Also, RootkitRevealer from sysinternals (now Microsoft).
http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx
Jason Kramer
University Archives and Records Management
002 Pearson Hall
(302) 831 - 3127 (voice)
(302) 831 - 6903 (fax)


Jason Kramer wrote:
Karen,
    Yes you should.  Also, rootkits load before any AV and anti-spyware programs you have, so they can cloak themselves from scanning programs by redirecting file and memory I/O commands.  They is why you need to scan the drive while it is offline (either by booting to some other drive or a CD like BartPE, or by putting the drive in another system).  Make sure the system you use to scan your external drive is clean, fully patched, and up to date with DATs and engine files for whatever AV and anti-spyware program you are using, otherwise you run the risk of infecting it too.
                                                                Jason
Jason Kramer
University Archives and Records Management
002 Pearson Hall
(302) 831 - 3127 (voice)
(302) 831 - 6903 (fax)


[email protected] wrote:
Oh, I have some rootkit scanners, and I didn't think of running those.   I'll run that today.  Haven't used USB drives since but that's a good precaution.  I did of course back up the data to my external hard drive.   So I guess I should scan the external drive?

Karen


I agree.  You probably had a rootkit.  If at all possible, I would recommend you pull the drive, stick it in another system (that has fully up to date AV and all OS patches), and scan it.  Once a system is infected, it can be very hard to clean from itself.  By putting the drive in another system, you don't give the virus/trojan/rootkit a chance to hook into the OS and redirect file I/O to its own ends.
    Also, if you used any USB drives or other writable removable storage on the system while it was infected, you should scan them on a known clean system.  Same for any backups you made while the system was infected.





Reply via email to