same lan segment to make sure it's not managed to spread.

Ideally something that runs off a boot disc.

Khablam
Mar 29, 2012

Tapedump posted:

What are your guys' thoughts on CryptoPrevent (by the Author of d7)?

http://www.foolishit.com/vb6-projects/cryptoprevent/

Seems like an overly-engineered way of blocking executables from the appdata folders, which will work fine until
- A genuine program needs to execute from there (Google chrome, ironically some malware/AV update programs)
- The virus author wises up and goes for system32 or something.
Cryptolocker doesn't do anything 'clever', any antivirus with up-to-date definitions should block it effortlessly. There's probably little harm in these fixes, though.

jre posted:

Just had a machine owned by the Zeus trojan. :argh: Worryingly both trend WFBS and the Kaspersky rescue boot disc I normally use failed to fully detect all the components it installed. What do people use for ensuring machines are clean? We're going to nuke the affected machine but I wanted to scan other machines on the same lan segment to make sure it's not managed to spread.

Ideally something that runs off a boot disc.
If you have two pre-boot scans showing as clean, by AV companies that test at 95% detection or more, then you have something like a 0.25% chance of them both having missed the thing. You're likely just seeing non-active residual things left behind.

If you want to verify a machine is clean (and have some doubt) then, like above, a full scan repeated with a different AV engine can give you a very high confidence it's fine.

Tapedump
Aug 31, 2007
College Slice
Thank you for your reply, Khablam. I appreciate the insight.

Three-Phase
Aug 5, 2006

by zen death robot

omeg posted:

There are no application sandboxes that provide true process isolation, at least on Windows x64.

What would you recommend as far as browsers/utilities go to at least make it harder to target?

.

One other question (I hope this is OK to ask here since this is a discussion of viruses) - I've been hearing about Neverquest, and my understanding is that it utilizes VNC (virtual network computing) to hijack computers and even perform banking transactions as the target computer. So to a bank, the users' normal computer connects and asks to transfer funds, not some oddball computer at a different IP address. That would make it difficult to prove what is going on.

One of the things I noticed is that Neverquest utilizes VNC ports 5800-5900 to allow the malicious computer to hijack the target computer.

Would blocking those ports (preferrably at a router, not in Windows itself) effectively stop Neverquest from operating correctly? I occasionally use Remote Assistance, and I'm not sure if Microsoft uses VNC ports to do that or not.

Factory Factory
Mar 19, 2010

This is what
Arcane Velocity was like.
RDP/Remote Assistance/Terminal Services all rely on port 3389. You can safely block all of the VNC ports at the router to stop all remote VNC access without any effect on Remote Assistance. Even if RA were blocked, you can still initiate the connection yourself by sending a request using Windows Messenger.

Sane routers will already have a basic no-replies firewall setup and Network Address Translation setup, which is sufficient to block remote RDP, remote VNC, etc. on any locally-attached computer without further configuration. However, this only applies to incoming requests. If the malware affirmatively reaches out to create a connection, rather than just waiting for an incoming connection, there might still be a connection made.

In this case, you have to hope to get lucky: if you set your firewall to block VNC affirmatively for all IP addresses, then the malware attempt will fail to complete a connection, but only if it tries to use the default VNC ports. If the malware is smart enough to try an alternate set of ports, then you're boned unless you block literally all traffic into or out of your network at the router level. And if you do that, may as well pull the plug and cancel your internet service.

Your first and best line of defense is going to be avoiding the malware infection in the first place. This means good browsing habits and up-to-date security software.

Khablam
Mar 29, 2012

There exists several different highly robust ways of stopping those types of attack (IPS). Unfortunately they require incredible amounts of user input to work effectively. There's a catch-22 wherein anything comprehensive enough to give you near-100% network shielding from things making connections out, are an incredible pain in the rear end to use. Even very anal people will eventually get into a habit of mashing "accept" on the 50+ notifications they get every day, and tada, one of them wasn't legit.

Not operating on a local-admin is probably the 'sane' way to stop malware doing a whole lot of bad stuff if it gets missed by your AV scanner. A hardware firewall (effectively, any router) is a fully effective shield against all the threats that were in the wild between 2000-2005 or so, that leapt through XP SP1 and did all manner of lovely things. The advice that connecting to the internet without a software firewall is an awful idea is a bit of an anachronism now.

If you're online in coffee shops or large scale networks, then you probably want to have something making the computer treat LAN as WAN, usually Vista/Win7s network options are sufficient. You might want to pop the windows firewall on (you can set it to only work when connected to 'public' networks).

