Jump to content

How can I tell if a keylogger got added to my PC while I was in Beijing?


Recommended Posts

Guest Alun Jones
Posted

"Paul Adare" <pkadare@gmail.com> wrote in message

news:1lva5wb1hygef.1p65qj3dzrtf6.dlg@40tude.net...<span style="color:blue">

> On Thu, 30 Oct 2008 11:29:51 -0300, Juan I. Cahis wrote:

><span style="color:green">

>> Unless you have set the BIOS password, which any respectable SysAdmin

>> of any respectable business corporation doing international business

>> should always have set.</span>

>

> BIOS passwords are trivial to bypass. Any sys admin, respectable or not,

> who relies on those for security should be fired.</span>

 

I'd far rather educate people than fire them - of course, it's nice to think

that all the people you ever hire will have been educated before you hired

them, but very few of us are born with perfect knowledge.

 

Alun.

~~~~

--

Texas Imperial Software | Web: http://www.wftpd.com/

23921 57th Ave SE | Blog: http://msmvps.com/alunj/

Woodinville WA 98072-8661 | WFTPD, WFTPD Pro are Windows FTP servers.

Fax/Voice +1(206)428-1991 | Try our NEW client software, WFTPD Explorer.

Posted

"FromTheRafters" <erratic@nomail.afraid.org> wrote in message

news:uxKEc0SPJHA.4776@TK2MSFTNGP05.phx.gbl...<span style="color:blue">

> "~BD~" <~BD~@no.mail.afraid.com> wrote in message

> news:OfumkgMPJHA.4700@TK2MSFTNGP03.phx.gbl...<span style="color:green">

>>

>> If you know that malicious code can be (and is) able to be stored in a

>> 'computer' - other than on a hard drive - I firmly believe that you

>> should share that knowledge with everyone, FTR.</span>

>

> I have been doing just that! If you choose to ignore it, or are unable to

> retain it for very long, or just sweep it aside as you appear to do, then

> that is of no concern to me.</span>

 

 

Do I need to apologise, FTR? If so ......... I do so unreservedly! Lack of

retention? A result of advancing years, I fear!

 

As it seems that you agree that, even if a new hard drive be installed, a

computer may remain infected - please offer your thoughts as to where you

believe malicious code may hide, ready to infect the hard drive again

whenever it so choses. Thanks

 

 

<span style="color:blue"><span style="color:green">

>> Whilst the prime purpose of malware nowadays is to steal money, if this

>> money is then used to fund terrorist activities around the world it is

>> your duty to help to stop it IMO. Tell your 'stories' to EVERYONE!</span>

>

> My 'stories' are from outside of what we discuss here (crypto, ecm, sonar,

> radar, and weapons systems). It is my patriotic duty to keep things from

> the terrorists - an idea that our 'press' can't seem to fathom.</span>

 

 

So ..... where can we discuss your stories, FTR? Another newsgroup/forum?

Email?

 

Dave

 

--

Guest Anne & Lynn Wheeler
Posted

Donna Ohl <donna.ohl@sbcglobal.net> writes:<span style="color:blue">

> I was in Beijing, and I used my Windows PC there with a freeware firewall

> and freeware anti virus and freeware malware scanners.

>

> Recently a friend said nearly all American travelers were to be warned by

> the State Department that their laptops, if left in the hotel, were almost

> certainly compromised.

>

> How could I tell if a keylogger or other spyware was inserted onto my

> laptop by the Chinese?</span>

 

recent news with more sophisticated flavor ... which mentions having

lots of countermeasures against detection:

 

Three Year Old Trojan Compromised Half Million Banking Details - The

exact origins of the Trojan have not been determined yet

http://news.softpedia.com/news/Three-Years...ils-96953.shtml

Trojan steals 500,000+ bank and card details

http://www.finextra.com/fullstory.asp?id=19217

'Ruthless' Trojan horse steals 500k bank, credit card log-ons

http://www.computerworld.com/action/articl...ticleId=9118718

Advanced Trojan Virus Compromises Bank Info

http://www.redorbit.com/news/technology/15...info/index.html

Sinowal data-stealing trojan has infected half million PCs

http://www.scmagazineus.com/Sinowal-data-s...article/120243/

 

part of archived (linkedin) thread (regarding article from Kansas City

FED: Can Smart Cards Reduce Payments Fraud and Identity Theft?) that

includes discussion of countermeasures for compromised PCs

http://www.garlic.com/~lynn/2008p.html#28

http://www.garlic.com/~lynn/2008p.html#32

 

--

40+yrs virtualization experience (since Jan68), online at home since Mar70

Posted

"Anne & Lynn Wheeler" <lynn@garlic.com> wrote in message

news:m33ai8ucdd.fsf@garlic.com...<span style="color:blue">

>

> Donna Ohl <donna.ohl@sbcglobal.net> writes:<span style="color:green">

>> I was in Beijing, and I used my Windows PC there with a freeware firewall

>> and freeware anti virus and freeware malware scanners.

>>

>> Recently a friend said nearly all American travelers were to be warned by

>> the State Department that their laptops, if left in the hotel, were

>> almost

>> certainly compromised.

>>

>> How could I tell if a keylogger or other spyware was inserted onto my

>> laptop by the Chinese?</span>

>

> recent news with more sophisticated flavor ... which mentions having

> lots of countermeasures against detection:

>

> Three Year Old Trojan Compromised Half Million Banking Details - The

> exact origins of the Trojan have not been determined yet

> http://news.softpedia.com/news/Three-Years...ils-96953.shtml

> Trojan steals 500,000+ bank and card details

> http://www.finextra.com/fullstory.asp?id=19217

> 'Ruthless' Trojan horse steals 500k bank, credit card log-ons

> http://www.computerworld.com/action/articl...ticleId=9118718

> Advanced Trojan Virus Compromises Bank Info

> http://www.redorbit.com/news/technology/15...info/index.html

