Notices
Computer & Technology Related Post here for help and discussion of computing and related technology. Internet, TVs, phones, consoles, computers, tablets and any other gadgets.

Fcuking Virus

Thread Tools
 
Search this Thread
 
Old 07 January 2003, 05:31 PM
  #1  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Post

Thanks for the help

It has put my mind at rest

[Edited by Adrian F - 7/1/2003 5:31:49 PM]
Old 07 March 2003, 08:58 PM
  #2  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Question

Jack thanks for the help was just reading the latest on this thread when the Firewall warning poped up again saying it had blocked the default subseven/back door trojan for 30 minutes and that the computer Protocol was TCP (inbound) gives the remote address as 81.40.115.111:4258 does this confirm what you were saying? i assume yes because it says in bound?

[Edited by Adrian F - 7/3/2003 8:59:36 PM]
Old 28 June 2003, 02:08 PM
  #3  
Brun
Scooby Senior
 
Brun's Avatar
 
Join Date: Apr 2002
Location: Harrogate
Posts: 14,229
Likes: 0
Received 5 Likes on 5 Posts
Post

I've just been hit by a Backdoor.Coreflood virus.
On removal, Norton suggests deleting some value or other using Regedit. This sounds like sommat a computer muppet like me doesn't need to be doing. Can anyone show me the way forward.
Just as a side note, at least once every 3 weeks or so, i get attacked by a Backdoor.Trojan, and i assume this requires a bit of regedit too
Old 28 June 2003, 02:11 PM
  #4  
Brun
Scooby Senior
 
Brun's Avatar
 
Join Date: Apr 2002
Location: Harrogate
Posts: 14,229
Likes: 0
Received 5 Likes on 5 Posts
Post

Double post

[Edited by Brun - 6/28/2003 2:11:48 PM]
Old 28 June 2003, 03:56 PM
  #5  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

Keeping your current Antivirus up to date or changing brand is your first step. This particular nasty has been around since 10/05/2001. Symantec's instructions for removing the reg key are about as simple as they get, can't offer any more advice online, perhaps a call to support is in order, they will hand hold you through the process.

[brag]McAfee would have done the registry edit for you[/brag]
Old 28 June 2003, 11:13 PM
  #6  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Post

Slightly different but i have a Sub Seven Trojan and run Norton as well which the fire wall seems to block all the time(I hope) but the anti virus won't find and remove? yet Norton gets good reviews in the magazines (and i am a simpleton with PC's)

Best step forward?
Old 28 June 2003, 11:55 PM
  #7  
boomer
Scooby Senior
 
boomer's Avatar
 
Join Date: Feb 2000
Location: West Midlands
Posts: 5,763
Likes: 0
Received 0 Likes on 0 Posts
Lightbulb

Adrian F,

if you are getting something like (as per mine early yesterday morning)...

Date: 28-Jun-2003 Time: 01:22:41
Rule "Default Block Backdoor/SubSeven Trojan" blocked (MYPC,27374). Details:
Inbound TCP connection
Local address,service is (MYPC,27374)
Remote address,service is (80.202.92.237,14748)
Process name is "N/A"


...in your Norton Firewall logfile, then this is some **** trying to connect to a SubSeven trojan (should it be running on your PC and should you not have a firewall).

The message is just Norton confirming that it has done it's job and stopped said **** from getting into your Pooter.

mb
Old 29 June 2003, 12:10 AM
  #8  
stevem2k
Scooby Regular
 
stevem2k's Avatar
 
Join Date: Sep 2001
Location: Kingston ( Surrey, not Jamaica )
Posts: 4,670
Likes: 0
Received 0 Likes on 0 Posts
Post

Here's the abuse@ details for the geezer trying to connect ....

Steve

inetnum: 80.202.16.0 - 80.202.122.255
netname: NEXTGENTEL-NO
descr: XDSL access and service provider in Norway
country: NO
admin-c: BN284-RIPE
tech-c: NGT5-RIPE
status: ASSIGNED PA
notify: hostmaster@nextgentel.com
mnt-by: NO-NEXTGENTEL-MNT
changed: aso@nextgentel.com 20020918
changed: aso@nextgentel.com 20021016
source: RIPE

route: 80.202.0.0/15
descr: NextGenTel Network
origin: AS15659
cross-mnt: NO-NEXTGENTEL-MNT
notify: hostmaster@nextgentel.com
mnt-by: NO-NEXTGENTEL-MNT
changed: aso@nextgentel.com 20011205
source: RIPE

