Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

How did I get infected?


  • Please log in to reply
117 replies to this topic

#61 Eqwatz

Eqwatz

  •  Avatar image
  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida USA
  • Local time:03:24 PM

Posted 16 February 2012 - 06:59 PM

I tell people to use puppy Linux when surfing indiscriminately on the web. The newest puppy just works, and that is with router and firewall FIOS. And, it is a nice clean interface. To be honest, there are times when a virus/trojan is a puzzle to solve, and other times when it is time to hit F11 with TI.

BC AdBot (Login to Remove)

 


#62 aninkling

aninkling

  •  Avatar image
  • Members
  • 129 posts
  • OFFLINE
  •  
  • Local time:03:24 PM

Posted 02 March 2012 - 11:03 AM

There is something "missing" from your tips, and it is the most common form of "infection." The situation is:
  • Your computer is locked down and all guidelines have been followed
  • You don't use email on your computer. You use yahoo, aol, or something similar... Google seems to not have so many problems
  • Someone starts sending out spam and infected emails using your email address
  • You run all the virus detection methods. Your computer is clean. You are not being rerouted.
  • You call the email provider and all they say is "change your password"
  • They can not describe "how" your username and, apparently, at least some of your contact list was hijacked.
Would someone please explain how this is happening? What are the techniques used? Is "changing your password" the remedy? Should you send an email to everyone telling them what they are receiving is a hoax, or will this allow the hacker to gain access to more of your contact list?

I think this is the most common infection I find in my experience as an amateur security consultant to my community.

Edited by aninkling, 02 March 2012 - 11:06 AM.


#63 Animal

Animal

    Bleepin' Animinion


  •  Avatar image
  • Helper Emeritus
  • 35,905 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Where You Least Expect Me To Be
  • Local time:12:24 PM

Posted 02 March 2012 - 11:11 AM

Email spoofing is the most common reason. Google that term and you'll have more information than you could have hoped for.

Good write up here to get you started. http://ask-leo.com/someones_sending_from_my_email_address_how_do_i_stop_them.html

The Internet is so big, so powerful and pointless that for some people it is a complete substitute for life.
Andrew Brown (1938-1994)


A learning experience is one of those things that say, "You know that thing you just did? Don't do that." Douglas Adams (1952-2001)


"Imagination is more important than knowledge. Knowledge is limited. Imagination circles the world." Albert Einstein (1879-1955)

Follow BleepingComputer on: Facebook | Twitter | Google+

#64 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:24 PM

Posted 02 March 2012 - 03:56 PM

Adding to Leo's comments.

A spambot is a type of web crawler designed to scan the Internet and extract e-mail addresses and hyperlinks from various sources (newsgroups, bulletin boards, web pages, chat rooms, etc) in order to build mass mailing lists for sending unsolicited e-mail (spam). The spambot stores the email addresses to use as targets for spam, and then follows each hyperlink to a new page, where it starts the process all over again. Spambots and Email relays typically come packaged with rootkits so I'd be concerned about what happened. Rather than take a chance, I would change all my passwords to be on the safe side...that's most likely why the the email provider advises to change them.

If using a router, I would also reset it with a strong logon/password before connecting again.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#65 Eqwatz

Eqwatz

  •  Avatar image
  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida USA
  • Local time:03:24 PM

Posted 02 March 2012 - 11:10 PM

I tell people to use puppy Linux when surfing indiscriminately on the web. The newest puppy just works, and that is with router and firewall FIOS. And, it is a nice clean interface. To be honest, there are times when a virus/trojan is a puzzle to solve, and other times when it is time to hit F11 with TI.


In case there are those not familiar:
Puppy Linux is a Live CD version of Linux. It loads directly into ram via your CD/DVD drive. Since it only exists in temporary memory, nothing can be written to your hard drive unless you choose to mount the hard drive and write to it. It is the ultimate protection from infection--and offers the possibility of retrieving information from a broken installation or manually cleaning all of the temp files, cookies, caches, browser helper objects and such when attempting to recover from an infection.

TI is True Image a back up and recovery program with a lot of options and power. Inexpensive for what it does for private users. There are more alternatives than there used to be.

#66 johhny

johhny

  •  Avatar image
  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:24 PM

Posted 09 May 2012 - 06:35 AM

Great precaution, really helpful.

#67 iceman85

iceman85

  •  Avatar image
  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:24 PM

Posted 27 January 2013 - 04:59 PM


I tell people to use puppy Linux when surfing indiscriminately on the web. The newest puppy just works, and that is with router and firewall FIOS. And, it is a nice clean interface. To be honest, there are times when a virus/trojan is a puzzle to solve, and other times when it is time to hit F11 with TI.


In case there are those not familiar:
Puppy Linux is a Live CD version of Linux. It loads directly into ram via your CD/DVD drive. Since it only exists in temporary memory, nothing can be written to your hard drive unless you choose to mount the hard drive and write to it. It is the ultimate protection from infection--and offers the possibility of retrieving information from a broken installation or manually cleaning all of the temp files, cookies, caches, browser helper objects and such when attempting to recover from an infection.

TI is True Image a back up and recovery program with a lot of options and power. Inexpensive for what it does for private users. There are more alternatives than there used to be.


I am using ubuntu in live version, and I believe the latest releases is probably the most stable of Linux distrubs. For those who are new to Linux, its a great (and easy) first-step.

#68 phil_carter

phil_carter

  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:24 AM

Posted 31 January 2014 - 04:29 AM

there are really good advices here actually..however here you are one from me :).. i found out that the combination antivirus software and browser adblock program does a great work...because sometimes when I am in a hurry click on banners without actually wanted to do it..as we all know banner and ads are really like a door in the virtual hell...:) 



#69 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:24 PM

Posted 31 January 2014 - 07:31 AM

Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#70 saint satin stain

saint satin stain

  •  Avatar image
  • Members
  • 150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Huntsville, AL and Greenwich Village
  • Local time:03:24 PM

Posted 12 February 2014 - 10:13 AM

The old stalwart SpywareBlaster is helpful and free, unless you want automatic updates instead of manual. Auto is ten dollars a year.


saint satin stain
Responsible for what I say,
not for what you understand.
www.leftinalabama.com


#71 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:24 PM

Posted 12 February 2014 - 10:50 AM

The old stalwart SpywareBlaster is helpful and free, unless you want automatic updates instead of manual. Auto is ten dollars a year.


SpywareBlaster has been mentioned several times already in this topic. In fact. In fact, you essentially made the same comment in Post #48.

....the old stalwart, SpywareBlaster...the paid version of SpywareBlaster adds autoupdate for ten dollars a year.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#72 saint satin stain

saint satin stain

  •  Avatar image
  • Members
  • 150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Huntsville, AL and Greenwich Village
  • Local time:03:24 PM

Posted 12 February 2014 - 12:15 PM

Forgive me. I saw a note to myself, mention SpywareBlaster, Bit forgetful sometimes. Before I post I'll search my posts and others.


saint satin stain
Responsible for what I say,
not for what you understand.
www.leftinalabama.com


#73 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:24 PM

Posted 12 February 2014 - 01:21 PM

Ok...I just wanted you to be aware so you don't post duplicate replies.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#74 norah22

norah22

  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 5 posts
  • OFFLINE
  •  

Posted 21 February 2014 - 09:50 PM

Hello, I also think p2p programs effect a lot. I dont get such infections as I have Krojam Cleaner in my system which protects me. Great to know more infecting reasons.

#75 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:24 PM

Posted 21 February 2014 - 10:01 PM

Using any torrent, peer-to-peer (P2P) file sharing program (i.e. Limewire, eMule, Kontiki, BitTorrent, BitComet, uTorrent, BitLord, BearShare, Azureus/Vuze, Skype, etc) or visiting such sites is a security risk which can make your system susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. In some cases the computer could be turned into a virus honeypot or zombie. File sharing networks are thoroughly infected and infested with malware according to Senior Virus Analyst, Norman ASA. As such, it is not uncommon for some anti-virus/anti-malware disinfection tools to detect torrent related files and programs as a threat and attempt to remove them.

The reason for this is that file sharing relies on its members giving and gaining unfettered access to computers across the P2P network. This practice can make you vulnerable to data and identity theft, system infection and remote access exploit by attackers who can take control of your computer without your knowledge. Even if you change the risky default settings to a safer configuration, downloading files from an anonymous source increases your exposure to infection because the files you are downloading may actually contain a disguised threat. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install malware. Many malicious worms and Trojans, such as the Storm Worm, target and spread across P2P files sharing networks because of their known vulnerabilities.

Further some file sharing programs are bundled with other free software you may download (sometimes without the knowledge or consent of the user) and can be the source of various issues and problems to include Adware, and browser hijackers as well as malware.

Even the safest P2P file sharing programs that do not contain bundled spyware, still expose you to risks because of the very nature of the P2P file sharing process. By default, most P2P file sharing programs are configured to automatically launch at startup. They are also configured to allow other P2P users on the same network open access to a shared directory on your computer. The best way to eliminate these risks is to avoid using P2P applications and torrent web sites.Using such programs or browsing torrent sites is almost a guaranteed way to get yourself infected!!

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users