> Sinowal data-stealing trojan has infected half million PCs

> http://www.scmagazineus.com/Sinowal-data-s...article/120243/

>

> part of archived (linkedin) thread (regarding article from Kansas City

> FED: Can Smart Cards Reduce Payments Fraud and Identity Theft?) that

> includes discussion of countermeasures for compromised PCs

> http://www.garlic.com/~lynn/2008p.html#28

> http://www.garlic.com/~lynn/2008p.html#32

>

> --

> 40+yrs virtualization experience (since Jan68), online at home since Mar70</span>

 

 

Thanks for your post - I very nearly posted a similar article about the

Sinowal virus this morning!

 

My understanding is that this virus can, and indeed does, install itself

silently - without the knowledge of the user of the computer.

 

If the machine continues to all intents and purposes to 'work' the malware

is unlikely to be discovered. However, let's suppose that I mention this

'nastie' to a friend and he says "How can I check to see if I have been

infected?".

 

What answer should I give him?

 

Dave

Guest David H. Lipman
Posted

From: "~BD~" <~BD~@no.mail.afraid.com>

 

| "Anne & Lynn Wheeler" <lynn@garlic.com> wrote in message

| news:m33ai8ucdd.fsf@garlic.com...

<span style="color:blue"><span style="color:green">

>> Donna Ohl <donna.ohl@sbcglobal.net> writes:<span style="color:darkred">

>>> I was in Beijing, and I used my Windows PC there with a freeware firewall

>>> and freeware anti virus and freeware malware scanners.</span></span></span>

<span style="color:blue"><span style="color:green"><span style="color:darkred">

>>> Recently a friend said nearly all American travelers were to be warned by

>>> the State Department that their laptops, if left in the hotel, were

>>> almost

>>> certainly compromised.</span></span></span>

<span style="color:blue"><span style="color:green"><span style="color:darkred">

>>> How could I tell if a keylogger or other spyware was inserted onto my

>>> laptop by the Chinese?</span></span></span>

<span style="color:blue"><span style="color:green">

>> recent news with more sophisticated flavor ... which mentions having

>> lots of countermeasures against detection:</span></span>

<span style="color:blue"><span style="color:green">

>> Three Year Old Trojan Compromised Half Million Banking Details - The

>> exact origins of the Trojan have not been determined yet

>> http://news.softpedia.com/news/Three-Years...illion-Banking-

>> Details-96953.shtml

>> Trojan steals 500,000+ bank and card details

>> http://www.finextra.com/fullstory.asp?id=19217

>> 'Ruthless' Trojan horse steals 500k bank, credit card log-ons

>> http://www.computerworld.com/action/articl...asic&articleId=

>> 9118718

>> Advanced Trojan Virus Compromises Bank Info

>> http://www.redorbit.com/news/technology/15...mpromises_bank_

>> info/index.html

>> Sinowal data-stealing trojan has infected half million PCs

>> http://www.scmagazineus.com/Sinowal-data-s...lf-million-PCs/

>> article/120243/</span></span>

<span style="color:blue"><span style="color:green">

>> part of archived (linkedin) thread (regarding article from Kansas City

>> FED: Can Smart Cards Reduce Payments Fraud and Identity Theft?) that

>> includes discussion of countermeasures for compromised PCs

>> http://www.garlic.com/~lynn/2008p.html#28

>> http://www.garlic.com/~lynn/2008p.html#32</span></span>

<span style="color:blue"><span style="color:green">

>> --

>> 40+yrs virtualization experience (since Jan68), online at home since Mar70</span></span>

 

 

| Thanks for your post - I very nearly posted a similar article about the

| Sinowal virus this morning!

 

| My understanding is that this virus can, and indeed does, install itself

| silently - without the knowledge of the user of the computer.

 

| If the machine continues to all intents and purposes to 'work' the malware

| is unlikely to be discovered. However, let's suppose that I mention this

| 'nastie' to a friend and he says "How can I check to see if I have been

| infected?".

 

| What answer should I give him?

 

| Dave

 

 

Leave to people with a greater understanding.

 

The Sinowal is a trojan NOT a virus !

 

--

Dave

http://www.claymania.com/removal-trojan-adware.html

Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

Posted

"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message

news:eEa$T%23fPJHA.1160@TK2MSFTNGP02.phx.gbl...<span style="color:blue">

> From: "~BD~" <~BD~@no.mail.afraid.com></span>

<snip><span style="color:blue">

> | Thanks for your post - I very nearly posted a similar article about the

> | Sinowal trojan this morning!

>

> | My understanding is that this trojan can, and indeed does, install

> itself

> | silently - without the knowledge of the user of the computer.

>

> | If the machine continues to all intents and purposes to 'work' the

> malware

> | is unlikely to be discovered. However, let's suppose that I mention this

> | 'nastie' to a friend and he says "How can I check to see if I have been

> | infected?".

>

> | What answer should I give him?

>

> | Dave</span>

 

--

 

(I'm sure you don't mean that I should say this to my friend!)

<span style="color:blue">

> Leave to people with a greater understanding.</span>

 

 

Might that be you, Mr Lipman? I saw this item after exploring the link in

your 'signature' block:-

 

Written by: Frederic Bonroy

(Minor contribution by: Clay)

 

In order to protect yourself from malicious programs, you should obtain

information. The Internet is a rich source of information - the problem is

that there isn't only good advice out there ........... and at first sight

bad advice isn't always recognizable.

 

1. The "False Authority Syndrome"

 

Don't believe everything. Some people talk or write about viruses as if they

