Go Back   IceInSpace > Equipment > Software and Computers

Reply
 
Thread Tools Rate Thread
  #1  
Old 25-08-2009, 05:09 PM
DavidU's Avatar
DavidU (Dave)
Like to learn

DavidU is offline
 
Join Date: Jul 2007
Location: melbourne
Posts: 4,835
Rogue anti virus: Total Security

Watch out for Total security ! It is very difficult to remove. It took many hours to get it off my laptop. If you don't purchace the program on line it slowly stops most programs and disables any other removal tool.I suspect it loaded a stack of trackers & trojans last night, and yes all my anti virus programs were on and up to date.
It also disables your ability to get into the directory to find tse.exe.
Reply With Quote
  #2  
Old 25-08-2009, 05:21 PM
renormalised's Avatar
renormalised (Carl)
No More Infinities

renormalised is offline
 
Join Date: Apr 2008
Location: Townsville
Posts: 9,698
I never download anything I don't trust and certainly never anything like these....learnt that lesson many many moons ago.
Reply With Quote
  #3  
Old 25-08-2009, 05:25 PM
DavidU's Avatar
DavidU (Dave)
Like to learn

DavidU is offline
 
Join Date: Jul 2007
Location: melbourne
Posts: 4,835
Quote:
Originally Posted by renormalised View Post
I never download anything I don't trust and certainly never anything like these....learnt that lesson many many moons ago.
The thing is I didn't down load anything, no one touched my laptop ! There is a fuss on the net about it
http://www.bleepingcomputer.com/viru...total-security
Reply With Quote
  #4  
Old 25-08-2009, 05:42 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
My advice David - backup all user data, wipe the system with a low level format, make sure to fdisk /mbr from a bootable DOS floppy too. Reinstall everything and then your user data.

My reasoning is that you can't be sure that you got everything that this mongrel application installed.

Dave
Reply With Quote
  #5  
Old 25-08-2009, 05:59 PM
DavidU's Avatar
DavidU (Dave)
Like to learn

DavidU is offline
 
Join Date: Jul 2007
Location: melbourne
Posts: 4,835
Quote:
Originally Posted by dpastern View Post
My advice David - backup all user data, wipe the system with a low level format, make sure to fdisk /mbr from a bootable DOS floppy too. Reinstall everything and then your user data.

My reasoning is that you can't be sure that you got everything that this mongrel application installed.

Dave
Yep, doing that tonight. still stuff in sys32 etc.
This is the worst one I have seen.
Reply With Quote
  #6  
Old 25-08-2009, 06:56 PM
Tandum's Avatar
Tandum (Robin)
Registered User

Tandum is offline
 
Join Date: Apr 2008
Location: Wynnum West, Brisbane.
Posts: 4,166
It's just the lastest version of pav (personal antivirus). Google it. It's not hard to remove.
Reply With Quote
  #7  
Old 25-08-2009, 09:13 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
As someone who works in the industry, I can only stress that today's modern viruses tend to try and install as much crap on your system once they gain a foothold. As Hicks said in Aliens - the only way to be sure is to nuke it from orbit.

Dave
Reply With Quote
  #8  
Old 26-09-2009, 11:43 AM
Ghost_Returns's Avatar
Ghost_Returns (Richard)
Registered User

Ghost_Returns is offline
 
Join Date: Aug 2009
Location: Tennant Creek, Australia
Posts: 12
Rogue anti virus: Total Security

Gentlemen,

3 programs to run that will forever remove the little bugger.

1) Combofix (Bleeping Computers)
2) SDfix (Only works for XP)
3) Spybot search & destroy



Having 20years working in th industry of IT,and running and managing my own IT business, I work on these issues on a daily basis.

Reply With Quote
  #9  
Old 26-09-2009, 06:30 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
Richard - I respectively disagree. In today's modern world, when a system gets compromised, in a lot of instances, getting rid of the junk on someones system is not only difficult, but extremely time consuming. Also, there are means and ways around your noted software finding problems, i.e compromised binaries (a la rootkits).

