Rootkit Infection Requires Windows Reinstall 510
CWmike writes "Microsoft is telling Windows users that they'll have to reinstall the OS if they get infected with a new rootkit. A new variant of a Trojan Microsoft calls Popureb digs so deeply into the system that the only way to eradicate it is to return Windows to its out-of-the-box configuration, Chun Feng, an engineer with the Microsoft Malware Protection Center (MMPC), said last week on the group's blog. 'If your system does get infected with Trojan:Win32/Popureb.E, we advise you to fix the MBR and then use a recovery CD to restore your system to a pre-infected state,' said Feng. A recovery disc returns Windows to its factory settings."
Boot Disc (Score:2)
Re:Boot Disc (Score:5, Insightful)
Re: (Score:2)
Re:Boot Disc (Score:5, Informative)
If the root kit works like most older boot sector virus programs, it already functions much like Grub does in the sense that it replaces the code that allows the other code to be found and run. But the code represented to the operating system would have a sector 0 in a different location then the real boot sector.
So while you would effectively have moved the first sector as far as windows is concerned, the virus infection would be able to still tank windows because it would still initially attack sector 0. And if it's the old school infection where it uses int13h calls (the bios) instead of windows and or even the old protect mode access to access the HD, it will effectively move the grub install to a new sector and make it think it is in sector 0 on subsequent boots. It will do this the same way Grub or LiLO would make windows think it was loading from the boot sector when it wasn't.
The problem with a boot sector virus is that if the disk is allowed to load any code at all which is the default in the boot process, the manipulation is already in memory and running. You would essentially need to boot from a start up floppy or CD or something without the hard disk loading at boot.
Some modern BIOS configurations allow you to lock the boot sector of the harddrive down much like they started allowing you to lock flashing the bios down. This is about the only way to preempt this as it would give off a warning about something attempting to write to the boot sector of the hard drive. However, experience tells me that when something is trying to write to the boot sector and it fails to do it, you often need to rebuild the boot sector anyways.
Now that is with the initial infection. The attacks it uses to maintain it's infection would work regardless of the operating system because once infected, it's acting as a translation between the operating system and the harddrive. This is why a restore CD is the recommendation to fixing the issues. The CD loads instead of the drive code loading. This way, you are not fixing an infected machine with infected code.
Re: (Score:2)
This is hardly the first or the last to use such tricks. This is why I cannot place any faith in any antivirus being used in the typical configuration - as part of a running Windows system. That just doesnt work.
Way back In the day you had to load your scanner on a boot floppy. These days a linux boot cd is the replacement. A bit bloated, but at least it does the job.
Re:Boot Disc (Score:4, Interesting)
What I do is remove the drive from the system, slap it into an external enclosure and scan from a clean machine after unplugging that machine from the network.
If it kills system files then I replace or repair it once I boot from the recently cleaned hdd. Also, delete the swap file before you plug it back in. hasn't failed me yet.
- Dan.
Re:Boot Disc (Score:4, Interesting)
Yep...once the virus is in the antivirus is useless. The virus will have no problem setting permissions, etc. so your antivirus can't touch it. And...given that most antivirus programs take a week or so to respond to new viruses, it makes them mostly useless.
If somebody's the sort of person who gets viruses an antivirus won't save them.
Re: (Score:3)
Yep...once the virus is in the antivirus is useless. The virus will have no problem setting permissions, etc. so your antivirus can't touch it. And...given that most antivirus programs take a week or so to respond to new viruses, it makes them mostly useless.
If somebody's the sort of person who gets viruses an antivirus won't save them.
This is so untrue, I have to believe I'm missing something here. Antivirus software can often remove infections after the fact, and is also very useful in stopping infections from occurring in the first place. Sure, it's not 100% foolproof, but calling it "mostly useless" and saying it "won't save them" is completely untrue.