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe

Khablam posted:

Not operating on a local-admin is probably the 'sane' way to stop malware doing a whole lot of bad stuff if it gets missed by your AV scanner.

This cannot be emphasized enough. I don't work on other people's computers professionally but I taught both my parents to do this and voila no malware problems. Although my dad went full Apple for some reason so he's pretty much safe with his MBP, mac mini and iPad.

Holidays free from "why is this doing this" are always a plus.

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!
Apparently Oracle has finally decided browsers running any arbitrary code is a bad thing. Starting with the latest version of Java, all applets must be digitally signed by default. That probably makes it about as secure as ActiveX (which isn't saying much, but hey, it's something).

m2pt5
May 18, 2005

THAT GOD DAMN MOSQUITO JUST KEEPS COMING BACK

dpbjinc posted:

Apparently Oracle has finally decided browsers running any arbitrary code is a bad thing. Starting with the latest version of Java, all applets must be digitally signed by default. That probably makes it about as secure as ActiveX (which isn't saying much, but hey, it's something).

Not like that will matter much because there are loads of computers running on outdated versions of Java, either because they don't know how to update, can't update, or need an old version for some program that won't run on a newer version.

hackbunny
Jul 22, 2007

I haven't been on SA for years but the person who gave me my previous av as a joke felt guilty for doing so and decided to get me a non-shitty av
So they have pretty much given up on making Java secure. Or relevant at all

dpbjinc posted:

That probably makes it about as secure as ActiveX (which isn't saying much, but hey, it's something).

ActiveX controls have more restrictions because they are native code components. Applets are supposed to be sandboxed, they shouldn't have a signature requirement: Flash doesn't, Silverlight doesn't either, and they don't have half of the security holes Java applets have

Khablam
Mar 29, 2012

Leave the java plugin disabled. That one day six weeks later you decide you need it, turn it on.
More likely, you'll realise it's a java applet that saves you 5 clicks on an update page and can therefore never need enable it.

sfwarlock
Aug 11, 2007
I have a windows 8 laptop on my desk that i swear I must be missing something on. Ads are being injected into pages, downloads are being intercepted and modified in-transit, but malwarebytes, superantispyware, everything i can think of is coming back clean.

what. the. gently caress.

edit: I checked proxies too. also also, combofix is now running.

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!

sfwarlock posted:

Ads are being injected into pages, downloads are being intercepted and modified in-transit,

Disable all your extensions/plugins and see if it keeps happening. If so, back up, format, and reinstall.

KuNova
Oct 12, 2005
I REPORT MODERATORS BECAUSE I'M FUCKING RETARDED

sfwarlock posted:

I have a windows 8 laptop on my desk that i swear I must be missing something on. Ads are being injected into pages, downloads are being intercepted and modified in-transit, but malwarebytes, superantispyware, everything i can think of is coming back clean.

what. the. gently caress.

edit: I checked proxies too. also also, combofix is now running.

It'd be interested to know how this turns out. May i ask what browser? Considering the amount of problems your having, I'd consider a root compromise and just wipe it all and update the firmware.

Zamujasa
Oct 27, 2010



Bread Liar

sfwarlock posted:

I have a windows 8 laptop on my desk that i swear I must be missing something on. Ads are being injected into pages, downloads are being intercepted and modified in-transit, but malwarebytes, superantispyware, everything i can think of is coming back clean.

what. the. gently caress.

edit: I checked proxies too. also also, combofix is now running.

If it's happening outside of that box check the router, too, just in case it's somehow gotten stuffed with some malware (you never know).

But it honestly sounds like a lost cause. Back it up, nuke it, and reinstall.

Toast Museum
Dec 3, 2005

30% Iron Chef
Based on the computers I've seen lately, a big thing with Windows 8 is garbage software like Scorpion Saver that does nothing but serve ads, but that seems to actually go away if you uninstall it from add/remove programs, which may be why malware scanners seem reluctant to target them.

sfwarlock
Aug 11, 2007

KuNova posted:

It'd be interested to know how this turns out. May i ask what browser? Considering the amount of problems your having, I'd consider a root compromise and just wipe it all and update the firmware.

dpbjinc posted:

Disable all your extensions/plugins and see if it keeps happening. If so, back up, format, and reinstall.

Chrome, no extensions/anything active, and it all started when user had a webpage tell her she needed to update Java, just click here to download the installer.

Zamujasa posted:

If it's happening outside of that box check the router, too, just in case it's somehow gotten stuffed with some malware (you never know).