were an authority in this field, but in fact they are often not.

 

Ref: http://www.claymania.com/info-fas.html

 

I know absolutely nothing about you. Are you an authority in this field?

 

<span style="color:blue">

> The Sinowal is a trojan NOT a virus !</span>

 

You are right, of course .......... but it's semantics really (IMO).

 

-- <span style="color:blue">

> Dave

> http://www.claymania.com/removal-trojan-adware.html

> Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp</span>

 

 

 

I had hoped that you might have said something along these lines:-

 

"If you suspect that you have a system that is infected with this rootkit,

to prevent it from loading, all that is required is to write a known-good

copy of a master boot record back to the disk to prevent the rootkit driver

from being loaded on the next reboot! Fortunately, we have made that a

fairly painless process with the Windows Recovery Console and the 'fixmbr'

command!

 

 

Here are some instructions for using the Windows Recovery Console:

 

 

 

Windows XP instructions: http://support.microsoft.com/kb/314058 (just type

'fixmbr' in the console)

 

 

 

Windows Vista instructions: http://support.microsoft.com/kb/927392 (just

type 'bootrec.exe /fixmbr' at the console)

 

 

 

After restoring a known-good MBR to the hard drive, you should be able to

start Windows and perform an on-line antivirus scan to detect and remove any

of the malware components or any other malware that may have been installed

on the system and hidden by the rootkit. You can use the Windows Live

OneCare Safety Scanner at http://safety.live.com to perform such a scan. It

includes all the signatures for this malware"

 

 

 

Ref:

http://blogs.technet.com/antimalware/archi...l-a-report.aspx

 

 

 

FWIW

 

 

 

Dave

 

 

 

--

Guest David H. Lipman
Posted

From: "~BD~" <~BD~@no.mail.afraid.com>

 

 

 

| I had hoped that you might have said something along these lines:-

 

| "If you suspect that you have a system that is infected with this rootkit,

| to prevent it from loading, all that is required is to write a known-good

| copy of a master boot record back to the disk to prevent the rootkit driver

| from being loaded on the next reboot! Fortunately, we have made that a

| fairly painless process with the Windows Recovery Console and the 'fixmbr'

| command!

 

 

| Here are some instructions for using the Windows Recovery Console:

 

| Windows XP instructions: http://support.microsoft.com/kb/314058 (just type

| 'fixmbr' in the console)

 

| Windows Vista instructions: http://support.microsoft.com/kb/927392 (just

| type 'bootrec.exe /fixmbr' at the console)

 

| After restoring a known-good MBR to the hard drive, you should be able to

| start Windows and perform an on-line antivirus scan to detect and remove any

| of the malware components or any other malware that may have been installed

| on the system and hidden by the rootkit. You can use the Windows Live

| OneCare Safety Scanner at http://safety.live.com to perform such a scan. It

| includes all the signatures for this malware"

 

| http://blogs.technet.com/antimalware/archi...-virtool-winnt-

| sinowal-a-report.aspx

| FWIW

| Dave

 

 

 

No it is NOT semantcs.

 

Just like it was not semantics when you could self determine that; news.microsoft.com ==

msnews.microsoft.com

 

This was never a virus, calling it such is like calling a Ford Escort a Cadillilac Coupe

deVille. Both are cars but they are not synonymous. Trojans and visrus are both malware

but they are not synonymous.

 

As for the set of instructions...

Again leave it to the more knowledgable instead of copying and pasting.

 

Gmer has the tools to deal with this Trojan RootKit.

 

Additionally, going to web site such as http://safety.live.com to perform a scan only

complicates matters. The problem here is that you are using a high level function

(Browser and ActiveX control) with a low level modification. The best utilities for

such are those that work and operate at a lower level.

 

 

 

--

Dave

http://www.claymania.com/removal-trojan-adware.html

Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

Posted

"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message

news:OvR3hqgPJHA.4136@TK2MSFTNGP02.phx.gbl...<span style="color:blue">

> From: "~BD~" <~BD~@no.mail.afraid.com>

>

>

>

> | I had hoped that you might have said something along these lines:-

>

> | "If you suspect that you have a system that is infected with this

> rootkit,

> | to prevent it from loading, all that is required is to write a

> known-good

> | copy of a master boot record back to the disk to prevent the rootkit

> driver

> | from being loaded on the next reboot! Fortunately, we have made that a

> | fairly painless process with the Windows Recovery Console and the

> 'fixmbr'

> | command!

>

>

> | Here are some instructions for using the Windows Recovery Console:

>

> | Windows XP instructions: http://support.microsoft.com/kb/314058 (just

> type

> | 'fixmbr' in the console)

>

> | Windows Vista instructions: http://support.microsoft.com/kb/927392 (just

> | type 'bootrec.exe /fixmbr' at the console)

>

> | After restoring a known-good MBR to the hard drive, you should be able

> to

> | start Windows and perform an on-line antivirus scan to detect and remove

> any

> | of the malware components or any other malware that may have been

> installed

> | on the system and hidden by the rootkit. You can use the Windows Live

> | OneCare Safety Scanner at http://safety.live.com to perform such a scan.

> It

> | includes all the signatures for this malware"

>

> |

> http://blogs.technet.com/antimalware/archi...-virtool-winnt-

> | sinowal-a-report.aspx

> | FWIW

> | Dave

>

>

>

