Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Some general pre, current and post malware questions


  • This topic is locked This topic is locked
2 replies to this topic

#1 Dave-Z

Dave-Z

  • Members
  • 80 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:MD, USA
  • Local time:04:30 AM

Posted 08 November 2011 - 09:06 AM

Hi. I had some questions I hope someone can answer if possible. I'll list them below, thank you.

I have an active infection and am in process of diagnosing, but some important questions continue to arise.

1. My router is likely compromised, even after hard reset.. Is there any way for me to confidently know for sure if it is compromised, and if so, regain control?

(I should mention, I live in a condo complex, so have many wireless networks in range at all times. Likely others are infected and capable of reinfecting my router upon power on)

2. If I have a compromised router, what is my best suggested way of connecting to internet: Ethernet hookup through router anyway or direct ether to cable modem? Keeping in mind the virus can likely disable or control firewall and connections, is the router still providing some safety?

3. Since my system has been compromised, and my hardware info likely went out, are my wireless adapters more susceptible to reinfection? Is there anything I can do to change hardware id info? Especially if I do a reformat/reinstall I don't want my system devices wide open and broadcasting.

4. Must I assume any and all data saved while computer was infected is hazardous? All data and file types? For instance, songs, pictures, iPhone back-up, game data? Is there any way to scan or be sure one way or another?

5. Given my mulitiple network environment, is there any way I can power into a state where I know 100% I am disconnected from Internet?

6. If I need to reformat/reinstall, and this is my only available, is there any way for me to get system up and secure, with updates and AV/firewall? Is there any way to securely download updates/av and be sure of file integrity?

Really appreciate your time and thoughts. Regards. Dave

BC AdBot (Login to Remove)

 


#2 Blathnat

Blathnat

  • Members
  • 224 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:04:30 AM

Posted 09 November 2011 - 02:41 PM

ZDave:

1. It is unlikely that your router is infected. If your machine is infected, it is more likely as the result of a careless click on a link, or clicking on a Fake AV to close it. It is very common to see several other wireless networks when you also use a wireless gateway. That is why it is important to secure your router with a strong password. If your router is unsecured, it is possible for others to use it to enable them to connect to the net.

2. If you connect by using an ethernet cable and disable the wireless, you won't see the other wireless users and it may make you more comfortable.

3. Since you are waiting on another thread to see if you are actually infected, I would recommend waiting for the results before doing anything to your machine. Your wireless adapters are not more susceptible to future infection.

4. Again, wait for the results before saving. Normally personal data is not affected, but music and downloaded game files can be iffy.

5. Right click on the local area connection icon, bottom right, on your desktop. You should see the option to "disable" which will disconnect your machine from the router. If you want to disable the router, turn it off or unplug it.

6. If you have a recovery disc or the ability to reset to factory condition, you would be able to do that once it is determined that it is the best way to go.

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,569 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:30 AM

Posted 09 November 2011 - 04:50 PM

Now that your log is properly posted and replied to, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

The current wait time is 3 - 5 days and ALL logs are amswered.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users