Dave

edit: whilst this covers Debian GNU/Linux, many of the principles are the same dealing with other operating systems:

http://www.debian.org/doc/manuals/se....html#contents

and specifically:

http://www.debian.org/doc/manuals/se...romise.en.html

Note what it says:

Quote:
Remember that if you are sure the system has been compromised you cannot trust the installed software or any information that it gives back to you. Applications might have been trojanized, kernel modules might be installed, etc.
Reply With Quote
  #10  
Old 26-09-2009, 06:52 PM
snowyskiesau
Registered User

snowyskiesau is offline
 
Join Date: Mar 2006
Location: Geeveston, Tasmania
Posts: 889
I thought the original post was about a Windows virus/malware infection.

How's the reference to Debian relevant?
Reply With Quote
  #11  
Old 26-09-2009, 08:12 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
Quote:
Originally Posted by snowyskiesau View Post
I thought the original post was about a Windows virus/malware infection.

How's the reference to Debian relevant?
Geoff - if you take the time to read my post you'll see that I said:

Quote:
edit: whilst this covers Debian GNU/Linux, many of the principles are the same dealing with other operating systems
The principles for dealing with compromised systems are the same no matter which o/s you are running. There is little in the way of documentation for securing the Windows operating system, unless you wish to look at thousands of different webpages over the web. Since my argument revolved around assuming that no compromised system is totally safe thereafter, and I wanted to demonstrate what other security minded peoples think of the matter, I quoted from the Debian guide.

Please try and find a similar quality article for the Windows system ;-)

Dave
Reply With Quote
  #12  
Old 26-09-2009, 09:22 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by dpastern View Post
... Since my argument revolved around assuming that no compromised system is totally safe thereafter, and I wanted to demonstrate what other security minded peoples think of the matter, I quoted from the Debian guide.
Please try and find a similar quality article for the Windows system ;-)
I've had one suspect Linux system in over 10 years. I booted off CD and verified all files against the originals on CD or fresh copies of patch sets.

"Windows virus" and "Windows malware" are both tautologies. The most recent malware I've seen in action will require a complete system rebuild. I might get round to it sometime.
Reply With Quote
  #13  
Old 26-09-2009, 11:26 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
[now becoming a bit off topic]

Linux rootkits are becoming more common sadly. Most of the people running Linux as servers, with connectivity to the big bad wide world, do not lock their systems down properly. Blackhats just love 'em! Cracking a system isn't about the hollywood BS that you see, it's about knowing the operating system, knowing the vulnerable pieces of software on it, and knowing how to exploit them. It's more like detective work than glamour work. Windows XP pre SP 2 could be p0wned in under a minute if you knew how. At least XP SP 2 is much, much better.

Personally, on a work system, I prefe to have each major directory on its own mountable partition (/root, /boot, /etc, /var, /opt, /bin, /sbin and so on and so forth) - it makes it far easier when dealing with intrusions. I personally like tripwire installed on any production system, with the results burnt to a non re-writeable CD. When you get a problem, remove drive from system, boot off a non infected system and mount said drive, then compare the hashes from the CD to the drive in question to see which binaries and files have been modified. In most cases, it's not worth the effort - far better to blow the system away on a low level format with multiple passes imho.

Dave
Reply With Quote
  #14  
Old 26-09-2009, 11:31 PM
DavidU's Avatar
DavidU (Dave)
Like to learn

DavidU is offline
 
Join Date: Jul 2007
Location: melbourne
Posts: 4,835
Now thats cool Dave
Quote:
Originally Posted by dpastern View Post
[now becoming a bit off topic]

Linux rootkits are becoming more common sadly. Most of the people running Linux as servers, with connectivity to the big bad wide world, do not lock their systems down properly. Blackhats just love 'em! Cracking a system isn't about the hollywood BS that you see, it's about knowing the operating system, knowing the vulnerable pieces of software on it, and knowing how to exploit them. It's more like detective work than glamour work. Windows XP pre SP 2 could be p0wned in under a minute if you knew how. At least XP SP 2 is much, much better.