Comment removed (Score:4, Informative)
Re: (Score:3)
Re:Boot Disc (Score:4, Insightful)
We really need to go back to a simple (so it can be bug free) boot ROM that is proper ROM, not read/write flash. Hold key sequence to select boot media, and then boot from known-clean media. Anything that is read/write and involved in the boot process can potentially be fucked with to own your box. In the past, there have been BIOS viruses which were extremely difficult to remove - essentially as soon as the machine powers up it is owned and ready to infect whatever media you give it or intercept the operation of AV programs.
Its really only because the extra effort isn't worth it that we don't have far more serious viruses out there that are infecting EFI boot partitions, BIOS and other bits of firmware that Windows and its virus scanner software can't fix, these days.
Re: (Score:3)
It's obvious that many posting here don't know the first thing about how Windows works or why it gets infected. The problem isn't in the boot loader. The MBR is just one place that an attacker can find space to store a bootstrap program that will launch his infecting executable from a file on disk, and then, since that area is read and executed each time the PC is started, it writes to so many critical OS files that removing them from the system or disinfecting them becomes impossible without rendering the
Re:Boot Disc (Score:4, Informative)
a complete wipe and reinstall is the only way you're going to be certain you have a clean system. And this is one of the many reasons you can't get me to run Windows as my primary OS. Sure, I'll run it in a VM hosted on Linux, but no way would I rely on it for my every day computing needs on the bare metal. Fucking garbage without any kind of cogent security system is what Windows is.
Uh. How's that different from a root kit infection on Linux? AFAIK standard practice is if your machine (whether linux or windows) gets infected by a rootkit, you're supposed to reinstall. If you don't then you're just betting/assuming that the attack wasn't so serious. In most cases it isn't, and that's the same for Windows.
The problem is not restricted to Windows. There's a reason why rootkits are called rootkits after all, and not "NT Authority\SystemKits" :).
Re: (Score:2)
Re:Boot Disc (Score:5, Funny)
Wouldn't a Linux or BSD or Haiku or Hack OS X install fix this too? This headline reads a bit like "Flooding requires rebuilding the exact same structure in the annual floodplain",
Re: (Score:3, Insightful)
Re:Boot Disc (Score:5, Insightful)
To continue your flood analogy, you have three options:
1. Build out of so ething floodproof, like concrete. The *entire* house. When a flood happens, no big deal... but making changes to the house would be a big problem. This is the ChromeOS or DeepFreeze aproach: Read-only filesystem and checksums.
2. Build dams, canals and build a few feet into the air. This works for small floods, but if you get something new, it might still wipe you out. This is the Linux aproach: Try to secure things, deal with the few issues as they come up.
3. Build cheaply, and rebuild after each flood. This is the Windows re-image approach: Just assume it's going to get hit, and have a plan to rebuild afterwards.
Just my 2c.
Re: (Score:2)
So your response to flooding is to rebuild in the desert?
Re: (Score:2)
I'd do this from a Linux live USB and have a Windows install on another partition as source. Linux generally ignores NTFS security should be able to overwrite all necessary files on the Windows i
So (Score:3, Insightful)
You always do an OSRI if you get infected by any rootkit.
Reinstall, but not Windows (Score:2, Insightful)
Re: (Score:2)
"The only purpose it serves is to save the geek the trouble of trying to understand why Linux as a client OS is on life support.
I hear this argument every year against Linux as a desktop os. Yet me and my friends continue to chug along quite nicely with our Gnome or KDE desktops and doing quite nicely.
Re:Reinstall, but not Windows (Score:5, Interesting)
The only purpose it serves is to save the geek the trouble of trying to understand why Linux as a client OS is on life support. StatCounter Global Stats [statcounter.com]
Hey, don't count Linux out just yet. It's making progress in some parts of the world..
Like Norfolk Island [statcounter.com]. Next year: Some other isolated bit of humanity. You might think it a hopeless endevour, but when the world goes to hell in a handbasket, who's going to be left holding the keys to mankind's future: Isolated tiny islands in the middle of nowhere.
Face it, you just don't understand the Linux world-domination strategy.
Re: (Score:2)
of course it can't. i forgot.
*switches off hackintoshed eeepc*
Re: (Score:2)
duh (Score:5, Insightful)
The only way a machine can be trusted after ANY infection is an OS reinstall.
