From: philo on
Daave wrote:
> philo wrote:
>> MowGreen wrote:
>>> MowGreen wrote:
>>>> Seeing that paper was published in 2008
>>> Correction. The presentation was done in Geneva at VB2009, on the
>>> 23rd of September, 2009:
>>> http://blogs.technet.com/mmpc/archive/2009/09/15/i-can-t-go-back-to-yesterday-see-you-in-geneva.aspx
>>>
>>>
>>>
>>> MowGreen
>>> ================
>>> *-343-* FDNY
>>> Never Forgotten
>>> ================
>>>
>>> banthecheck.com
>>> "Security updates should *never* have *non-security content*
>>> prechecked
>>
>> Thanks for posting back
>>
>> my main point was to alert people who think their systems are secured
>>
>> to think again!
>
> We are all on the same page as far as that is concerned, philo. The
> point I was making was that even if you are able to delete rootkit files
> in the restore volume, you aren't necessarily rootkit-free. If the
> rootkit was indeed phoning home, it is highly unlikely it was doing so
> from that location (then again, I appreciate your link; I will read that
> in depth). Chances are it was phoning home from another location you
> were unable to detect.
>
>


I ran numerous scans using four different root kit detection programs.

It appears to be clean and the user has since made on-line financial
transactions without getting hacked...

but with root kits...I don't know of one can ever be 100% sure

nasty stuff!
From: glee on
"philo" <philo(a)privacy.net> wrote in message
news:6YednTAIgKspFAPWnZ2dnUVZ_hWdnZ2d(a)ntd.net...
> Daave wrote:
>> philo wrote:
>>> MowGreen wrote:
>>>> MowGreen wrote:
>>>>> Seeing that paper was published in 2008
>>>> Correction. The presentation was done in Geneva at VB2009, on the
>>>> 23rd of September, 2009:
>>>> http://blogs.technet.com/mmpc/archive/2009/09/15/i-can-t-go-back-to-yesterday-see-you-in-geneva.aspx
>>>>
>>>>
>>>>
>>>>
>>>
>>> Thanks for posting back
>>>
>>> my main point was to alert people who think their systems are
>>> secured
>>>
>>> to think again!
>>
>> We are all on the same page as far as that is concerned, philo. The
>> point I was making was that even if you are able to delete rootkit
>> files in the restore volume, you aren't necessarily rootkit-free. If
>> the rootkit was indeed phoning home, it is highly unlikely it was
>> doing so from that location (then again, I appreciate your link; I
>> will read that in depth). Chances are it was phoning home from
>> another location you were unable to detect.
>
>
> I ran numerous scans using four different root kit detection programs.
>
> It appears to be clean and the user has since made on-line financial
> transactions without getting hacked...
>
> but with root kits...I don't know of one can ever be 100% sure
>
> nasty stuff!

Did you run those rootkit programs while the drive was slaved to another
computer, rather than being booted from the drive being scanned? I ask
for obvious reasons.

The safest method is to scan from outside the OS with a rootkit scanner
AND an anti-virus app AND a spyware detection app like MBAM. I think we
all agree on that as a *preferred* protocol.

What is being described in the articles both you and Mow posted, is not
conclusive that the malware is actually being run (and therefore
"active") from within the SVI folders. It appears that the folder
created by the infection inside the SVI folder was used to store
components used for the initial installation of the infection, but the
infection itself is actually executing as a service out of the System32
folder tree and loading from the Service Registry Key.....note please
the quote from the article you cited: "....running as a service allows
the rootkit to survive a reboot".

Even if this is the case, that it isn't active in the SVI, the fact that
the folder was easily hacked for storage makes it possible that sooner
or later, a rootkit will come along that will succeed in actually
running from there. It just get nastier all the time....and we can't
afford to be smug and say it can "never" happen. Never say
never...especially about malware. ;-)
--
Glen Ventura, MS MVP Oct. 2002 - Sept. 2009
A+
http://dts-l.net/