> No it is NOT semantcs.

>

> Just like it was not semantics when you could self determine that;

> news.microsoft.com ==

> msnews.microsoft.com

>

> This was never a virus, calling it such is like calling a Ford Escort a

> Cadillilac Coupe

> deVille. Both are cars but they are not synonymous. Trojans and visrus

> are both malware

> but they are not synonymous.

>

> As for the set of instructions...

> Again leave it to the more knowledgable instead of copying and pasting.

>

> Gmer has the tools to deal with this Trojan RootKit.

>

> Additionally, going to web site such as http://safety.live.com to perform

> a scan only

> complicates matters. The problem here is that you are using a high level

> function

> (Browser and ActiveX control) with a low level modification. The best

> utilities for

> such are those that work and operate at a lower level.

>

>

>

> --

> Dave

> http://www.claymania.com/removal-trojan-adware.html

> Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

>

></span>

 

Thank you for your reply, Mr Lipman.

 

You have once again carefully avoided telling me and other readers anything

at all about you and/or your technical expertise/qualifications.

 

I'd given an example only - not a solution to a specific scenario. So, I'll

ask again ................

 

If a computer shows NO sign of infection but a user wishes to check that

there is, indeed, no malware present WHAT action should the PC user take?

 

Dave

 

--

Guest David H. Lipman
Posted

From: "~BD~" ~BD~@no.mail.afraid.com

 

| Thank you for your reply, Mr Lipman.

 

| You have once again carefully avoided telling me and other readers anything

| at all about you and/or your technical expertise/qualifications.

 

| I'd given an example only - not a solution to a specific scenario. So, I'll

| ask again ................

 

| If a computer shows NO sign of infection but a user wishes to check that

| there is, indeed, no malware present WHAT action should the PC user take?

 

| Dave

 

Once again Mr. Troll you are hijacking someone else's thread.

 

I have been in this thread since it was cross-posted by Donna Ohl on 10/26 to...

alt. internet.wireless,

alt. privacy.spyware

microsoft.public.security

 

It was you who altered the header to post to

microsoft.public.security.homeusers

microsoft.public.security.virus

 

EoD

 

--

Dave

http://www.claymania.com/removal-trojan-adware.html

Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

Guest FromTheRafters
Posted

"~BD~" <~BD~@no.mail.afraid.com> wrote in message

news:O9cumwbPJHA.4372@TK2MSFTNGP04.phx.gbl...<span style="color:blue">

>

> "FromTheRafters" <erratic@nomail.afraid.org> wrote in message

> news:uxKEc0SPJHA.4776@TK2MSFTNGP05.phx.gbl...<span style="color:green">

>> "~BD~" <~BD~@no.mail.afraid.com> wrote in message

>> news:OfumkgMPJHA.4700@TK2MSFTNGP03.phx.gbl...<span style="color:darkred">

>>>

>>> If you know that malicious code can be (and is) able to be stored in a

>>> 'computer' - other than on a hard drive - I firmly believe that you

>>> should share that knowledge with everyone, FTR.</span>

>>

>> I have been doing just that! If you choose to ignore it, or are unable to

>> retain it for very long, or just sweep it aside as you appear to do, then

>> that is of no concern to me.</span></span>

<span style="color:blue">

> Do I need to apologise, FTR?</span>

 

Not to me.

<span style="color:blue">

> If so ......... I do so unreservedly! Lack of retention? A result of

> advancing years, I fear!</span>

 

That I can understand. style_emoticons/)

<span style="color:blue">

> As it seems that you agree that, even if a new hard drive be installed, a

> computer may remain infected ...</span>

 

I am not personally aware of any case where the modified code (external

to the harddrive) can serve any useful purpose once 'disconnected' from

the rest of the code on the affected harddrive. It is however theoretically

possible.

 

In case you didn't follow the link I posted previously on this subject, here

it is again:

 

http://www.ngssoftware.com/research/papers...PCI_Rootkit.pdf

 

The code that runs before the code on the harddrive runs, can be used

by malware to 'get in front of' other code during the OS loading process.

That is - it pays to be first - but only a fragment of the malware 'program'

is able to fit in there. Once the harddrive is clean you may still have

the

malware fragment 'doing something' - but it may be severely limited now

that the rest of the malicious program's code is missing.

 

So, even replacing an affected harddrive with one shiny new from the

box does not completely clean a computer. It doesn't necessarily

follow that the remaining code can rejuvenate the malware responsible

for the initial infestation either though.

<span style="color:blue">

> - please offer your thoughts as to where you believe malicious code may

> hide, ready to infect the hard drive again whenever it so choses. Thanks</span>

 

Code doesn't have to infect, infest, or respawn to be considered

'malicious'.

Let's just assume the computer won't boot properly now, or your graphics

card won't get the resolution it used to. The malware relocated some of the

card's code so that it could have this 'front row seat' for nefarious

purposes.

Now that the rest of the code has been removed from the harddrive by

format, fdisk /mbr, or replacement of the harddrive you lose whatever

functionality it had.

 

[snip]

<span style="color:blue">

> So ..... where can we discuss your stories, FTR? Another

> newsgroup/forum? Email?</span>

 

That's just it - we can't - because I can't - under penalty of

imprisonment

or worse. I take my promises seriously, and so does my government. style_emoticons/)

Guest FromTheRafters
