adamstgBit (OP)
Legendary
Offline
Activity: 1904
Merit: 1037
Trusted Bitcoiner
|
|
November 07, 2011, 02:22:42 AM |
|
i come back home today, and find my computer in sore shape.
its tell me some files where accesed remotely and asks me to block this attact
it would seem i have a w32.Blaster worm. and was unable to start any programs.
after running the virus scan everything seems back to normal... ish
it would seem the attacker did NOT steal my bitcoin wallet!
|
|
|
|
worldinacoin
|
|
November 07, 2011, 02:24:16 AM |
|
better get a secure computer, setup bitcoin and transfer your coins away.
|
|
|
|
bitplane
|
|
November 07, 2011, 02:47:25 AM |
|
Blaster is an old memory resident worm from 2006 and doesn't spread anymore, you've probably got a scareware infection.
|
|
|
|
adamstgBit (OP)
Legendary
Offline
Activity: 1904
Merit: 1037
Trusted Bitcoiner
|
|
November 07, 2011, 03:05:08 AM Last edit: November 07, 2011, 03:20:15 AM by adamstgBit |
|
Blaster is an old memory resident worm from 2006 and doesn't spread anymore, you've probably got a scareware infection.
i think your right the thing running the scan right now is porbly the bug. "Privcay Protection" yup http://www.2-viruses.com/remove-privacy-protectionWhat is Privacy Protection? Privacy Protection is fake anti-malware program that simulates activity of legitimate programs capable to solve your computer’s protection issues. ....
|
|
|
|
deslok
Sr. Member
Offline
Activity: 462
Merit: 250
It's all about the game, and how you play it
|
|
November 07, 2011, 03:12:57 AM |
|
I would advise trying to load a legitimate antivirus such as avast as well as an antispyware software such as spybot, if you can't get to their sites to even install these you've definitly got something going on
|
"If we don't hang together, by Heavens we shall hang separately." - Benjamin Franklin
If you found that funny or something i said useful i always appreciate spare change 1PczDQHfEj3dJgp6wN3CXPft1bGB23TzTM
|
|
|
Yankee (BitInstant)
Legendary
Offline
Activity: 1078
Merit: 1000
Charlie 'Van Bitcoin' Shrem
|
|
November 07, 2011, 03:22:39 AM |
|
phew, I got scared there for a second Glad your bitcoins are safe Go for Kaspersky or AVN anti-virus, both amazing. (Maybe change the title of this thread, its a tad scary) Cheers
|
Bitcoin pioneer. An apostle of Satoshi Nakamoto. A crusader for a new, better, tech-driven society. A dreamer. More about me: http://CharlieShrem.com
|
|
|
Snapman
|
|
November 07, 2011, 03:26:23 AM |
|
Might want to also run "malwarebytes" through there once, might help in picking up whatever files or entries are left.
|
BTCRadio: 17cafKShokyQCbaNuzaDo5HLoSnffMNPAs
|
|
|
Raoul Duke
aka psy
Legendary
Offline
Activity: 1358
Merit: 1002
|
|
November 07, 2011, 03:40:53 AM |
|
Run Hitman Pro 3.5. It will kill the bastard.
|
|
|
|
naypalm
Legendary
Offline
Activity: 1272
Merit: 1012
howdy
|
|
November 07, 2011, 04:51:57 AM |
|
If you run a legit version of Windows, give MSE a try. Before I was running a combo of Symantec and Spybot S&D. Now I do not.
in b4 M$uck, Linux! and "It's unpossible for my iMac to get virus."
|
|
|
|
adamstgBit (OP)
Legendary
Offline
Activity: 1904
Merit: 1037
Trusted Bitcoiner
|
|
November 07, 2011, 05:06:28 AM |
|
Might want to also run "malwarebytes" through there once, might help in picking up whatever files or entries are left.
ya i'm running it right now in "windows safe mode" f-in shit is taking 1 hour to scann everthing, i hope everything is back to normal after
|
|
|
|
BadBear
v2.0
Legendary
Offline
Activity: 1652
Merit: 1128
|
|
November 07, 2011, 01:58:24 PM |
|
Seconding MSE, it's most totally excellent. No loud noises, no annoying popups, no loud voices saying VIRUS DATABASE HAS BEEN UPDATED. It just works and works quietly.
|
|
|
|
Tuxavant
|
|
November 07, 2011, 02:34:52 PM |
|
If there's any indication your machine has been compromised or unauthorized/malicious software has been able to run on your system, your only recourse to be absolutely sure is to reflash your bios, wipe your drive, and reinstall.
