Actually, I'm surprised that scumware writers haven't done this before.
But I like the idea of public castration and bleed out for the writers.
Seems just.

 

Bill Lambert

Concuity

Phone  847-941-9206

 

The information contained in this e-mail message, including any attached
files, is intended only for the personal and confidential use of the
recipient(s) named above. If you are not the intended recipient (or
authorized to receive information for the recipient) you are hereby
notified that you have received this communication in error and that any
review, dissemination, distribution, or copying of this message is
strictly prohibited. If you have received this communication in error,
please contact the sender by reply email and delete all copies of this
message.  Thank you.

 

From: Erik Goldoff [mailto:[email protected]] 
Sent: Friday, December 04, 2009 8:54 AM
To: NT System Admin Issues
Subject: RE: New virus trick

 

saw a similar mechanism used to reinfect qakbot systems, scheduled task
was on a 4 day timer.

 


Erik Goldoff


IT  Consultant

Systems, Networks, & Security 

 

 

________________________________

From: John Aldrich [mailto:[email protected]] 
Sent: Friday, December 04, 2009 9:39 AM
To: NT System Admin Issues
Subject: New virus trick

I was at a seminar yesterday put on by Sunbelt and during a break I had
a chance to talk to one of the presenters and told him of a recent
malware incident I'd cleaned up. He'd never heard of such a trick before
so I thought I'd bring it to y'all's attention so you can be on the
lookout for it. Basically it was the same old malware that's been going
around with the Antivirus Pro sort of stuff, but the twist was that even
using Malware Bytes we were not able to get rid of it. After I was
poking around a bit, (I don't recall why I was looking at the root of
C:, but I was) I noticed a batch file in the root of the C: drive that,
when I opened it and looked at it, it created a bunch of scheduled tasks
to re-download the malware/adware. I wised up and deleted that file,
then went into the Scheduled Tasks and deleted all the malware-created
scheduled tasks. Then I was able to successfully clean the stuff out!

What really got us was that Malware Bytes would clean it, then say it
needed to reboot to finish, and then as soon as we came back, the fake
antivirus was right back there. What I believe it was doing was
re-downloading itself from the internet each time we cleaned it. So,
anyway, if you guys ever have a problem like this, it wouldn't hurt to
check the scheduled tasks!

 

  

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<image001.jpg>>

<<image002.jpg>>

Reply via email to