But it honestly sounds like a lost cause. Back it up, nuke it, and reinstall.

It's definitely OS-level. I had to boot to a Linux livecd (and I've bitched elsethread about the total shitstorm that is) to download the installers I want, since I don't want to plug a thumbdrive in.

I just didn't want to reinstall because I need to dig up install media and drivers and and and. At least I could use Belarc to grab the Win8 key.

sfwarlock
Aug 11, 2007

Toast Museum posted:

Based on the computers I've seen lately, a big thing with Windows 8 is garbage software like Scorpion Saver that does nothing but serve ads, but that seems to actually go away if you uninstall it from add/remove programs, which may be why malware scanners seem reluctant to target them.

It was this right here. Something called "Filterbull" or somesuch.

H1KE
May 7, 2007

Somehow, I don't think they'd approve the franchise...


sfwarlock posted:

Chrome, no extensions/anything active, and it all started when user had a webpage tell her she needed to update Java, just click here to download the installer.

Possibly this bastard from the bad ads thread in forum Q&A?


It can also show up as a Flash updater, Firefox updater and I've seen a Safari updater as well. S&D picked it up on the ones I had to remove, ADW did the rest. Now any machine that comes in with a possible infection gets an initial Norton scan via cradle, followed by local install Spybot, SuperAnti, MBAM, ADW and finished with CCleaner, then reset all browsers to default settings. If after all that it's still compromised, we wipe and reinstall. So far I've only had to flatten to one machine, and that one was so messed up, it took 13 minutes to be useable, MBAM hit 350 something objects detected and NIS reported object after object for 12 minutes nonstop as soon as it was installed.

bucketmouse
Aug 16, 2004

we con-trol the ho-ri-zon-tal
we con-trol the verrr-ti-cal
Just posting this because holy poo poo it took 4 hours to get rid of this loving thing:

If anyone runs into a chrome extension by the name of 'Instant Savings App' that shows up as managed and blocks you from uninstalling it..

1. Kill the process it keeps active and kill the scheduled task to respawn the process
2. Wipe out the registry entries for it in software/policy
3. Delete the chrome extension folder for it
4. Uninstall chrome entirely since it messes with some of its internals
5. Edit the hosts file so you don't get silently redirected to a compromised Chrome installer when you redownload it.
6. Reinstall chrome

I had to transplant the drat thing into a virtual machine with a file/registry monitor active to finally figure out how to get rid of it. Submitted it to a bunch of the antivirus sites too, gently caress this stupid thing.

Khablam
Mar 29, 2012

If it helps anyone else, Adwcleaner does a good job of cleaning up after those extension-based malware threats.

Lasernuts
Feb 17, 2014
The most annoying virus to me would be the "FBI Virus" . The variant i ran into prevented access to safe mode and required me to use a BlacX on a separate machine and had to use TDSS Killer to just get into safe mode- then had to combofix and TDSS Killer again to get into normal windows, and redid the whole process with a standard virus scan at end to fully remove it.

Biggest pain in the rear end I have ever had to deal with :rolleyes:

Siochain
May 24, 2005

"can they get rid of any humans who are fans of shitheads like Kanye West, 50 Cent, or any other piece of crap "artist" who thinks they're all that?

And also get rid of anyone who has posted retarded shit on the internet."


Lasernuts posted:

The most annoying virus to me would be the "FBI Virus" . The variant i ran into prevented access to safe mode and required me to use a BlacX on a separate machine and had to use TDSS Killer to just get into safe mode- then had to combofix and TDSS Killer again to get into normal windows, and redid the whole process with a standard virus scan at end to fully remove it.

Biggest pain in the rear end I have ever had to deal with :rolleyes:

Those ones are "backup crucial data, flatten with extreme prejudice" ones for me. Some of that poo poo is just so persistent, I'm never comfortable that I've fully removed it.

asciidic
Aug 19, 2005

lord of the valves


I just boot from a WinPE disk and use Autoruns to remove it from startup, then manually delete the files. Virus scan afterwards for good measure. I haven't seen a variation yet that I couldn't remove this way.

Khablam
Mar 29, 2012

Yeah, they're about the easiest to remove. Rarely if ever are they stronger than a startup entry.

