YeOldeStonecat
Well-Known Member
- Reaction score
- 6,904
- Location
- Englewood Florida
So within hours of a girl opening a phish e-mail (some linked in invite or something)....her computer gets whacked with the FBI ransomware...I get the e-mail of 911 from someone else in the office, an insurance company...while I'm on a several hour phone call job of switching PC credit card processors for a multi-site package store business over an hour away. I e-mail back to have her shut down her computer.
Within about an hour...the boss of the insurance company sends an e-mail..most of the computers on the network have popped up with the Windows file protection error, please insert Windows CD.
By the time I finish my prior job, I remote into their office and start with her computer...RDP in from the server as Administrator and easily clean up the FBI bug. While finishing hers, I start working on one of the computers that had that Windows file protection error. malwarebytes scan, clean. go to check antivirus...can't launch. Hmmm...not even showing in systray. Snag TDSS...run it, finds rootkit.boot.xpaj.a but it cannot repair the MBR, asks to rewrite a fresh one. I know better than to do this, seen it make a rig unbootable too many times if I see that error...ends up giving an invalid partition error when I reboot. I try the new malwarebytes anti rootkit beta tool..it finds stuff, cleans, reboots...basically back to square 1 again...TDSS still sees it still has same error.
But yeah, main point of this thread....just a heads up, if someone on a network gets an FBI bug...may be a variant that is network aware and able to spread and inject a rootkit in other rigs very quickly.
My schedule sucks next week..already booked...but I'll have to wipe Monday and try to find someone to help me go clean up this network of 18 rigs.
Within about an hour...the boss of the insurance company sends an e-mail..most of the computers on the network have popped up with the Windows file protection error, please insert Windows CD.
By the time I finish my prior job, I remote into their office and start with her computer...RDP in from the server as Administrator and easily clean up the FBI bug. While finishing hers, I start working on one of the computers that had that Windows file protection error. malwarebytes scan, clean. go to check antivirus...can't launch. Hmmm...not even showing in systray. Snag TDSS...run it, finds rootkit.boot.xpaj.a but it cannot repair the MBR, asks to rewrite a fresh one. I know better than to do this, seen it make a rig unbootable too many times if I see that error...ends up giving an invalid partition error when I reboot. I try the new malwarebytes anti rootkit beta tool..it finds stuff, cleans, reboots...basically back to square 1 again...TDSS still sees it still has same error.
But yeah, main point of this thread....just a heads up, if someone on a network gets an FBI bug...may be a variant that is network aware and able to spread and inject a rootkit in other rigs very quickly.
My schedule sucks next week..already booked...but I'll have to wipe Monday and try to find someone to help me go clean up this network of 18 rigs.