From: Ronin on
Darn! Oh well, better luck next time.

--
Ronin

"C" <c(a)nospamers.com.invalid> wrote in message
news:hnao5f$c9d$1(a)speranza.aioe.org...
> Ronin wrote:
>> You have diagnosed an infection that absolutely, positively came from a
>> SR restore point? You're absolutely certain that it didn't come from
>> elsewhere? Do you mind sharing the information necessary to repeat the
>> issue? I am perfectly able and eager to do so, and I have all the
>> necessary equipment (i.e., a spare machine that I use for experimentation
>> and a fair amount of experience analyzing system behavior.) Perhaps you
>> can at least identify the virus? The more specific the better.
>>
>> Seriously, I can't imagine any way for something to execute itself from
>> inside a SR restore point, but if it can be done I want to know all about
>> it.
>>
>
> It was a long time ago and my recollection is that I zapped a virus with
> Avast and it kept coming back until I nuked all the restore points. I'm
> sorry I can't be more specific. Had I known you would have asked, I would
> have taken notes ;-)
>
> --
> C

From: Ken Blake, MVP on
On Thu, 11 Mar 2010 13:37:04 +0100, C <c(a)nospamers.com.invalid> wrote:

> Ronin wrote:
> > You have diagnosed an infection that absolutely, positively came from a
> > SR restore point? You're absolutely certain that it didn't come from
> > elsewhere? Do you mind sharing the information necessary to repeat the
> > issue? I am perfectly able and eager to do so, and I have all the
> > necessary equipment (i.e., a spare machine that I use for
> > experimentation and a fair amount of experience analyzing system
> > behavior.) Perhaps you can at least identify the virus? The more
> > specific the better.
> >
> > Seriously, I can't imagine any way for something to execute itself from
> > inside a SR restore point, but if it can be done I want to know all
> > about it.
> >
>
> It was a long time ago and my recollection is that I zapped a virus with
> Avast and it kept coming back until I nuked all the restore points.


It undoubtedly came back in the sense that Avast continued to report
its presence. However it never really went away because it was still
there in the restore points.

And most important, although Avast continued to report that it was
there, it was completely harmless in the restore points.


> I'm
> sorry I can't be more specific. Had I known you would have asked, I
> would have taken notes ;-)
>
> --
> C

--
Ken Blake, Microsoft MVP (Windows Desktop Experience) since 2003
Please Reply to the Newsgroup
From: C on
Ken Blake, MVP wrote:
>> It was a long time ago and my recollection is that I zapped a virus with
>> Avast and it kept coming back until I nuked all the restore points.
>
>
> It undoubtedly came back in the sense that Avast continued to report
> its presence. However it never really went away because it was still
> there in the restore points.
>
> And most important, although Avast continued to report that it was
> there, it was completely harmless in the restore points.
>
>
>> I'm
>> sorry I can't be more specific. Had I known you would have asked, I
>> would have taken notes ;-)
>>
>> --
>> C
>

That's not the only place where Avast reported that it was. It kept
putting itself back into Windows/System32. Once I nuked the one in
System 32 and flushed the restore points, no more virus anywhere.

--
C
From: philo on
MowGreen wrote:
> C wrote:
>> Eric wrote:
>>> We've encountered a virus on one of our windows xp professional
>>> machines. It locks the computer up at random intervals. We've cleaned
>>> the computer using multiple different anti-viruses which fixes the
>>> problem for a time, however the virus always comes back within a day.
>>> We've used anti-rootkits and found nothing as well.
>>> It also seems to only lock the computer up if it is connected with the
>>> ethernet cable.
>>> Any suggestions would be greatly appreciated.
>>
>> Try removing all the system restore points after doing another malware
>> clean up as malware can hang out in there.
>>
>
> Let's end this misconception, misunderstanding, or miscomprehension -
>
> *** Malware in System Restore can *NOT* infect a clean OS and is *not*
> active unless a restore point that includes it is used ***
> Period !!!
>
> MowGreen
> ================
> *-343-* FDNY
> Never Forgotten
> ================
>
> banthecheck.com
> "Security updates should *never* have *non-security content* prechecked


Nope.

About a year ago I repaired a machine that had been compromised.

It had been used for on-line banking and credit card transactions
and two accounts had been hacked.

First thing I did was scan for root kits in all the places one would
expect.

Nothing found.

After giving the machine a thorough scan...
the root kit was found "hiding" in the restore volume!

From: PA Bear [MS MVP] on
philo wrote:
<snip>
> About a year ago I repaired a machine that had been compromised.
>
> It had been used for on-line banking and credit card transactions
> and two accounts had been hacked.
>
> First thing I did was scan for root kits in all the places one would
> expect.
>
> Nothing found.
>
> After giving the machine a thorough scan...
> the root kit was found "hiding" in the restore volume!

So what? That "restore volume" wasn't active & posed no threat unless you
or the user selected that particular Restore Point.

As for detecting rootkits:

Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015
<QP>
Backdoor.Tidserv does a very good job in that sense, especially with the
latest version (TDL3), which uses an advanced rootkit technology to hide its
presence on a system by infecting one of the low-level kernel drivers and
then
covering its tracks. *While the rootkit is active there is no easy way to
detect the infection*, and because it goes so deep into the kernel, most
users
cannot see anything wrong in the system...Even worse, because the infected
driver is critical for system boot-up, Windows will not boot in Safe Mode
either [after having installed MS10-015 on an infected machine]. [*emphasis
mine*]
</QP>
http://www.symantec.com/connect/blogs/tidserv-and-ms10-015

Tdss rootkit silently owns the net
<QP>
Tdss rootkit 3rd variant is the last member of Tdss rootkit family that is
quickly spreading around the world. While a number of rootkits are just
developed as a proof of concept, this is not the case. Tdss rootkit is well
known to antivirus companies because of its goal to get total control of the
infected PCs and using them as zombies for its botnet.

During these years it has always shown a team of skilled people behind it,
who
always applied advanced techniques *often able to bypass antirootkit
softwares*.
Actually, this last variant could be easily named as the stealthiest rootkit
in the wild.

This infection is bringing all together the best of MBR rootkit, the best of
Rustock.C and the experience of old Tdss variants. Result is an infection
that
is quickly spreading on the net and it is *undetected by almost every
security
software and 3rd party anti rootkit software*.

....currently [20 Nov-09] *no antirootkit is able to bypass disk filtering
technique* used by Tdss rootkit but, even if it was possible, this rootkit
could not be detected by file size cross check because file size of the
original and infected files are exactly the same. [*emphasis mine*]
</QP>
http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html