Or as ripley said - nuke it from orbit, its the only way to be sure.
Re: (Score:3, Informative)
Even that isn't 100% true with rootkits that can attach themselves to your PCI devices...
Re: (Score:2)
Re: (Score:3)
What? Are you trying to give me a hearth attack? How is that even possible?
Re:Yawn, says OSX. (Score:5, Funny)
You must live in a VERY small basement.
Re: (Score:2)
People still use Windows?
Yeah, about 90% of the computer users in the world still do.
Re: (Score:2)
Even if the virus was stored in the bios, or in a flash rom on some kind of pci device... Would it necessarily be able to function if you were to run a completely different OS on the system?
time to re-think OS architecture (Score:4, Interesting)
We all need a major re-think of how OS is installed on the computer, how it is architected, etc.
Seems to me that a low-level kernel in FLASH, which can only be upgraded with a hardware key inserted (e.g., the kernel FLASH blocks can only be written when there is a physical device plugged into the system), which then supports a number of different OS images using virtual machine concept, is the way to go. I the image of any VM gets rooted, you just toss it and revert to last backup. The flash is immune to tricks, because you must insert a hardware key to upgrade it, so trojans could not over-write the FLASH-based kernel, the worst that can happen is that one of the OS images get corrupted, then you just revert to saved.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Just be sure they don't lose any of them...
Re: (Score:2)
Well, I guess the unemployment issues might be fixed if that happened.
Re: (Score:2)
good idea, but there will always be a backdoor, even to the hardware key, because coders ALWAYS write themselves a back door, and then one day the hackers find it.
Witness the PS3. reverse engineer the service mode dongle, use that to find the backdoor (master key).
Re: (Score:2)
That's the smart phone model. Fully sandboxed, system can only be written after a cryptographic key is obtained from a trusted source (the vendor) and all files synced to another device or the cloud. Get pwned and flash the device with a system image and sync files/settings to get back the exact system state.
Re: (Score:2)
Seems to me that a low-level kernel in FLASH, which can only be upgraded with a hardware key inserted (e.g., the kernel FLASH blocks can only be written when there is a physical device plugged into the system), which then supports a number of different OS images using virtual machine concept, is the way to go.
I don't like it because it makes patching more difficult and does nothing to protect the end users data due to ownage of the guest.
I believe a better policy would just be to not allow untrusted execution of code on lower protection rings even for administrators/root.
Windows CE had a scheme like you describe. When you messed up your PDA you could instantly restore to factory default.
And of course we can't forget AIX which existed on RS6000 with its hardware key at a time when the rest of us were "smart littl
Re: (Score:2)
Wait... wasn't that a bad idea? Or at least thats what the nerds were crying about back in 2005.
Re: (Score:2)
TPM was (and is) a disastrous idea from the point of view of freedom of choice for users of general purpose computers.
TPM (or similar systems) are on the other hand a key element in "walled garden" proprietary environments, such as mobile devices and other embedded systems.
Universal adoption of TPM on PCs would inevitably change them from a "general purpose" into a "walled garden" proprietary environment. Microsoft one. There is not even a faintest doubt about that.
Fortunately a mere "read only" copy of
Re: (Score:2)
Not until they are made to face major financial penalties for repeated stupidity will they stop being stupid. That means NOT repairing their box that they broke by being Fucking Retarded(tm) for the 1000th time.
Re: (Score:2)
Except you and I both know that the idiots who get infected by the new virus every single time, who do the same things we tell them not to every time, will happily open any physical lock because the popup box says to.
Exactly! The only reason people's systems are getting infected by this is because they gave the software privileges even after being warned it was a security risk. It doesn't matter what you do, if you give them the option to bypass security then they voluntarily will.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Physical locks don't help with the dancing bunnies attack.
This is why places are moving towards solutions that combine the physical security with taking root/Administrator/QSECOFR authority away from the end user. It stops Joe Sixpack from installing yet another Trojanized "pr0n viewer".
