Results 1 to 6 of 6

Thread: So how did I get infected in the first place?

  1. #1
    Security Expert TonyKlein's Avatar
    Join Date
    Oct 2005
    Location
    The Netherlands
    Posts
    138

    Default So how did I get infected in the first place?

    There are a variety of causes, one common reason is that your security settings are too low.

    Here are a number of recommendations that will help tighten them, and which will contribute to making you a less likely victim.

    1) Watch what you download and where from. If you insist on using a P2P program, please read File Sharing, otherwise known as Peer To Peer. (P2P)

    2) It's important to always keep current with the latest security fixes from Microsoft. UPDATED WINDOWS

    ActiveX in Internet Explorer

    • Even if you plan to use an alternate browser, you will have to use Internet Explorer for tasks like updating Windows or visiting any other site that requires ActiveX. Also, since Internet Explorer is integrated into the Windows core, keeping it secure is very important.




    • For IE7 and IE 8, open IE and go to Tools > Internet Options > Security > Internet, then press "Default Level", then OK.In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed. Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Option > Security.
    • So why is ActiveX so dangerous that you have to increase the security for it? When your browser runs an ActiveX control, it is running an executable program, no different from double-clicking an exe file on your hard drive. Would you run just any file downloaded off a web site without knowing what it is and what it does?


    3) Make sure your installation of Java is up-to-date. Oracle (Sun)Microsystems-Java Security vulnerability in older versions left on system

    4) Let's not forget How Spybot - Search & Destroy protects against the installation of Spyware/Malware.

    *It is important to note that all of the above programs/files can be run simultaneously on your system. They will work together in layers, so to speak, to help protect your computer.
    However, the following suggestions are designed to only run one of each. It is not a good idea to run more than one firewall, and one anti-virus program. Running more than one of these at a time can cause system crashes, high system usage and/or conflicts with each other.


    6) We don't recommend the XP firewall that comes built in to Windows. It doesn't block everything that may try to get in, and the entire firewall is written to the registry. As various kinds of malware hack the Registry in order to disable the Windows firewall, if using XP it's far preferable to install one of the excellent third party solutions.

    If you choose to install a third party software Firewall remember to disable the native Windows Firewall at that time. This study on firewall leaktests may be of interest before making a decision.

    7) An Anti-Virus product is a necessity. There are many excellent programs that you can purchase. However, we choose to advocate the use of free programs whenever possible. Some very good and easy-to-use free A/V programs are Avast and AntiVir. It's a good idea to set these to receive automatic updates so you are always as fully protected as possible from the newest virus threats. Microsoft Security Essentials is also an option. Remember- run only one antivirus resident at a time.

    If a personal computer is infected you may post DDS & aswMBR logs in the Malware Removal Forum to receive free assistance from our volunteer analysts.
    Please see the FAQ first: "BEFORE You POST"(Please read this Procedure Before Requesting Assistance)


    Happy safe computing!!
    Last edited by tashi; 2011-08-11 at 06:29. Reason: Updated

  2. #2
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    32,083

    Default Oracle (Sun)Microsystems-Java Security vulnerability in older versions left on system

    The Java SE Runtime Environment (JRE) allows end-users to run Java applications.

    It is very important not only to keep Sun Java up to date, but also to remove older versions which have security holes and can be exploited by malware.

    Java JRE updates/advisories thread:
    http://forums.spybot.info/showthread...194#post422194

    How do I uninstall Java on my Windows computer ?
    http://www.java.com/en/download/uninstall.jsp

    Why should I remove older versions of Java from my system?
    http://www.java.com/en/download/faq/...erversions.xml


    Edit
    http://krebsonsecurity.com/2012/08/attackers-pounce-on-zero-day-java-exploit/
    http://www.forbes.com/sites/andygreenberg/2012/08/27/disable-java-in-your-browser-to-avoid-a-nasty-new-malware-spreading-attack/
    http://www.forbes.com/sites/andygreenberg/2012/08/31/oracles-java-security-woes-mount-as-researchers-spot-a-bug-in-its-critical-bug-fix/
    Last edited by tashi; 2012-09-01 at 05:31. Reason: Update
    Microsoft MVP. Consumer Security 2006-2014


  3. #3
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    32,083

    Default 14 ways to get Infected without trying

    14 ways to get Infected without trying

    A little bit of humour but also based on fact.