role: NextGenTel Hostmaster
remarks: ---------------------
remarks: NextGenTel AS is an xDSL accessprovider in Norway.
remarks: NextGenTel hostmaster maintain the RIPE objects for
remarks: its own infrastructure and customers.
remarks: For trouble and abuse reports use
remarks: - abuse@nextgentel.com for DOS attack, Virus, Abuse,
remarks: Hacking, Copyright reports
remarks: - hostmaster@nextgentel.com for Network related fault
remarks: and reports
remarks: ---------------------
address: Sandslimarka 31
address: P.O Box 3 Sandsli
address: N-5861 Bergen
address: Norway
address: ---------------------
phone: +47 55527900
fax-no: +47 55527910
e-mail: abuse@nextgentel.com
e-mail: hostmaster@nextgentel.com
Old 29 June 2003, 12:23 AM
  #9  
boomer
Scooby Senior
 
boomer's Avatar
 
Join Date: Feb 2000
Location: West Midlands
Posts: 5,763
Likes: 0
Received 0 Likes on 0 Posts
Question

stevem2k,

do you think that it is worth contacting the ISP of "hacker PCs"? These days my firewall picks up loads of incoming attempts - some just your common or garden virus ones (e.g. port 445, ms-sql-s etc.), and others more specific (e.g. SubSeven, FTP, HTTPS, Echo Requests).

I (perhaps wrongly) assume that SubSeven and the like are coming from a PC that itself has been hacked, thus the ISP probably can't do much. Do many ISPs take serious action???

mb
Old 29 June 2003, 12:36 AM
  #10  
stevem2k
Scooby Regular
 
stevem2k's Avatar
 
Join Date: Sep 2001
Location: Kingston ( Surrey, not Jamaica )
Posts: 4,670
Likes: 0
Received 0 Likes on 0 Posts
Post

It's of variable results tbh. When I can be bothered I go through the logs and send off to abuse@ for all the uk/european ISP's that have attempted repeated connects. No point if they are in asia, as nothing gets done in my experience.

I had > 300 attempted connects yesterday, mostly NetBios from virus'ed up machines probably, but I have obviously been port scanned at some point as there is an 'odd' port open ( but only to one address ) and I keep getting connection attempts on it.

SQL/Slammer is still out there and shows up in the Snort logs, as do all the nmap connects...

Can't reccommend a hardware firewall enough if you have multiple machines/permanent connections. I use smoothwall.

Steve
Old 29 June 2003, 09:02 AM
  #11  
Jeff Wiltshire
Scooby Regular
 
Jeff Wiltshire's Avatar
 
Join Date: Nov 2000
Location: 412 Wheel HP Audi RS4
Posts: 2,021
Likes: 0
Received 1 Like on 1 Post
Post

The best thing to do is to sign up to www.dshield.org and get them to do the 'fightback'.....
Old 29 June 2003, 06:22 PM
  #12  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Unhappy

Boomer yes the Norton Firewall is blocking it (hopefully all the time) but i was confused why the antivirus didn't remove it.

Though i have had the latest live update and now no firewall warnings! so maybe it has removed it or the Trojan is not being detected by the Firewall any more or is dormant? Don't know enough to work it out and when you look in books in WH Smiths or PC world they just tell you what a Trojan is! That i know.
Old 30 June 2003, 11:42 PM
  #13  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Unhappy

as of today still getting fire wall warnings of Back door/subseven trojan but Norton with latest updates can't find it on my PC anybody got any suggestions?
Old 01 July 2003, 12:05 AM
  #14  
boomer
Scooby Senior
 
boomer's Avatar
 
Join Date: Feb 2000
Location: West Midlands
Posts: 5,763
Likes: 0
Received 0 Likes on 0 Posts
Post

Adrian F,

(in simple terms) when your computer is on the Internet, it is "identified" by other computers by it's IP address (e.g. 12.34.56.78). Normally it is your computer talking to the Internet such as connecting to ScoobyNet (i.e. outbound connections).

If another computer wants to talk to yours, it finds it via the IP address, but then specifies a port to communicate with. These "ports" and known by numbers, and many are what are known as "well known ports" on which a program listen. When a connection comes in on a given port, the program springs into life and does something - such as receive e-mail.

When you have a trojan, it sits listening on a port (e.g. 27374 for SubSeven, as per my log entry above) and when the hacker connects, the trojan program activates (and sometimes asks for a password). This effectively gives the hacker access to your computer.