The one that's actually got the minimum fix time of "Hope your backup is recent and restore everything" is cryptolocker and it's variants.

hackbunny
Jul 22, 2007

I haven't been on SA for years but the person who gave me my previous av as a joke felt guilty for doing so and decided to get me a non-shitty av
So an old friend of mine (among others) uncovered a surveillance network of dubious ethics created (among others) by old friends of mine. Future hack meets in Italy will be even more awkward than Christmas dinner

e: Here's the analysis

hackbunny fucked around with this message at 11:15 on Feb 18, 2014

Ignoarints
Nov 26, 2010
I agreed to help remove some kind of what sounds like malware from a coworkers computer tonight, he is clueless about what it could be or where he got it from. I used to do that pretty often like 6 years ago but I can't remember the freeware I was happy with anymore and I'm sure things have changed. All I remember is rkill was very useful back then.

Is there a kind of catch-all list of stuff to try on this? I'm assuming it's not the only thing on there.

KuNova
Oct 12, 2005
I REPORT MODERATORS BECAUSE I'M FUCKING RETARDED

Ignoarints posted:

I agreed to help remove some kind of what sounds like malware from a coworkers computer tonight, he is clueless about what it could be or where he got it from. I used to do that pretty often like 6 years ago but I can't remember the freeware I was happy with anymore and I'm sure things have changed. All I remember is rkill was very useful back then.

Is there a kind of catch-all list of stuff to try on this? I'm assuming it's not the only thing on there.

I'd be interested in such a list.

H1KE
May 7, 2007

Somehow, I don't think they'd approve the franchise...


I'm sure there will be other opinions, but after dealing with this on a day to day basis, my super list consists of:

Spybot S&D - http://www.safer-networking.org/mirrors16/
SuperAntiSpyware - http://www.superantispyware.com/
MalwareBytes - https://www.malwarebytes.org/
RKill - http://www.bleepingcomputer.com/download/rkill/
TDSS - http://www.bleepingcomputer.com/download/tdsskiller/
ADW Cleaner - http://www.bleepingcomputer.com/download/adwcleaner/
Hitman Pro - http://www.surfright.nl/en

Spybot 2 is a little confusing to use I've found, since they hosed with the UI and made a mess of it. 1.6 still works fine, and is quicker / easier to use so I've linked to that. Just install and run one after the other, check and disable any weird browser addons / search engines, and that should get rid of 99.9% of infections. :)

E: While I'm here, someone mentioned the FBI lockout [U.Kash] earlier. We had a rash of mutations coming in, but all with the same U.Kash base code. If you don't have access to a USB dock / second machine to stick the infected drive in, try putting MBAM / Spybot on a thumbdrive, enter safe mode with command prompt, and run either from the command window off the thumbdrive. Some variants will lock you out before you can get the prompt up, but I've had good success doing it this way when I didn't have any other option handy.

H1KE fucked around with this message at 02:16 on Feb 19, 2014

tadashi
Feb 20, 2006

I'm trying to find a solid enterprise malware solution but it doesn't have to include anti-virus as we are still having success with Symatec corporate AV as far as finding viruses and notifying us when it does. Does anybody have any recommendations? It looks like Malwarebytes and Webroot enterprise are the two big names but I was curious if anybody is using something else?

dox
Mar 4, 2006
Combofix and DelProf2 (to delete unused profiles) should be added to the list above, as well. CCleaner and Eusing Registry Cleaner will also help out. Your list and those four basically round out my "clean everything aside from a format" routine.

E4C85D38
Feb 7, 2010

Doesn't that thing only
hold six rounds...?

dox posted:

Combofix and DelProf2 (to delete unused profiles) should be added to the list above, as well. CCleaner and Eusing Registry Cleaner will also help out. Your list and those four basically round out my "clean everything aside from a format" routine.

What does Combofix even do? It appears to be nearly completely undocumented, and everything says "only use at the direction of a properly trained helper" or something.

fakeedit: oh, it's undocumented to prevent malware authors fighting whatever it does. That seems... dicey.

Adbot
ADBOT LOVES YOU

Alkanos
Jul 20, 2009

Ia! Ia! Cthulhu Fht-YAWN

dox posted:

Combofix and DelProf2 (to delete unused profiles) should be added to the list above, as well. CCleaner and Eusing Registry Cleaner will also help out. Your list and those four basically round out my "clean everything aside from a format" routine.

Combofix I treat as a last resort option, something to try before wiping the system. 90% of the time it fixes things without issue, but the other 10% of the time it does stuff that makes things quite annoying. For example, completely uninstalling a browser along with all of its bookmarks, cookies, and saved logins. While that stuff's pretty easy to recover from if you know what you're doing, if I'm fixing a computer for someone else they can get pretty pissed off when you explain that it's all gone. (Even if it's their own fault for not keeping track of their passwords.)

  • Locked thread