From: philo on
glee wrote:
> "philo" <philo(a)privacy.net> wrote in message
> news:6YednTAIgKspFAPWnZ2dnUVZ_hWdnZ2d(a)ntd.net...
>> Daave wrote:
>>> philo wrote:
>>>> MowGreen wrote:
>>>>> MowGreen wrote:
>>>>>> Seeing that paper was published in 2008
>>>>> Correction. The presentation was done in Geneva at VB2009, on the
>>>>> 23rd of September, 2009:
>>>>> http://blogs.technet.com/mmpc/archive/2009/09/15/i-can-t-go-back-to-yesterday-see-you-in-geneva.aspx
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>
>>>> Thanks for posting back
>>>>
>>>> my main point was to alert people who think their systems are secured
>>>>
>>>> to think again!
>>>
>>> We are all on the same page as far as that is concerned, philo. The
>>> point I was making was that even if you are able to delete rootkit
>>> files in the restore volume, you aren't necessarily rootkit-free. If
>>> the rootkit was indeed phoning home, it is highly unlikely it was
>>> doing so from that location (then again, I appreciate your link; I
>>> will read that in depth). Chances are it was phoning home from
>>> another location you were unable to detect.
>>
>>
>> I ran numerous scans using four different root kit detection programs.
>>
>> It appears to be clean and the user has since made on-line financial
>> transactions without getting hacked...
>>
>> but with root kits...I don't know of one can ever be 100% sure
>>
>> nasty stuff!
>
> Did you run those rootkit programs while the drive was slaved to another
> computer, rather than being booted from the drive being scanned? I ask
> for obvious reasons.
>
> The safest method is to scan from outside the OS with a rootkit scanner
> AND an anti-virus app AND a spyware detection app like MBAM. I think we
> all agree on that as a *preferred* protocol.
>
> What is being described in the articles both you and Mow posted, is not
> conclusive that the malware is actually being run (and therefore
> "active") from within the SVI folders. It appears that the folder
> created by the infection inside the SVI folder was used to store
> components used for the initial installation of the infection, but the
> infection itself is actually executing as a service out of the System32
> folder tree and loading from the Service Registry Key.....note please
> the quote from the article you cited: "....running as a service allows
> the rootkit to survive a reboot".
>
> Even if this is the case, that it isn't active in the SVI, the fact that
> the folder was easily hacked for storage makes it possible that sooner
> or later, a rootkit will come along that will succeed in actually
> running from there. It just get nastier all the time....and we can't
> afford to be smug and say it can "never" happen. Never say
> never...especially about malware. ;-)


Fortunately my machines have removable drive kits
so it was easy for me to pop the infected drive in another machine
to scan it...



Once I was sure the machine was clean...I did check to see what services
were running and made sure I could identify all non-Microsoft services.

Of course one thing I did not do was see if the rootkit may have been
spawning some service...which of course would mean that it was not
running from within the restore volume. of course that does not make it
less dangerous...and we all need to use caution and not assume our
machines are impervious to malware
From: MowGreen on

glee wrote:
> "philo" <philo(a)privacy.net> wrote in message
> news:6YednTAIgKspFAPWnZ2dnUVZ_hWdnZ2d(a)ntd.net...
>> Daave wrote:
>>> philo wrote:
>>>> MowGreen wrote:
>>>>> MowGreen wrote:
>>>>>> Seeing that paper was published in 2008
>>>>> Correction. The presentation was done in Geneva at VB2009, on the
>>>>> 23rd of September, 2009:
>>>>> http://blogs.technet.com/mmpc/archive/2009/09/15/i-can-t-go-back-to-yesterday-see-you-in-geneva.aspx
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>
>>>> Thanks for posting back
>>>>
>>>> my main point was to alert people who think their systems are secured
>>>>
>>>> to think again!
>>>
>>> We are all on the same page as far as that is concerned, philo. The
>>> point I was making was that even if you are able to delete rootkit
>>> files in the restore volume, you aren't necessarily rootkit-free. If
>>> the rootkit was indeed phoning home, it is highly unlikely it was
>>> doing so from that location (then again, I appreciate your link; I
>>> will read that in depth). Chances are it was phoning home from
>>> another location you were unable to detect.
>>
>>
>> I ran numerous scans using four different root kit detection programs.
>>
>> It appears to be clean and the user has since made on-line financial
>> transactions without getting hacked...
>>
>> but with root kits...I don't know of one can ever be 100% sure
>>
>> nasty stuff!
>
> Did you run those rootkit programs while the drive was slaved to another
> computer, rather than being booted from the drive being scanned? I ask
> for obvious reasons.
>
> The safest method is to scan from outside the OS with a rootkit scanner
> AND an anti-virus app AND a spyware detection app like MBAM. I think we
> all agree on that as a *preferred* protocol.
>
> What is being described in the articles both you and Mow posted, is not
> conclusive that the malware is actually being run (and therefore
> "active") from within the SVI folders. It appears that the folder
> created by the infection inside the SVI folder was used to store
> components used for the initial installation of the infection, but the
> infection itself is actually executing as a service out of the System32
> folder tree and loading from the Service Registry Key.....note please
> the quote from the article you cited: "....running as a service allows
> the rootkit to survive a reboot".
>
> Even if this is the case, that it isn't active in the SVI, the fact that
> the folder was easily hacked for storage makes it possible that sooner
> or later, a rootkit will come along that will succeed in actually
> running from there. It just get nastier all the time....and we can't
> afford to be smug and say it can "never" happen. Never say
> never...especially about malware. ;-)

Mal-coders stash executables in TIF but they are not executed until
something outside of TIF calls them to run. So, technically speaking,
malware executables are not active in TIF.
It's the same with executables in SVI but ... the prevailing notion was
that one needed to utilize an infected restore point to pWn the system.

Another anti-malware warrior explained how this Vista System Restore
Rootkit functions: http://www.rootkit.com/newsread.php?newsid=900

" This is not a rootkit that runs from SVI either. The rootkit
initiates a system restore, and it then intercepts and diverts SR
execution so malicious files and registry keys are restored. Once the PC
is shutdown and restarted the infected file(s) and autostart(s) that
were introduced by the subverted SR, will take effect. The advantage of
using such a rootkit, is that it is enables malware to silently install
without activating any HIPS or security program alerts. "



MowGreen
================
*-343-* FDNY
Never Forgotten
================

banthecheck.com
"Security updates should *never* have *non-security content* prechecked