If you don't have a trojan on your computer, then there is nothing listening on the port, so the incoming hacker connection will fail.

If you have a firewall installed, it already knows about what ports are used by trojans, and blocks them automatically - whether or not you actually have a trojan on your computer!!!

So, the messages in your firewall log are attempts to connect, but which fail ('cos your firewall stopped them), and which would fail even without a firewall, because you (probably) don't have the trojan program on your computer anyway!!!

SO DON'T GET WORRIED - YOU SHOULD BE SAFE!!!

mb
Old 01 July 2003, 12:14 AM
  #15  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

Think of a burglar trying a key in a street full of doors. His key didn't fit your door and you caught him trying.
Old 01 July 2003, 06:33 PM
  #16  
Nicks VR4
Scooby Regular
 
Nicks VR4's Avatar
 
Join Date: May 2003
Posts: 1,165
Likes: 0
Received 0 Likes on 0 Posts
Post

Adrian F
how to remove Subseven
Old 02 July 2003, 05:17 PM
  #17  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Unhappy

Thanks Nick
I had looked at that page but i will have to find a few hours to try and get my head round this as it is above my level of skill with a PC and also as said above the Norton AntiVirus can't find this Trojan but the firewall see's it so maybe it is like some body trying to scan the ports of my PC?

Or some other software tricking the Norton Firewall into thinking that it has a trojan runing?
Old 02 July 2003, 05:37 PM
  #18  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

You don't need to do anything, as I said earlier you caught the bugger outside your door not inside your house.
Old 02 July 2003, 06:06 PM
  #19  
Nicks VR4
Scooby Regular
 
Nicks VR4's Avatar
 
Join Date: May 2003
Posts: 1,165
Likes: 0
Received 0 Likes on 0 Posts
Post

Jack were talking about computer virus's not burglars in the back garden lol
Old 03 July 2003, 10:34 AM
  #20  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

Virtual Burglars, Virtual Back Gardens, Virtual Virology. That rings a bell Ding Dong
Old 03 July 2003, 05:44 PM
  #21  
shunty
Scooby Regular
 
shunty's Avatar
 
Join Date: Aug 2001
Location: wakefield
Posts: 2,082
Likes: 0
Received 0 Likes on 0 Posts
Post

Jack,
you getting any reports of the Dbourne-Q virus doing the rounds again ??

cheers

shunty
Old 03 July 2003, 06:32 PM
  #22  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

I'm not logged in at the mo, it's not bad enough for anyone to call me if that helps.
Old 03 July 2003, 09:11 PM
  #23  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

Correct. You're fine.

The person trying to connect to your machine is most likely using the Telefonica network from Madrid, Spain. Unfortunately getting his house number is a bit more difficult.
Old 03 July 2003, 11:49 PM
  #24  
Adrian F
Scooby Regular
Thread Starter
 
Adrian F's Avatar
 
Join Date: Nov 2001
Posts: 2,122
Likes: 0
Received 0 Likes on 0 Posts
Post

Thanks!!
Old 04 July 2003, 09:37 AM
  #25  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

Shunty, nothing major here.
Old 04 July 2003, 12:04 PM
  #26  
shunty
Scooby Regular
 
shunty's Avatar
 
Join Date: Aug 2001
Location: wakefield
Posts: 2,082
Likes: 0
Received 0 Likes on 0 Posts
Post

cheers Jack, I believe this virus lays dormant ?? can't seem to find a definitive answer on how it spreads though.
I know payload doesn't activate until user either logs off or re-boot ??

cheers

shunty
Old 04 July 2003, 08:33 PM
  #27  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,852
Received 51 Likes on 34 Posts
Post

Here's as much as I know, I can ask for more detail in the lab on Monday if you like.
Old 07 July 2003, 08:34 AM
  #28  
shunty
Scooby Regular
 
shunty's Avatar
 
Join Date: Aug 2001
Location: wakefield
Posts: 2,082
Likes: 0
Received 0 Likes on 0 Posts
Post

thanks Jack, that's exactly what I was looking for....
I thought it must be netbios type infection as we keep cleaning every pc/server, all pattern files are up to date etc....but it keeps coming back.
So it had to be pc's/servers getting IP but not on domain.

cheers

shunty
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
Big RS Dave
ScoobyNet General
5
14 April 2001 08:12 PM



Quick Reply: Fcuking Virus



All times are GMT +1. The time now is 05:47 AM.