Antivirus 2009/2010/2012

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Our company has a bit of a problem going on that I have seemed to help with, but we want to fix it for good.

Antivirus 2009/2010/2012 - Need I say more?

I have been able to successfully remove it by installing and running the following:

* CleanUp 4.5.2

* Malwarebytes Anti-Malware

* SpyBot Search and Destroy

This, for the majority of the machines, has rid of this crappy Antivirus 2009 software. My questions for you guys is this:

1. How is it installed?

2. Where does it come from?

3. What is the "services" name for it so we can attempt to block it?

4. Have any of you guys been able to block it from being installed in your network?

If anyone has any suggestions, I would greatly appreciate it!
 

Crusty

Lifer
Sep 30, 2001
12,684
2
81
One of the ways I've seen it get installed is that a popup shows up when browsing to questionable sites that says "You've been infected, click here to clean your computer".. bam you're infected.

Are your users running as local admins? :Q
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: compman25
Does your firewall not inspect for virus/malware/spyware?

Yes.

We have Symantec Endpoint installed and Webroot SypSweeper....none of these catch this crap.
 

techmanc

Golden Member
Aug 20, 2006
1,212
7
81
Not sure how those are configured but you need to tighten your web browser security.
 

wayliff

Lifer
Nov 28, 2002
11,718
9
81
on the machines that have been infected - have you looked at the history see what has been visited?
perhaps OpenDNS could help - establish some webfiltering rules. Block what is not appropriate for the network.

what software does your firewall use for inspection? is it up to date?
 

wayliff

Lifer
Nov 28, 2002
11,718
9
81
Originally posted by: StarsFan4Life

1. How is it installed?

2. Where does it come from?

3. What is the "services" name for it so we can attempt to block it?

If anyone has any suggestions, I would greatly appreciate it!

Google the name of the virus \ infection and you'll find all these answers.
 

Quiksilver

Diamond Member
Jul 3, 2005
4,726
0
71
Originally posted by: StarsFan4Life
1. How is it installed?
User Interaction with a rogue popup or site.

2. Where does it come from?
Varies sites and rogue popups.

3. What is the "services" name for it so we can attempt to block it?
Google can help you with this one.

4. Have any of you guys been able to block it from being installed in your network?
Does not apply to me.
 

Swampster

Senior member
Mar 17, 2000
349
0
0
Sorry to say, but the best defense for this type of problem is in user education.

The pop-up is not a virus or spyware, so none of your security programs will alert on it.

Remember, a button in a window does what it does because that is what it is programed to do. Therefore, there is no problem in programming the "X" (close button), for example, to do any number of things.

In the case of the Windows AntiVirus 200x, everything in the window is booby-trapped. I give my users a printout of what legitimate pop-ups and/or notifications they can expect on their system, based on installed software. I instruct them not to touch any window not listed as OK in the printout and to instead right-click on the task bar and select Task Manager and use that to close the window. This seems to make better sense to non-power users than trying to explain how to do the more traditional three-finger salute.

This is the same old "Social Engineering" we have been dealing with for quite a while, only taken to a slightly higher level. In the above example, it will corrupt your antivirus and firewall, leaving it ineffective, but not to the point where Windows Security Center reports it, then it silently downloads and installs its payload.

There are even versions of this that use a rootkit as part of its protection system . . . which can drive you crazy the first time you encounter it.
 

wayliff

Lifer
Nov 28, 2002
11,718
9
81
Originally posted by: Swampster
Sorry to say, but the best defense for this type of problem is in user education.

The pop-up is not a virus or spyware, so none of your security programs will alert on it.

Remember, a button in a window does what it does because that is what it is programed to do. Therefore, there is no problem in programming the "X" (close button), for example, to do any number of things.

In the case of the Windows AntiVirus 200x, everything in the window is booby-trapped. I give my users a printout of what legitimate pop-ups and/or notifications they can expect on their system, based on installed software. I instruct them not to touch any window not listed as OK in the printout and to instead right-click on the task bar and select Task Manager and use that to close the window. This seems to make better sense to non-power users than trying to explain how to do the more traditional three-finger salute.

This is the same old "Social Engineering" we have been dealing with for quite a while, only taken to a slightly higher level. In the above example, it will corrupt your antivirus and firewall, leaving it ineffective, but not to the point where Windows Security Center reports it, then it silently downloads and installs its payload.

There are even versions of this that use a rootkit as part of its protection system . . . which can drive you crazy the first time you encounter it.

Education is part of the problem but education by itself is not the solution.
In this particular case, I'd say education is secondary.

You cannot trust the user to always do the right thing...
 

Red Squirrel

No Lifer
May 24, 2003
67,907
12,375
126
www.anyf.ca
The only solution would be to switch to a non IE browser, but doubt that would pass through management, and it probably would not completely solve the issue.

We have the same problem here where I work and on most of our customer sites. Users are just too stupid and click on these things. I'm sure even with firefox it probably warns you before but if you click ok it will download it too, I never tried, I don't even know where people FIND these things. They should be working, not surfing porn sites.

I've also noticed it does not matter if you run as admin or not, it just uses privilege escalation to infect the machine anyway. We have a fairly secure setup here as far as policies and all that go, and nobody runs as admin but IT, yet people still manage to infect the whole machine real good with that crap.
 

LuDaCriS66

Platinum Member
Nov 21, 2001
2,057
0
0
Originally posted by: RedSquirrel
The only solution would be to switch to a non IE browser, but doubt that would pass through management, and it probably would not completely solve the issue.

We have the same problem here where I work and on most of our customer sites. Users are just too stupid and click on these things. I'm sure even with firefox it probably warns you before but if you click ok it will download it too, I never tried, I don't even know where people FIND these things. They should be working, not surfing porn sites.