Recovery CD? (Score:5, Insightful)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Re: (Score:3)
Yeah, then push your kid down the stairs next time you see him walking around without a helmet on. And kick the dog to teach it not to run in front of you! Your friends and family will love you for imparting your wisdom on them as painfully as possible!
Re: (Score:2)
Re: (Score:2)
User DATA, provided it's not the "intelligent" sort like MS Word documents that can have macros in them, should be safe. Nothing executable should be trusted.
You COULD try to checksum all system files, but it's so easy to miss something that seems innocuous that is infected and will just use a zeroday to jimmy its way back into restored binaries when you reboot. You really have to nuke and pave it if it's bad enough, the odds of missing something are just too high.
And with joys like windows registry, that
Re: (Score:3, Informative)
Mod parent up. PC's commonly shipped with recovery disks ten years ago, but most OEM vendors have discontinued the practice so they can pass along the savings to the consumer (OK, I just made up the last part).
So unless you were anal enough to make one yourself then if you get an irrecoverable malware like this, you are SOL. Remember to thank the CEOs.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
No. And No. The former is uncommon at best; the later is frustrating difficult if there's a possibility that the user profile is infected (due to the 'store shit everywhere, lots of binary files' nature of a profile).
Windows PCs are disposable. If it's important, assume that the PC is a kiosk. It's not such the case now as in later years, thank god, but it used to be that a Windows reinstall was more time and effort to get 'back up to snuff' as a Gentoo build.
wait.... what? (Score:2)
When the fuck did AV software stop scanning the boot sector?
Re: (Score:2)
Item Misquotes MS - Reinstall not required (Score:5, Informative)
Re: (Score:2)
I agree. That's the only sensible interpretation of what MS is saying. If you're going to do a complete system restore, why go to the trouble of fixing the MBR first?
Bad headline, bad article (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
This is all incidental to the problem of the boot sector code. It changes write functions to read functions so the disk will return a response and windows will believe everything worked. IT does this because it infects the boot sector which loads code into memory before windows even thinks about loading anything into memory. It then hides and stops itself from being removed while hiding and running other code from windows.
Using system restore will not address this in the least. You will still be infected, y
Re: (Score:2)
I suspected as much when the phrase "a pre-infected state" was used, but it still raises an interesting point that there's not a reliable disinfection procedure. I've worked on some pretty horrendous machines for "friends" (friendly when they need computer help) where I've often wanted to just reinstall and be done with it. I've always managed to track down a disinfection procedure online for the specific things the machines were infected with (often with help from people like the folks at the dlsreports.
Dunno about anyone else... (Score:2)
Uh, RTFA? (Score:5, Informative)
Requires a system *restore* not *recovery* and fixmbr. SHOCKING. I do this multiple times a week in my role as a computer fix-it guy. Grandma can't afford to spend the cash to have her system reloaded just because some virus got in there. I've cleaned out some pretty nasty rootkits and virii that only took me a few minutes with a Linux boot CD and then fixmbr. It doesn't take long if you've done it a million times.
Re: (Score:2)
lol.. lets don't pretend he's got something going right either. He fixes Grandma's computer multiple times a week. There has to be a reason why grandma keeps screwing her computer up so often and I don't think it's him using it as an excuse to come over for cookies and milk 3 times a week.
I have 15 accounts with 20-50 users in each and I barely have any issues outside of checking logs, fixing hardware issues and making sure no one decided they didn't need to run the nightly backups because we never need the
Knoppix (Score:2)
This is my method of choice for removing Windows viruses.
The final step for this virus would be to afterwards use the `fixmbr` tool.
Piece of cake. No reformatting necessary.
Re: (Score:2)
Re: (Score:2)
Summary and TFA incorrect (Score:2)
If you read the TFA's FBE (F-ing Blog Entry), you'll find that you just use a recovery console, run FIXMBR, and then run a system restore to a date before your system became infected.
Hardly intractable. Not a reinstall. If it goes unnoticed for a very long time, you might not have a restore point early enough, but that goes for any malware.