Posted

> Thanks for your post - I very nearly posted a similar article about the <span style="color:blue">

> Sinowal virus this morning!</span>

 

Despite what you may find experts saying, this is not a virus. A virus is

a very specific type of malware - this does not qualify.

<span style="color:blue">

> My understanding is that this virus can, and indeed does, install itself

> silently - without the knowledge of the user of the computer.</span>

 

It is a trojan horse program - to begin with.

 

....then, once installed, it is many other things.

<span style="color:blue">

> If the machine continues to all intents and purposes to 'work' the malware

> is unlikely to be discovered. However, let's suppose that I mention this

> 'nastie' to a friend and he says "How can I check to see if I have been

> infected?".

>

> What answer should I give him?</span>

 

The most important aspect of the program (once installed) is its ability

to hide - it uses the MBR to implement a 'rootkit' - you need to detect

this rootkit.

 

David Lipman recommends GMER often enough for me to think that

it is a good rootkit detector. I suspect he would know better than most

posters here.

 

- just a hunch ;-)

Guest FromTheRafters
Posted

> I had hoped that you might have said something along these lines:-<span style="color:blue">

>

> "If you suspect that you have a system that is infected with this rootkit,

> to prevent it from loading, all that is required is to write a known-good

> copy of a master boot record back to the disk to prevent the rootkit

> driver from being loaded on the next reboot! Fortunately, we have made

> that a fairly painless process with the Windows Recovery Console and the

> 'fixmbr' command!</span>

 

That may work well for this malware, but care should be taken when

attempting to remove small fragments of malware while other larger

fragments can still execute. Retaliatory payloads could easily be added

to its current functionality.

 

If it was able to modify the MBR in the first place, what's to stop it

from modifying it again after you have fixmbr'ed and rebooted? The

fragment in the MBR is usually just there to help it hide, so you have

not de-fanged it by fixmbring - you have only uncloaked it.

Guest David H. Lipman
Posted

From: "FromTheRafters" <erratic@nomail.afraid.org>

<span style="color:blue"><span style="color:green">

>> Thanks for your post - I very nearly posted a similar article about the

>> Sinowal virus this morning!</span></span>

 

| Despite what you may find experts saying, this is not a virus. A virus is

| a very specific type of malware - this does not qualify.

<span style="color:blue"><span style="color:green">

>> My understanding is that this virus can, and indeed does, install itself

>> silently - without the knowledge of the user of the computer.</span></span>

 

| It is a trojan horse program - to begin with.

 

| ...then, once installed, it is many other things.

<span style="color:blue"><span style="color:green">

>> If the machine continues to all intents and purposes to 'work' the malware

>> is unlikely to be discovered. However, let's suppose that I mention this

>> 'nastie' to a friend and he says "How can I check to see if I have been

>> infected?".</span></span>

<span style="color:blue"><span style="color:green">

>> What answer should I give him?</span></span>

 

| The most important aspect of the program (once installed) is its ability

| to hide - it uses the MBR to implement a 'rootkit' - you need to detect

| this rootkit.

 

| David Lipman recommends GMER often enough for me to think that

| it is a good rootkit detector. I suspect he would know better than most

| posters here.

 

| - just a hunch ;-)

 

 

http://www2.gmer.net/mbr/

 

--

Dave

http://www.claymania.com/removal-trojan-adware.html

Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

Posted

On Mon, 3 Nov 2008 22:19:57 -0500, FromTheRafters wrote:

<span style="color:blue"><span style="color:green">

>> Thanks for your post - I very nearly posted a similar article about the

>> Sinowal virus this morning!</span>

>

> Despite what you may find experts saying, this is not a virus. A virus is

> a very specific type of malware - this does not qualify.

> <span style="color:green">

>> My understanding is that this virus can, and indeed does, install itself

>> silently - without the knowledge of the user of the computer.</span>

>

> It is a trojan horse program - to begin with.

>

> ...then, once installed, it is many other things.

> <span style="color:green">

>> If the machine continues to all intents and purposes to 'work' the malware

>> is unlikely to be discovered. However, let's suppose that I mention this

>> 'nastie' to a friend and he says "How can I check to see if I have been

>> infected?".

>>

>> What answer should I give him?</span>

>

> The most important aspect of the program (once installed) is its ability

> to hide - it uses the MBR to implement a 'rootkit' - you need to detect

> this rootkit.

>

> David Lipman recommends GMER often enough for me to think that

> it is a good rootkit detector. I suspect he would know better than most

> posters here.

>

> - just a hunch ;-)</span>

 

Educational viewing!

Mark Russinovich - Advanced Malware Cleaning

http://www.microsoft.com/emea/spotlight/se...spx?videoid=359

(Rootkit issues are discussed towards to the end of the presentation).

Guest Sandy Mann
Posted

"~BD~" <~BD~@no.mail.afraid.com> wrote in message

news:eR3RtRhPJHA.4372@TK2MSFTNGP04.phx.gbl...<span style="color:blue">

>

> Thank you for your reply, Mr Lipman.

>

> You have once again carefully avoided telling me and other readers

> anything at all about you and/or your technical expertise/qualifications.

></span>

 