Personally, on a work system, I prefe to have each major directory on its own mountable partition (/root, /boot, /etc, /var, /opt, /bin, /sbin and so on and so forth) - it makes it far easier when dealing with intrusions. I personally like tripwire installed on any production system, with the results burnt to a non re-writeable CD. When you get a problem, remove drive from system, boot off a non infected system and mount said drive, then compare the hashes from the CD to the drive in question to see which binaries and files have been modified. In most cases, it's not worth the effort - far better to blow the system away on a low level format with multiple passes imho.

Dave
Reply With Quote
  #15  
Old 27-09-2009, 08:42 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
Quote:
Originally Posted by DavidU View Post
Now thats cool Dave
It is. Computer security is a very interesting topic, no matter what o/s you use. The principles for securing a system are the same, but UNIX and other UNIX like systems have a good, solid head start over Windows, simply because their primary design ideals have been for security and reliability, not ease of use. Ease of use is nice, but it will always result in trade offs on security/reliability imho. It's a fine line to walk. OS X does a nice job of it imho.

You could get really crazy and run stuff like freeBSD with jails, or Linux with chroots, or Solaris with zones and tie them down very tightly.

The debian guide was really just to show the basics of securing a system and if a system has been compromised, imho, the best way of dealing with it is blowing it away. You simply cannot be 100% sure that software will find every bit of trash I wish it was that easy.

That said, Geoff has good points - these automated software cleanups will get rid of *most* of the junk, possibly all. There are some good books on the subject of computer security, and it's fun to read. Knowing what black hats get up to can sometimes help you learn how to tighten your system down. The fact that I work in the business only adds to the importance of learning about computer security imho.

Dave
Reply With Quote
  #16  
Old 28-09-2009, 04:52 PM
White Rabbit's Avatar
White Rabbit
Space Cadet

White Rabbit is offline
 
Join Date: Feb 2007
Location: Sydney
Posts: 1,411
Yeah, I reformat every 3 months or so. As soon as my system starts to show signs of slowing down, I wipe it and start again.
Reply With Quote
  #17  
Old 28-09-2009, 05:52 PM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
Quote:
Originally Posted by White Rabbit View Post
Yeah, I reformat every 3 months or so. As soon as my system starts to show signs of slowing down, I wipe it and start again.
Ah the joys of Windows ;-) I have to say though, I've been very happy with my Vista install - I haven't noticed the usual slowdown that Windows does. I'll probably upgrade to Windows 7 as well.

Dave
Reply With Quote
  #18  
Old 29-09-2009, 10:26 AM
kustard's Avatar
kustard (Simon)
Great Sage == Heaven

kustard is offline
 
Join Date: Sep 2009
Location: Melbourne, Australia
Posts: 735
Quote:
Originally Posted by dpastern View Post
Ah the joys of Windows ;-) I have to say though, I've been very happy with my Vista install - I haven't noticed the usual slowdown that Windows does. I'll probably upgrade to Windows 7 as well.

Dave
I've been running Vista on my home machine now for about 3 years. I've had it BSOD a few times on me which were caused by video card driver issues. I can't upgrade to the new ServicePack though as I have a dual boot system with linux and the SP install doesn't like not having control over the MBR. I'll soon reformat and re-install, probably with win7.

As for the Total Security program, it's a nasty piece of work. A guy here at work had it on his laptop after he let his kids play games on it. I managed to clean it off, but then I still backed up his data and reformatted.
Reply With Quote
  #19  
Old 29-09-2009, 10:38 AM
dpastern (Dave Pastern)
PI cult member

dpastern is offline
 
Join Date: Jan 2009
Location: Brisbane
Posts: 2,874
I triple boot XP 32 bit, Debian AMD 64 bit and Vista 64 bit without issues.

Dave
Reply With Quote
Reply

Bookmarks

Thread Tools
Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 06:04 AM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement