I think admins should be able to flog them with old hard drives bolted to 
chains till they are rendered useless (the hard drive that is - I don't care 
about the malware programmers!)

John W. Cook
Systems Administrator
Partnership For Strong Families
315 SE 2nd Ave
Gainesville, Fl 32601
Office (352) 393-2741 x320
Cell     (352) 215-6944
Fax     (352) 393-2746
MCSE, MCTS, MCP+I, A+, N+, VSP4, VTSP4

From: Mike Sullivan [mailto:[email protected]]
Sent: Friday, December 04, 2009 9:46 AM
To: NT System Admin Issues
Subject: Re: New virus trick

Man, these malware creators are evil! I vote we bring back public hangings!

On Fri, Dec 4, 2009 at 6:39 AM, John Aldrich 
<[email protected]<mailto:[email protected]>> wrote:
I was at a seminar yesterday put on by Sunbelt and during a break I had a 
chance to talk to one of the presenters and told him of a recent malware 
incident I'd cleaned up. He'd never heard of such a trick before so I thought 
I'd bring it to y'all's attention so you can be on the lookout for it. 
Basically it was the same old malware that's been going around with the 
Antivirus Pro sort of stuff, but the twist was that even using Malware Bytes we 
were not able to get rid of it. After I was poking around a bit, (I don't 
recall why I was looking at the root of C:, but I was) I noticed a batch file 
in the root of the C: drive that, when I opened it and looked at it, it created 
a bunch of scheduled tasks to re-download the malware/adware. I wised up and 
deleted that file, then went into the Scheduled Tasks and deleted all the 
malware-created scheduled tasks. Then I was able to successfully clean the 
stuff out!
What really got us was that Malware Bytes would clean it, then say it needed to 
reboot to finish, and then as soon as we came back, the fake antivirus was 
right back there. What I believe it was doing was re-downloading itself from 
the internet each time we cleaned it. So, anyway, if you guys ever have a 
problem like this, it wouldn't hurt to check the scheduled tasks!

[cid:[email protected]][cid:[email protected]]








--
Mike Sullivan
[email protected]<mailto:[email protected]>





________________________________
CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you really need 
to.

This email and any attached files are confidential and intended solely for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute, copy or alter this email. Any views or opinions expressed in this 
email are those of the author and do not represent those of the company. 
Warning: Although precautions have been taken to make sure no viruses are 
present in this email, the company cannot accept responsibility for any loss or 
damage that arise from the use of this email or attachments.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<inline: image001.jpg>>

<<inline: image002.jpg>>

Reply via email to