Just as you did in a earlier post

 

--

 

Sandy

Posted

It really is quite tiresome how you keep goading, (or 'trolling' if you

prefer), David H. Lipman, though it is quite amusing - in that you seem to

completely lack the very small quantity of brain power required, to deduce

that he is light years ahead of yourself, ...in every regard :-)

 

regards, Richard

 

 

"~BD~" <~BD~@no.mail.afraid.com> wrote in message

news:eR3RtRhPJHA.4372@TK2MSFTNGP04.phx.gbl...<span style="color:blue">

>

> "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message

> news:OvR3hqgPJHA.4136@TK2MSFTNGP02.phx.gbl...<span style="color:green">

>> From: "~BD~" <~BD~@no.mail.afraid.com>

>>

>>

>>

>> | I had hoped that you might have said something along these lines:-

>>

>> | "If you suspect that you have a system that is infected with this

>> rootkit,

>> | to prevent it from loading, all that is required is to write a

>> known-good

>> | copy of a master boot record back to the disk to prevent the rootkit

>> driver

>> | from being loaded on the next reboot! Fortunately, we have made that a

>> | fairly painless process with the Windows Recovery Console and the

>> 'fixmbr'

>> | command!

>>

>>

>> | Here are some instructions for using the Windows Recovery Console:

>>

>> | Windows XP instructions: http://support.microsoft.com/kb/314058 (just

>> type

>> | 'fixmbr' in the console)

>>

>> | Windows Vista instructions: http://support.microsoft.com/kb/927392

>> (just

>> | type 'bootrec.exe /fixmbr' at the console)

>>

>> | After restoring a known-good MBR to the hard drive, you should be able

>> to

>> | start Windows and perform an on-line antivirus scan to detect and

>> remove any

>> | of the malware components or any other malware that may have been

>> installed

>> | on the system and hidden by the rootkit. You can use the Windows Live

>> | OneCare Safety Scanner at http://safety.live.com to perform such a

>> scan. It

>> | includes all the signatures for this malware"

>>

>> |

>> http://blogs.technet.com/antimalware/archi...-virtool-winnt-

>> | sinowal-a-report.aspx

>> | FWIW

>> | Dave

>>

>>

>>

>> No it is NOT semantcs.

>>

>> Just like it was not semantics when you could self determine that;

>> news.microsoft.com ==

>> msnews.microsoft.com

>>

>> This was never a virus, calling it such is like calling a Ford Escort a

>> Cadillilac Coupe

>> deVille. Both are cars but they are not synonymous. Trojans and visrus

>> are both malware

>> but they are not synonymous.

>>

>> As for the set of instructions...

>> Again leave it to the more knowledgable instead of copying and pasting.

>>

>> Gmer has the tools to deal with this Trojan RootKit.

>>

>> Additionally, going to web site such as http://safety.live.com to

>> perform a scan only

>> complicates matters. The problem here is that you are using a high level

>> function

>> (Browser and ActiveX control) with a low level modification. The best

>> utilities for

>> such are those that work and operate at a lower level.

>>

>>

>>

>> --

>> Dave

>> http://www.claymania.com/removal-trojan-adware.html

>> Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

>>

>></span>

>

> Thank you for your reply, Mr Lipman.

>

> You have once again carefully avoided telling me and other readers

> anything at all about you and/or your technical expertise/qualifications.

>

> I'd given an example only - not a solution to a specific scenario. So,

> I'll ask again ................

>

> If a computer shows NO sign of infection but a user wishes to check that

> there is, indeed, no malware present WHAT action should the PC user take?

>

> Dave

>

> --

>

> </span>

Posted

"RJK" <notatospam@hotmail.com> wrote in message

news:O$V$%23XsPJHA.576@TK2MSFTNGP04.phx.gbl...<span style="color:blue">

> It really is quite tiresome how you keep goading, (or 'trolling' if you

> prefer), David H. Lipman, though it is quite amusing - in that you seem to

> completely lack the very small quantity of brain power required, to deduce

> that he is light years ahead of yourself, ...in every regard :-)

>

> regards, Richard

></span>

 

Hello Richard style_emoticons/

 

Sorry - don't mean to be tiresome - just trying to get Mr Lipman to give me

a straight answer to my question(s)!

 

BTW - I think you exagerate a little!

 

Dave

 

PS Remind me of your experience at Aumha - did you get straight answers

there?

Guest Paul Adare
Posted

On Tue, 4 Nov 2008 23:20:09 -0000, ~BD~ wrote:

<span style="color:blue">

> Sorry - don't mean to be tiresome</span>

 

Of course you did, you're a troll, that's what trolls do.

<span style="color:blue">

> - just trying to get Mr Lipman to give me

> a straight answer to my question(s)!</span>

 

You of all posters here, have no right to demand anything of anyone.

 

--

Paul Adare

MVP - Identity Lifecycle Manager

http://www.identit.ca

Posted

"FromTheRafters" <erratic@nomail.afraid.org> wrote in message

news:ea$HJ4iPJHA.4304@TK2MSFTNGP03.phx.gbl...

<span style="color:blue">

> That may work well for this malware, but care should be taken when

> attempting to remove small fragments of malware while other larger

> fragments can still execute. Retaliatory payloads could easily be added

> to its current functionality.

>

> If it was able to modify the MBR in the first place, what's to stop it

> from modifying it again after you have fixmbr'ed and rebooted? The

> fragment in the MBR is usually just there to help it hide, so you have

> not de-fanged it by fixmbring - you have only uncloaked it.

></span>

 

Of whom are you asking this question FTR? (or perhaps it was rhetorical)

 

You will appreciate that I simply quoted from the source - Microsoft TechNet

 

http://blogs.technet.com/antimalware/archi...l-a-report.aspx

 