I've also noticed it does not matter if you run as admin or not, it just uses privilege escalation to infect the machine anyway. We have a fairly secure setup here as far as policies and all that go, and nobody runs as admin but IT, yet people still manage to infect the whole machine real good with that crap.

Browser choice shouldn't make a difference since these infections are predominantly social engineering based as far as I can tell.

Software restriction policies may help. Don't allow executables to be launched from anywhere except C:\Windows and C:\Program Files. This is especially so executables can't be launched from browser cache folders.

As for administrative privileges, I'm not sure they use privilege escalation. Limited user accounts, by default, still have access to various autostart entries. I don't know them by heart but closing them off may help, although I have yet to test them myself.
 

techmanc

Golden Member
Aug 20, 2006
1,212
7
81
I have used Firefox for years and it is definitely a safer browser that IE is. The few places is need IE for like some MS sites I can use the Firefox Addon IE Tab. There are a lot activex websites that IE is vulnerable to that its not funny. As a standalone solution for my unknowing customers I use Zone Alarm Security Suite and while it might slow there systems a bit it seem to offer the best protection as long as its configured properly.
 

techmanc

Golden Member
Aug 20, 2006
1,212
7
81
No one that offers alternative choices for OS to fix problems with Windows say how the going to retrain the people to there OS or how to cover all the software thats Windows only.
 

LikeLinus

Lifer
Jul 25, 2001
11,518
670
126
Originally posted by: techmanc
No one that offers alternative choices for OS to fix problems with Windows say how the going to retrain the people to there OS or how to cover all the software thats Windows only.

Or the downtime to change out all the systems. The loss of work hours and money from having to retrain people and get their workflow and efficiency up to what it was with Windows. Trying to make sure drivers and external hardware works with the system. Not to mention having to hire IT people who can use and deploy linux.

Yeah, Linux is free!!!!

Idiots like The Keeper are just running their mouths without any actual experience or intelligence. Ignore them.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
Originally posted by: RedSquirrel
The only solution would be to switch to a non IE browser, but doubt that would pass through management, and it probably would not completely solve the issue.

We have the same problem here where I work and on most of our customer sites. Users are just too stupid and click on these things. I'm sure even with firefox it probably warns you before but if you click ok it will download it too, I never tried, I don't even know where people FIND these things. They should be working, not surfing porn sites.

I've also noticed it does not matter if you run as admin or not, it just uses privilege escalation to infect the machine anyway. We have a fairly secure setup here as far as policies and all that go, and nobody runs as admin but IT, yet people still manage to infect the whole machine real good with that crap.

Wow, what a nice pile of misinformation.

Most of the top preventive steps have already been mentioned.

1) use non-Admin user accounts. If you went down the list of Registry and file-system changes these malwares make, you'd find that they run into dead ends without Admin powers on tap. Sorry, nope, you're not registering yourself as a Service or sticking files in the System32 directory, homies... you stole an unloaded gun :evil: Nice try.

2) if it's available, use Software Restriction Policy. This will knock down both user-initiated and exploit-driven executables if you do it right, as well as generating events in the Windows event logs to inform you what's been going on.

3) keep the systems patched (duh) including browser add-ons that you can't get rid of, since they're a primary attack vector IRL, regardless of your browser of choice. We're talking RealPlayer, QuickTime, Sun Java, Adobe Reader, Adobe Flash Player, etc. Reducing your attack surface in this way reduces the likelihood of an exploit being used to attempt to launch a trojan/downloader.

4) if your users are trainable at all, then educate the users with some screencapture video (here's a sample at YouTube) or live demonstrations, including how to kill the web browser using Task Manager. Encourage them to approach you with anything that makes them suspicious, and don't come down on them when they report stuff. Be positive about it.


Since fraudware sites are planted en masse in search engines, promoted by hacked everyday websites, sneaked onto legit websites using "malvertisements" or exploits, and even promoted by means of fake parking-violation notices in parking lots (believe it!), I feel that the best foundation to build upon is SRP + low-rights accounts.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
Originally posted by: Chadder007
It seems to bypass Mcafee Enterprise and CounterSpy also.

If you cannot implement Software Restriction Policy, then consider creating a suite of behavior-blocking rules in VirusScan Enterprise that perform a similar function on the user's profile directory.

Namely, make a list of all likely filetypes that could launch an attack (.exe, .com, .pif, .scr, .bat and so forth), and for each of these filetypes, create a rule that forbids them being executed (and/or created, if you like) from within the C:\Documents and Settings directory. You'll get notifications in your ePO logs when systems trip these rules, which really helps keep tabs on what's going on.

Also make sure you've enabled all the optional threat categories; they weren't enabled by default in VSE 8.0i.

That said, my experience is that McAfee is not able to keep up with the fraudware scene. Their detection rates are horrible, and they don't analyze malware samples that are sent in to them. I liked the administration and reporting features, but not the actual antivirus software. If you're stuck with McAfee, make lemonade from your lemon by using the behavior-blocking capabilities.
 

The Keeper

Senior member
Mar 27, 2007
291
0
76
The OP asked for a long-term solution against malware, the best solution is obviously a platform that is immune to said malware. Now, actual deployment of linux in his company is completely different topic, and I'm sure he has enough initiative to start asking questions if need be. Deploying linux in a company is not easy or cheap, but it is possible and doable with help from professionals for hire. There are plenty of options to run windows applications, like Wine or running Windows inside virtual machine. However, I'm not implying that linux is perfectly secure. No modern OS ever is.

It is a shame that few of you had to resort to calling names, but don't worry. I'll forgive you.
 

tcsenter

Lifer
Sep 7, 2001
18,420
293
126
Windows Defender and Malicious Software Removal Tool have been targeting these variants for a few months now and are getting pretty good at it.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |