Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus: The page does not support your version of browser


  • Please log in to reply
8 replies to this topic

#1 jose.rob.jr

jose.rob.jr

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:10 PM

Posted 06 June 2011 - 02:07 PM

Hello, I found your forum when searching about this virus and I found that topic: http://www.bleepingcomputer.com/forums/topic400108.html

Well, I'm from Brazil, I work in a big organization and I manage a network with a lot computers.

All the computers are registered in an Active Directory's domain and they are configured to use serv01 (10.1.48.1) and babilonia01 (10.1.48.2) as domain controller and for DNS lookups.

My network has 2 internet servers called 10.1.48.13, 10.1.48.11 (10.1.48.5 is the same as 10.1.48.11, 2 IPs on the same interface). Both them has a proxy server non-restrictive and can also be used has gateway server.

My netmask is 255.255.252.0 and broadcast 10.1.51.255

The virus is causing random computers to show a phishing pages instead of the requested ones.

For example, http://intranet is a bind to http://babilonia01 which is the same as http://10.1.48.2

When some users try to access http://intranet the get the following screen:
http://imageshack.us/photo/my-images/88/intranet.png/

This is not linked to the browser because the same thing happens when I try with firefox (fresh install)
http://imageshack.us/photo/my-images/51/intranet6.png/

And this is not linked to the operating system because there are others threads over the internet affecting Mac OS:
http://forums.macrumors.com/showthread.php?t=1161636

Possible Virus/Malware:"Red the page does not support your version of browser"

http://answers.yahoo.com/question/in...7194222AAJFsHU
So many different things and suggestions, so I have no idea what to do. And to make it more difficult I do not have the issue, my aunt does over in LA and I am 1/2 way across the world. I usually solve my problems by trial and error and i can go down the list of suggestions but I would need to give her more specific instructions. Making it worse, most of them on there are windows not mac.

http://imageshack.us/photo/my-images/846/photova.jpg/


If I click Browser update it will download a virus (of course)
http://imageshack.us/photo/my-images/220/intranet4.png/
https://www.virustotal.com/file-scan/report.html?id=2a44dbea69d83111bdc05bc1d96e815f5a0670f392050898e542bd1a9dcb82a5-1307348486

I was trying to understand why the virus would be trying to catch my users if he is already infected. The answer is that the computer is NOT INFECTED.

After some time studding it, I found that there are some infected computers in my network acting as DHCP server, so when I a machine search a server it may find the infected PC or my real server (10.1.48.2). The infected PC will not create an IP, it asks my real server (or another PC, i don't know) what he should answer and then gives an answer but replacing the DNS servers to 188.229.88.8.
http://imageshack.us/photo/my-images/600/cap12n.png/ (this PC was working normally, it's using my real server)
http://imageshack.us/photo/my-images/89/cap14.png/ (ipconfig /relase then /renew on the same PC and an infected PC answered the request. 10.1.48.232 and it got affected)

The IP 188.229.88.8 is not part of my network, so I assume it's in the internet.

It resolves with success any domain to the address 188.229.88.8
http://imageshack.us/photo/my-images/850/cap6.png/ (in this example the DNS resolves a.b.c.d to 188.229.88.8)
http://imageshack.us/photo/my-images/268/cap9.png/

It the phishing page is not displayed with other IPs, only with 188.229.88.8
http://imageshack.us/photo/my-images/8/cap10h.png/

The http://188.229.88.8 does not display the phishing page if an infected PC did not give you an IP, so I think the 188.229.88.8 and infected PCs have a connection.

188.229.88.8 says it's running PHP 5.2 in Apache through headers.
http://imageshack.us/photo/my-images/840/cap11.png/


A way to discover infected PCs is to keep releasing and renewing IP address to grab others DHCP servers.

In the thread I found this site says that some people could remove the virus from infected PCs using that tool:
http://support.kaspersky.com/viruses/solutions?qid=208280684

The tool detects the virus by it's DHCP server and delete it.

I could not try yet, but I'll try tomorrow.

I also could not test the infected PCs yet, and I'll also do it tomorrow.

I'm sharing all this with you to help you to solve related issues and to expand informations about it on the internet, helping people who works on antivirus companies.



If you already know a way to remove it, or to block it, please share.

Tomorrow I'll try to block that IP with iptables, but I'm not sure if that will work since it may be dynamic.

===============================
edit: fixed the ip address, the correct is: 188.229.88.8
after some searchs i found that 188.229.88.7 does the same.

I can access http://188.229.88.8 and http://188.229.88.7 in my house, so it is an internet address, and it displays the phishing page to everyone (maybe I typed the wrong ip earlier)

Edited by jose.rob.jr, 06 June 2011 - 07:27 PM.


BC AdBot (Login to Remove)

 


#2 jose.rob.jr

jose.rob.jr
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:10 PM

Posted 09 June 2011 - 09:53 AM

I've finally resolved this issue here.

The infected PC was a notebook plugged in my network without authorization.

To find it, I used 3Com Network Supervisor and a small software that I did to find strange DHCP servers.

The software basically keeps executing the following commands:
ipconfig /release
ipconfig /renew
ipconfig /all

Then it gets the who gives the DHCP Server and adds to a list.

I've uploaded to share, but it only works with Windows in Portuguese Language.
http://www.fileserve.com/file/CDKqyQq

If you want adapt to your language, I've uploaded the source code:
http://www.fileserve.com/file/uZ23Xjz

Note that when running this software you will loose your network connection to catch the infected PCs

The left list has DHCP servers and the right list displays what the software is doing.

If you want free an affected PC from an infected PC (a PC which displays the red page but is not infected yet), reboot the computer or try ipconfig /release and ipconfig /renew

Use ipconfig /all to view the DHCP Server and see if you are being a affected.

The infected PC gives a lease time of one hour

Good Luck

Edited by jose.rob.jr, 09 June 2011 - 09:59 AM.


#3 jose.rob.jr

jose.rob.jr
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:10 PM

Posted 09 June 2011 - 09:55 AM

Moderator, please, could you edit the topic subtitle to "[Resolved] Virus: The page does not support your version of browser" ?

Thanks

Edited by jose.rob.jr, 09 June 2011 - 09:56 AM.


#4 MetalBlessing

MetalBlessing

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:10 PM

Posted 10 June 2011 - 10:04 AM

I have a user in my company who has the same issue, originally I scanned his pc with malwarebytes and it came back clean, so I advised him that he likely had not been infected since he did not actually click the button on the page. But the next day he started getting this page again so I was stumped.

Reading this article gave me some insight, I will try to release/renew as you mentioned and see where that puts us. I have also read that resetting the router to the factory settings is a good solution as well.

#5 Stor-A11

Stor-A11

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 10 June 2011 - 11:37 AM

You can scan for rogue DHCP servers using Microsoft's Rogue DHCP Server detection tool.

#6 jose.rob.jr

jose.rob.jr
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:10 PM

Posted 12 June 2011 - 07:04 PM

When I was having the issue I added that 3 IPs as additional IP on a linux server, so it was conflicting with the bad dns servers and was preventing the red page to be displayed. Of course you can block the ips on a router, but when you are not allowed do it and you can't change nothing on the gateway, the conflicts helps :P

ifconfig eth0:1 188.229.88.7 netmask 255.255.255.255 up
ifconfig eth0:2 188.229.88.8 netmask 255.255.255.255 up
ifconfig eth0:3 188.229.88.9 netmask 255.255.255.255 up

This doesn't works on windows servers because it doesn't allow you to set the 255.255.255.255 netmask manually.

Edited by jose.rob.jr, 12 June 2011 - 07:04 PM.


#7 Mr. Bank

Mr. Bank

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:05:10 AM

Posted 22 June 2011 - 02:01 AM

How do you clean the infected machine? I have tried with Kaspersky Anti-Virus 2012, Reanimator and Tdsskiller, but not of them found the virus/melware. Also I am working in a hotel where the new guests may come in with the virus/melware and affecting other guest. How to prevent the problem in the future, except from manually trying to find the infected machine? Thank you guys very much in advance for the help.

#8 Marcus Suridius

Marcus Suridius

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:10:10 PM

Posted 07 July 2011 - 03:28 PM

My computer was locked out with this virus for two days, I couldn't get an answer from my ISP because I work for them. It locked out two of the computers in my house, finally found this page and a link to TDSS Killer. I transferred it to the infected computers via ethernet cable and ran it. Found three viruses and after rebooting I finally had access to the internet on my PC. Excellent tool.

#9 ```007

```007

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:40 AM

Posted 28 July 2011 - 07:34 AM

plz help me
even my pc having same problem first its started from google redirection and page comes with your browser needs to be upagrade i clicked on that then i found soultion that is tdsskiller and it found rootkit then i deleted that but my dns server address was not changing and it was 188.229.88.8 so i formated windows 7 and reinstalled it but no use still that dns address is 188.229.88.8 what to do ?
i m in lan network and more than 100 pc are in lan i cant go everyones house and see who is infected!
even i did complaint at my internet provider office but no use they also said we cant check everyones pc so plz tell me what to do i cant configure what u told abt that java source code and all i m noob plz tell me what to do?
problem is only that dnsserver address is 188.229.88.8 and i cant remove it or replace it :(




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users