Thank you for your comments though!

 

Dave

Posted

.....oooh, had just finished a major fight with a PC (I won !) ,...didn't

mean to be so horrid :-)

 

regards, Richard

 

 

 

"~BD~" <~BD~@no.mail.afraid.com> wrote in message

news:uP%23GjPtPJHA.4848@TK2MSFTNGP03.phx.gbl...<span style="color:blue">

>

> "RJK" <notatospam@hotmail.com> wrote in message

> news:O$V$%23XsPJHA.576@TK2MSFTNGP04.phx.gbl...<span style="color:green">

>> It really is quite tiresome how you keep goading, (or 'trolling' if you

>> prefer), David H. Lipman, though it is quite amusing - in that you seem

>> to completely lack the very small quantity of brain power required, to

>> deduce that he is light years ahead of yourself, ...in every regard :-)

>>

>> regards, Richard

>></span>

>

> Hello Richard style_emoticons/

>

> Sorry - don't mean to be tiresome - just trying to get Mr Lipman to give

> me a straight answer to my question(s)!

>

> BTW - I think you exagerate a little!

>

> Dave

>

> PS Remind me of your experience at Aumha - did you get straight answers

> there?

> </span>

Posted

Many thanks for your reply FTR. My responses are in-line.

 

"FromTheRafters" <erratic@nomail.afraid.org> wrote in message

news:OhegyaiPJHA.4504@TK2MSFTNGP02.phx.gbl...<span style="color:blue">

> "~BD~" <~BD~@no.mail.afraid.com> wrote in message

> news:O9cumwbPJHA.4372@TK2MSFTNGP04.phx.gbl...<span style="color:green">

>>

>> "FromTheRafters" <erratic@nomail.afraid.org> wrote in message

>> news:uxKEc0SPJHA.4776@TK2MSFTNGP05.phx.gbl...<span style="color:darkred">

>>> "~BD~" <~BD~@no.mail.afraid.com> wrote in message

>>> news:OfumkgMPJHA.4700@TK2MSFTNGP03.phx.gbl...

>>>>

>>>> If you know that malicious code can be (and is) able to be stored in

>>>> a 'computer' - other than on a hard drive - I firmly believe that you

>>>> should share that knowledge with everyone, FTR.

>>>

>>> I have been doing just that! If you choose to ignore it, or are unable

>>> to

>>> retain it for very long, or just sweep it aside as you appear to do,

>>> then

>>> that is of no concern to me.</span></span>

><span style="color:green">

>> Do I need to apologise, FTR?</span>

>

> Not to me.</span>

 

 

Thanks - but I didn't want you to feel that I'm not taking note of your

posts!

 

 

<span style="color:blue"><span style="color:green">

>> If so ......... I do so unreservedly! Lack of retention? A result of

>> advancing years, I fear!</span>

>

> That I can understand. style_emoticons/)</span>

 

 

Do YOU have grandchildren too?

 

<span style="color:blue"><span style="color:green">

>> As it seems that you agree that, even if a new hard drive be installed, a

>> computer may remain infected ...</span>

>

> I am not personally aware of any case where the modified code (external

> to the harddrive) can serve any useful purpose once 'disconnected' from

> the rest of the code on the affected harddrive. It is however

> theoretically

> possible.</span>

 

 

A certain Mr Bill Castner at Aumha became extremely agitated when I

suggested to someone who had experienced the dreaded BSOD that it may have

been caused by a 'duff' (or 'infected'?) Memory stick. I was surprised by

his attitude. I'd personally experienced such a phenomena and had eventually

determined the cause simply by trial and error.

 

 

<span style="color:blue">

> In case you didn't follow the link I posted previously on this subject,

> here

> it is again:

>

> http://www.ngssoftware.com/research/papers...PCI_Rootkit.pdf</span>

 

 

I had followed the link you had posted before FTR - and had saved the PDF

document for later study. Thanks, though, for the 'reminder'! It was a busy

'family' time last week and I hadn't got round to reviewing same. Even now

I've only had time for a cursory look, but it seems very interesting. I

really appreciate your help with this. Thank you.

 

 

<span style="color:blue">

> The code that runs before the code on the harddrive runs, can be used

> by malware to 'get in front of' other code during the OS loading process.

> That is - it pays to be first - but only a fragment of the malware

> 'program'

> is able to fit in there. Once the harddrive is clean you may still have

> the

> malware fragment 'doing something' - but it may be severely limited now

> that the rest of the malicious program's code is missing.</span>

 

 

No doubt it can take its time ........ and grow slowly!

 

<span style="color:blue">

> So, even replacing an affected harddrive with one shiny new from the

> box does not completely clean a computer. It doesn't necessarily

> follow that the remaining code can rejuvenate the malware responsible

> for the initial infestation either though.</span>

 

 

No, true ........ but it might !!!!

 

<span style="color:blue"><span style="color:green">

>> - please offer your thoughts as to where you believe malicious code may

>> hide, ready to infect the hard drive again whenever it so choses. Thanks</span>

>

> Code doesn't have to infect, infest, or respawn to be considered

> 'malicious'.

> Let's just assume the computer won't boot properly now, or your graphics

> card won't get the resolution it used to. The malware relocated some of

> the

> card's code so that it could have this 'front row seat' for nefarious

> purposes.</span>

 

 

Maybe that explains why the picture on my CRT monitor became somewhat

blurred from time to time during my experimentation! Vee..ery interesting!

 

<span style="color:blue">

> Now that the rest of the code has been removed from the harddrive by

> format, fdisk /mbr, or replacement of the harddrive you lose whatever

> functionality it had.</span>

 

 

That's understandable. The harddrive might well pick up new, unwanted, code

