What have you been using to remove the malware ? The support team here have
been dealing wit increased occurrences more frequently, even with the
machines being patched and the logged on users having the bare minmum of
permissions. I don't have any whitelisting software or any GPO's that lock
down specific folders yet....I wondered if this was even viable considering
applications reliance on APPDATA.




On Wed, Jul 13, 2011 at 2:28 PM, Micheal Espinola Jr <
[email protected]> wrote:

> To be addressed at a later date, yes.  ;-)
>
> --
> Espi
>
>
>
>
>
> On Wed, Jul 13, 2011 at 11:09 AM, Erik Goldoff <[email protected]> wrote:
>
>> and as to "Maybe I'm nuts." , isn't that a separate issue ??? <grin>
>>
>>
>> On Wed, Jul 13, 2011 at 1:12 PM, Micheal Espinola Jr <
>> [email protected]> wrote:
>>
>>> Maybe I'm nuts.  Maybe I'm sick of dealing with malware.  But I have some
>>> very simple questions about things I almost ALWAYS see on infected systems.
>>> Perhaps someone here can clarify something for me that I have yet to see
>>> Microsoft and any antivirus vender directly address.  I'm gonna start this
>>> with one point, and then how the conversation goes:
>>>
>>> I almost always see malware injection points in the allusers\appdata
>>> folder.  In these instances I *always* see a reference in one of the "run"
>>> registry keys.
>>>
>>> As far as I know; this top level appdata filer should NOT contain files
>>> at all.  I repeat: NO FILES AT F'ING ALL.
>>>
>>> Can someone confirm this?  Can someone with contacts at Microsoft or
>>> other AV providers confirm why this is completely overlooked when scanning?
>>> This is were 0-day malware live very commonly.  This is very easy to check!
>>>
>>> Thank you for your time and any vender reach-outs you can provide.
>>>
>>> I'm currently working on a set of scripts to check what I consider very
>>> foolish things like this.  If anyone wants to team-up, please do.
>>>
>>> --
>>> Espi
>>>
>>>
>>>
>>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>>
>>> ---
>>> To manage subscriptions click here:
>>> http://lyris.sunbelt-software.com/read/my_forums/
>>> or send an email to [email protected]
>>> with the body: unsubscribe ntsysadmin
>>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to [email protected]
>> with the body: unsubscribe ntsysadmin
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to