From: philo on
PA Bear [MS MVP] wrote:
> philo wrote:
> <snip>
>> About a year ago I repaired a machine that had been compromised.
>>
>> It had been used for on-line banking and credit card transactions
>> and two accounts had been hacked.
>>
>> First thing I did was scan for root kits in all the places one would
>> expect.
>>
>> Nothing found.
>>
>> After giving the machine a thorough scan...
>> the root kit was found "hiding" in the restore volume!
>
> So what? That "restore volume" wasn't active & posed no threat unless
> you or the user selected that particular Restore Point.
>



You missed the point entirely..

the root kit was able to "phone home"

from within the restore volume.

those Russian chaps are rather clever
From: PA Bear [MS MVP] on
philo wrote:
>> <snip>
>>> About a year ago I repaired a machine that had been compromised.
>>>
>>> It had been used for on-line banking and credit card transactions
>>> and two accounts had been hacked.
>>>
>>> First thing I did was scan for root kits in all the places one would
>>> expect.
>>>
>>> Nothing found.
>>>
>>> After giving the machine a thorough scan...
>>> the root kit was found "hiding" in the restore volume!
>>
>> So what? That "restore volume" wasn't active & posed no threat unless
>> you or the user selected that particular Restore Point.
>
> You missed the point entirely..
>
> the root kit was able to "phone home"
> from within the restore volume.

Sez who?
From: Daave on
philo wrote:
> PA Bear [MS MVP] wrote:
>> philo wrote:
>> <snip>
>>> About a year ago I repaired a machine that had been compromised.
>>>
>>> It had been used for on-line banking and credit card transactions
>>> and two accounts had been hacked.
>>>
>>> First thing I did was scan for root kits in all the places one would
>>> expect.
>>>
>>> Nothing found.
>>>
>>> After giving the machine a thorough scan...
>>> the root kit was found "hiding" in the restore volume!
>>
>> So what? That "restore volume" wasn't active & posed no threat
>> unless you or the user selected that particular Restore Point.
>>
>
>
>
> You missed the point entirely..
>
> the root kit was able to "phone home"
>
> from within the restore volume.
>
> those Russian chaps are rather clever

If the rootkit was phoing home, it was doing so from a location other
than the restore volume. Just because you are unable to detect it
doesn't mean it isn't there!


From: philo on
Daave wrote:
> philo wrote:
>> PA Bear [MS MVP] wrote:
>>> philo wrote:
>>> <snip>
>>>> About a year ago I repaired a machine that had been compromised.
>>>>
>>>> It had been used for on-line banking and credit card transactions
>>>> and two accounts had been hacked.
>>>>
>>>> First thing I did was scan for root kits in all the places one would
>>>> expect.
>>>>
>>>> Nothing found.
>>>>
>>>> After giving the machine a thorough scan...
>>>> the root kit was found "hiding" in the restore volume!
>>> So what? That "restore volume" wasn't active & posed no threat
>>> unless you or the user selected that particular Restore Point.
>>>
>>
>>
>> You missed the point entirely..
>>
>> the root kit was able to "phone home"
>>
>> from within the restore volume.
>>
>> those Russian chaps are rather clever
>
> If the rootkit was phoing home, it was doing so from a location other
> than the restore volume. Just because you are unable to detect it
> doesn't mean it isn't there!
>
>


I'll answer the both of you here:

Wrong
From: Daave on
philo wrote:
> Daave wrote:
>> philo wrote:
>>> PA Bear [MS MVP] wrote:
>>>> philo wrote:
>>>> <snip>
>>>>> About a year ago I repaired a machine that had been compromised.
>>>>>
>>>>> It had been used for on-line banking and credit card transactions
>>>>> and two accounts had been hacked.
>>>>>
>>>>> First thing I did was scan for root kits in all the places one
>>>>> would expect.
>>>>>
>>>>> Nothing found.
>>>>>
>>>>> After giving the machine a thorough scan...
>>>>> the root kit was found "hiding" in the restore volume!
>>>> So what? That "restore volume" wasn't active & posed no threat
>>>> unless you or the user selected that particular Restore Point.
>>>>
>>>
>>>
>>> You missed the point entirely..
>>>
>>> the root kit was able to "phone home"
>>>
>>> from within the restore volume.
>>>
>>> those Russian chaps are rather clever
>>
>> If the rootkit was phoing home, it was doing so from a location other
>> than the restore volume. Just because you are unable to detect it
>> doesn't mean it isn't there!
>>
>>
>
>
> I'll answer the both of you here:
>
> Wrong

Unsubstantiated.

It has already been established that certain rootkits are
next-to-impossible to detect.

The rootkit that you say was "hiding" in the restore point obviously
wasn't hidden! However, the rootkit very likely remained in the system
(the restore volume doesn't count unless you use SR, using that
particular restore point), hidden from you. And your situation is not
the only one.