during further travels around the Internet though - and mate with any left

lurking within a machine. That's my supposition anyway! style_emoticons/

 

<span style="color:blue"><span style="color:green">

>> So ..... where can we discuss your stories, FTR? Another

>> newsgroup/forum? Email?</span>

>

> That's just it - we can't - because I can't - under penalty of

> imprisonment

> or worse. I take my promises seriously, and so does my government. style_emoticons/)</span>

 

 

I know not to which Government you refer. For my part I am bound by the

British Official Secrets Act. You may find the somewhat OT information here

of some interest:-

http://www.espionageinfo.com/Ul-Vo/United-...d-Security.html

 

Cheers

 

Dave

 

--

Posted

"Paul Adare" <pkadare@gmail.com> wrote in message

news:1kgkg0u2ljpnx$.86v74sinknt9$.dlg@40tude.net...<span style="color:blue">

> On Tue, 4 Nov 2008 23:20:09 -0000, ~BD~ wrote:</span>

<span style="color:blue"><span style="color:green">

>> - just trying to get Mr Lipman to give me

>> a straight answer to my question(s)!</span>

>

> You of all posters here, have no right to demand anything of anyone.

>

> --

> Paul Adare

> MVP - Identity Lifecycle Manager

> http://www.identit.ca</span>

 

 

I have every right to ask questions, Mr Paul Adare.

 

Indeed, I feel it my duty to do so.

 

I have made no demands of anyone. Are you feeling guilty?

 

D.

 

--

Guest FromTheRafters
Posted

"~BD~" <~BD~@no.mail.afraid.com> wrote in message

news:usoXkXtPJHA.1164@TK2MSFTNGP03.phx.gbl...<span style="color:blue">

>

> "FromTheRafters" <erratic@nomail.afraid.org> wrote in message

> news:ea$HJ4iPJHA.4304@TK2MSFTNGP03.phx.gbl...

><span style="color:green">

>> That may work well for this malware, but care should be taken when

>> attempting to remove small fragments of malware while other larger

>> fragments can still execute. Retaliatory payloads could easily be added

>> to its current functionality.

>>

>> If it was able to modify the MBR in the first place, what's to stop it

>> from modifying it again after you have fixmbr'ed and rebooted? The

>> fragment in the MBR is usually just there to help it hide, so you have

>> not de-fanged it by fixmbring - you have only uncloaked it.

>></span>

>

> Of whom are you asking this question FTR? (or perhaps it was rhetorical)</span>

 

It was rhetorical, I attempted to point out that such an approach could be

dangerous. If someone attempted to use this method against the wrong

malware (or perhaps a wrong variant of this malware), bad things could

happen.

 

This one uses the MBR both as a way to add stealth and as a way to

start the program. It is not necessary that the autostart method for the

bulk of a malware's payload be in the MBR. Replacing the MBR will

inhibit the program from starting. But if the rootkit used the MBR

only for the stealth function and some other method was used for the

persistence, simple replacement of the MBR could prove a disaster

if retaliatory payloads are used.

Posted

My replies in-line!

 

"FromTheRafters" <erratic@nomail.afraid.org> wrote in message

news:ONiG5wiPJHA.4576@TK2MSFTNGP03.phx.gbl...<span style="color:blue"><span style="color:green">

>> Thanks for your post - I very nearly posted a similar article about the

>> Sinowal virus this morning!</span>

>

> Despite what you may find experts saying, this is not a virus. A virus is

> a very specific type of malware - this does not qualify.</span>

 

 

My bad. Sorry!

 

<span style="color:blue"><span style="color:green">

>> My understanding is that this virus can, and indeed does, install itself

>> silently - without the knowledge of the user of the computer.</span>

>

> It is a trojan horse program - to begin with.

>

> ...then, once installed, it is many other things.</span>

 

 

My bad x2. Sorry!

 

 

<span style="color:blue"><span style="color:green">

>> If the machine continues to all intents and purposes to 'work' the

>> malware is unlikely to be discovered. However, let's suppose that I

>> mention this 'nastie' to a friend and he says "How can I check to see if

>> I have been infected?".

>>

>> What answer should I give him?</span>

>

> The most important aspect of the program (once installed) is its ability

> to hide - it uses the MBR to implement a 'rootkit' - you need to detect

> this rootkit.

>

> David Lipman recommends GMER often enough for me to think that

> it is a good rootkit detector. I suspect he would know better than most

> posters here.

>

> - just a hunch ;-)

></span>

 

So ......... now what many will think a stupid question.

 

How can one be certain that GMER is simply a great tool to detect rootkits?

(and doesn't damage a machine!)

 

I caught this item 'in passing' as it were:-

 

 

Sanctuary (thank you Paul Vixie and ISC) welcomes gmer.net.

I also thank Matt Jonkman for his excellent assistance,

and Register.com for being on the phone all day with us.

 

gmer, this one is for you brother.

 

GMER Application: download

Catchme: download

 

gmer has asked that this page remain, so to visit the site, click here.

 

-Paul Laudanski, 12:55PM EST Sunday, 21Jan2007

 

If there are problems with the site, please contact me.

 

 

 

So then a trip here: http://www.linkedin.com/pub/1/49a/17b to dicover lots

about Paul Laudanski.

 

Seems pretty conclusive to me!

 

Dave

 

PS How nice it would be if similar info was available about Mr Lipman!

 

--

 

--

Guest Leonard Grey
Posted

Re: How can I tell if a keylogger got added to my PC while I wasin Beijing?

 

Everyone: The sooner we stop giving this guy an audience, the sooner

he'll go away.

---

Leonard Grey

Errare Humanum Est

 

~BD~ wrote:<snipped>

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...