*nix is more secure!!!! (Score:2)
No data loss necessarily,with that type of restore (Score:2)
This is the Windows 7 System restore option, which is as follows according to MS:
see: System Restore [microsoft.com]
---
Restores your computer's system files to an earlier point in time without affecting your files, such as email, documents, or photos.
If you use System Restore from the System Recovery Options menu, you cannot undo the restore operation. However, you can run System Restore again and choose a different restore point, if one exists. For more information, see What is System Restore? and System Restore: frequ
So how does one avoid it? (Score:2)
I've seen junk get onto a computer with all the latest windows updates where the infected user never intentionally ran a single program they downloaded from the web. However the infection happened, it happened without prompting the user to run any install program..
When I disinfected the computer, I could not for the life of me figure out how the infection was actually obtained... if the user had been an administrator, I suspect that the damage would have been more widespread than just that one account.
Re:So system restore points don't work? (Score:5, Insightful)
Any virus can potentially do anything to your machine, including system restore points. If the machine is owned, it is owned and everything on it should be considered as suspect.
Back in the day there were a couple of BIOS viruses, which were even worse.
Re:So system restore points don't work? (Score:4, Insightful)
Re: (Score:2)
Of course, you could always get a (mostly)Desktop Linux-based phone, like the N900. Near as I can see, it has just about 0 viruses, due to being A, Linux and B, ARM(which isn't that popular compared to x86).
Re:Norton Ghost (Score:4, Informative)
You work for Symantec?... use ntfsclone or partimage from a live CD instead
Re: (Score:2)
Re:Norton Ghost (Score:4, Informative)
It took 20 years and alarming complexity increases; but it's almost like being able to tar your OS install and then untar it onto a newly created filesystem!
Re: (Score:2)
"You work for Symantec?"
It's been faster to download Ghost boot discs than install Ghost since the late 1990s.
Re: (Score:2)
Re: (Score:2)
Some standardized mechanism for offline inspection of a machine's entire nonvolatile storage space by an outside probe, without requiring the cooperation of any of the firmware or programmable embedded hardware would be nice, if probably Not Going To Happen.
Re: (Score:2, Informative)
Don't act the fool my boy..... it is called a "boot rom" for historial reasons, but these days, they are all FLASH based, ain't no real mask-programmed ROMs any more, these days they are al FLASH based and on most mottherboards can easily be written if you simply toggle the correct bits in the hardware control registers.
Re:Always wise anyway (Score:4, Informative)
NICs & VGA cards have stopped having flash ever since they moved from ISA to PCI: at that point, in order to cut costs, they moved their firmware storage to the motherboard BIOS flash.
Wrong. All graphics cards have traditional CGA/EGA/VGA BIOS interface implemented for their hardware in their flash. They wouldn't initialize properly without it.
Wise grammar Nazi (Score:2)
Re: (Score:2)
Logical or British punctuation [wikipedia.org] deems otherwise.
Re: (Score:2)
turtles all the way down...
Btw, this may be the oldest trick in the book. Boot viruses are as old as the x86 IBM compatible.
Feeding the Troll (Score:3)
So they get to choose between a system that is unusable from malware or a system that is unusable because it won't run their Windows applications?
Oh, quit whining and start WINEing.
Re: (Score:2)
Hey, it's got a web browser, and email, so it's already more productive than the malware infected machine.
Re: (Score:2)
Re: (Score:2)
As a tech who no longer does PC's full time (I haven't in about six years) I don't have a boat load of restore media like I used to. What I get now is a bunch of individual users (friends, families, small jobs) with crashed HDD's and no restore CD's for me to fix their machines with. I've tried searching the less reputable sites for OEM ISO's so I can do legitimate restores, but I haven't had a lot of luck.
My own personal machine that came with Windows 7 on the other hand is good to go. I used Clonezilla
Re: (Score:2)
Re: (Score:2)
That's awesome if you're a reasonable tech. On the other hand most home users just ignore it and call their pal pecosdave when they need it fixed, and of course I don't do Windows and I don't the old stack of Dell OEM disk of their OS like I used to in the XP days either.
Re: (Score:2)
Re: (Score:2)