Anything less than that, and you can't really be sure you're in a trustable, safe state.
|
|
|
|
RodeoX
Legendary
Offline
Activity: 3066
Merit: 1147
The revolution will be monetized!
|
|
November 07, 2011, 02:40:49 PM |
|
I would not assume your wallet has not been copied. Especially if you are using an encrypted wallet. Your thief could be trying to brute force the password as we speak. It might be worth it to put that wallet on another computer and do some kind of transaction. Then the wallet he/she has will no longer be valid.
|
|
|
|
Tuxavant
|
|
November 07, 2011, 03:00:23 PM |
|
What rodeoX said...
If you have a significant sum of Bitcoins, you should take a large portion offline immediately into multiple addresses (so you dont have to bring your entire offline sum online if you need to spend a small amount). Move the rest to a new wallet to spend as needed like allowance or discretionary spending.
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
November 07, 2011, 03:06:44 PM |
|
If there's any indication your machine has been compromised or unauthorized/malicious software has been able to run on your system, your only recourse to be absolutely sure is to reflash your bios, wipe your drive, and reinstall.
Anything less than that, and you can't really be sure you're in a trustable, safe state.
This. It doesn't take that long. Looking for signs of an attack is often futile. Many malware are very good at hiding even from anti-malware software. Since XP has no admin restrictins you could already been rootkitted and any detection software is simply seeing what the malicous software wants it to see. I would not assume your wallet has not been copied. Especially if you are using an encrypted wallet. Your thief could be trying to brute force the password as we speak. It might be worth it to put that wallet on another computer and do some kind of transaction. Then the wallet he/she has will no longer be valid.
This to. To easy to simply take the precaution of creating new wallet and transferring all balances from old wallet to the new one. While your encryption may not be breakable today if the attacker got it you are taking the chance it will never be breakable ever in the future.
|
|
|
|
Matthew N. Wright
Untrustworthy
Hero Member
Offline
Activity: 588
Merit: 500
Hero VIP ultra official trusted super staff puppet
|
|
November 07, 2011, 03:10:34 PM |
|
If there's any indication your machine has been compromised or unauthorized/malicious software has been able to run on your system, your only recourse to be absolutely sure is to reflash your bios, wipe your drive, and reinstall.
Anything less than that, and you can't really be sure you're in a trustable, safe state.
Of course you're right, but I'd say flashing the bios is a bit unnecessary in most cases as viruses aren't really allowed to access the bios so easily in modern operating systems, especially considering flashing your BIOS is a gamble (most people don't have extra CMOS chips laying around).
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
November 07, 2011, 03:14:20 PM |
|
If there's any indication your machine has been compromised or unauthorized/malicious software has been able to run on your system, your only recourse to be absolutely sure is to reflash your bios, wipe your drive, and reinstall.
Anything less than that, and you can't really be sure you're in a trustable, safe state.
Of course you're right, but I'd say flashing the bios is a bit unnecessary in most cases as viruses aren't really allowed to access the bios so easily in modern operating systems, especially considering flashing your BIOS is a gamble (most people don't have extra CMOS chips laying around). It is very easy to flash a modern bios with a virus. Most motherboards have a windows based tool to flash bios without rebooting. While this is convenient it also makes it easy to infect the bios. If it can be done for a "good bios" it can be done for a malicious one. http://www.tomshardware.com/news/bios-virus-rootkit-security-backdoor,7400.htmlStill it all depends on how paranoid you are. An alternative, some (but not all) motherboards offer an option to make a backup of the bios. Some do this from same windows utility to flash a bios, some from a option in the bios to write to a thumb drive. If you can get a copy of the bios currently loaded you can take a hash of it and compare it to the official bios. If they match then no need to flash. If they don't match then I would definitely flash.
|
|
|
|
Matthew N. Wright
Untrustworthy
Hero Member
Offline
Activity: 588
Merit: 500
Hero VIP ultra official trusted super staff puppet
|
|
November 07, 2011, 04:34:26 PM |
|
If there's any indication your machine has been compromised or unauthorized/malicious software has been able to run on your system, your only recourse to be absolutely sure is to reflash your bios, wipe your drive, and reinstall.
Anything less than that, and you can't really be sure you're in a trustable, safe state.
Of course you're right, but I'd say flashing the bios is a bit unnecessary in most cases as viruses aren't really allowed to access the bios so easily in modern operating systems, especially considering flashing your BIOS is a gamble (most people don't have extra CMOS chips laying around). It is very easy to flash a modern bios with a virus. Most motherboards have a windows based tool to flash bios without rebooting. While this is convenient it also makes it easy to infect the bios. If it can be done for a "good bios" it can be done for a malicious one. http://www.tomshardware.com/news/bios-virus-rootkit-security-backdoor,7400.htmlStill it all depends on how paranoid you are. An alternative, some (but not all) motherboards offer an option to make a backup of the bios. Some do this from same windows utility to flash a bios, some from a option in the bios to write to a thumb drive. If you can get a copy of the bios currently loaded you can take a hash of it and compare it to the official bios. If they match then no need to flash. If they don't match then I would definitely flash. The reason that Microsoft Windows has more viruses that any other operating system isn't so much about its vulnerabilities as it is about it's success. People will argue which is more of a contributing factor, but there's no denying that the fact that Windows runs on a gazillion machines is a huge factor.
"Now, while Windows is relatively standard across PCs, BIOS's are not." By writing a single virus that targets Microsoft Windows, a virus writer can potentially infect more computers on the planet than by writing it to target any other system. It's no secret that virus and malware writers regularly target the greatest potential audience so as to get the greatest number of infections for their malicious intent.
Now, while Windows is relatively standard across PCs, BIOS's are not.
The BIOS used in a PC built by one manufacturer may be radically different than that from another company. A virus that attempts to target a BIOS vulnerability or to somehow "hide" within a BIOS has to, essentially, be rewritten for or at least be customized and aware of every different BIOS that it might want target.
It's easier to simply rely on user apathy and target unpatched vulnerabilities in Windows. One virus per vulnerability, and all unpatched machines become malware's playground.
That's potentially a lot. A gazillion, even.
So just like Mac or Linux malware, there may be a few BIOS targeting viruses out there, but they're not even close to being as common as the more standard Windows-based malware.
Now, that's not to say that there's zero risk.
As you point out, a virus that manages to embed itself into the BIOS or BIOS's flash memory has one extremely unique characteristic: it'll survive even if you completely reformat and erase everything on your hard disk.
However, even that is easily remedied, either by resetting your BIOS to it's factory image - which most modern motherboards support - or often simply by updating or re-flashing your BIOS.
My take: it's not something I'd worry about at all just yet. In a rare case where malware appears to have survived a reformatting ... well, I'd first look at all the other ways that a machine can get immediately reinfected as you rebuild it from scratch (lack of firewall, infected external hard drives and the like). Only after eliminating those might I think about checking or resetting the BIOS.
It's just not that common a problem right now.
|
|
|
|
dooglus
Legendary
Offline
Activity: 2940
Merit: 1333
|
|
November 08, 2011, 12:47:28 AM |
|
It might be worth it to put that wallet on another computer and do some kind of transaction. Then the wallet he/she has will no longer be valid.
Are you sure? If you send the entire balance to a new address, the thief's copy of the wallet will be empty, but still valid. If you send less than the entire balance, you stand a chance of leaving some coins untouched and still available to the thief, and any change from the coins you do send will be sent to an address from the keypool, which the thief will also have access to. I don't think there's any "kind of transaction" you can make that will invalidate the thief's copy of your wallet.
|
Just-Dice | ██ ██████████ ██████████████████ ██████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████ ██████████████ ██████ | Play or Invest | ██ ██████████ ██████████████████ ██████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████████████ ██████████████████████ ██████████████ ██████ | 1% House Edge |
|
|
|
Tuxavant
|
|
November 08, 2011, 12:57:59 AM |
|
I don't think there's any "kind of transaction" you can make that will invalidate the thief's copy of your wallet.
He just means that you're "invalidating" it by taking the money out of it and not using it anymore. The thief would still have access to the private keys to send money, but there would be none there. And you may have to watch for future transactions sent to that wallet and "spend" them before the thief did.
|
|
|
|
|