    1) Look for cracks, subdivided in illegal software and .....

    2) Practice unsafe hex, browse the web for free pOrn

    3) Look for software that adds smileys to your posts, mail etc

    4) Look for kewl skins, screensavers etc

    5) Look for spyware removers, concentrate on the kind that makes you pay before it removes anything

    6) Install a P2P program and repeat all of the above

    7) You always want the best; use p2p to download anti-virus/firewall software.

    8) Do NOT pay for anything, the internet is a place where you can steal anything from everyone without even saying as much as thank you

    9) Don't have/use/update antivirus/security software

    10) Look for pokergames, slotmachines and other gambling outfits

    11) Look for ringtones and other stuff to bling your phone

    12) Click on those unexpected links and attachments in email, because you're curious...

    13) Do loan your laptop to the next door neighbour for the weekend and give him your Admin account login so he can get his project done with no hassles

    14) Let the Babysitter use your laptop for 'schoolwork'


    Thanks to Metallica for most of those and CalamityJane, bitman, Lonny, shelf life.
    Microsoft MVP. Consumer Security 2006-2014


  4. #4
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    32,083

    Default Botnets and Infected Computers

    A botnet is a collection of compromised computers under the remote command and control of a criminal “botherder.” Most owners of the compromised computers are unknowing and unwitting victims. They have unintentionally allowed unauthorized access and use of their computers as a vehicle to facilitate other crimes, such as identity theft, denial of service attacks, phishing, click fraud, and the mass distribution of spam and spyware. Because of their widely distributed capabilities, botnets are a growing threat to national security, the national information infrastructure, and the economy.

    “The majority of victims are not even aware that their computer has been compromised or their personal information exploited,” said FBI Assistant Director for the Cyber Division James Finch. “An attacker gains control by infecting the computer with a virus or other malicious code and the computer continues to operate normally. Citizens can protect themselves from botnets and the associated schemes by practicing strong computer security habits to reduce the risk that your computer will be compromised.”
    http://www.fbi.gov/pressrel/pressrel07/botnet061307.htm

    Practice safe hex, protect your computer, other netizens and yourself.
    Microsoft MVP. Consumer Security 2006-2014


  5. #5
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    32,083

    Default Useful Tools

    Secunia Personal Software Inspector (PSI) Free for personal use. FAQ

    PSI -Install software inspector, download: http://secunia.com/vulnerability_scanning/personal/

    ---------------------------------------------------------

    WOT's safe browsing tool for Internet Explorer or Firefox


    http://www.mywot.com/

    The WOT (Web Of Trust) community has rated countless websites and while not infallible it is a useful barometer to assist in avoiding sites that host malware, on-line scams and spam.

    Process Explorer
    http://technet.microsoft.com/en-us/s.../bb896653.aspx

    Process Monitor
    http://technet.microsoft.com/en-us/s.../bb896645.aspx
    Microsoft MVP. Consumer Security 2006-2014


  6. #6
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    32,083

    Default

    Registry Cleaners, not recommended

    UPDATED WINDOWS - Your first line of defense, links and tips

    When installing new software or updates be watchful for the inclusion of pre-checked toolbars or other software including browsers. Opt-out rather than opt-in.

    Some users may find the offers useful but make sure you know what you are agreeing to. Avoid clicking through in a hurry without looking for pre-checked boxes and reading the small print or you may end up with an unwanted program. One that could be time consuming to remove.
    Last edited by tashi; 2009-07-18 at 01:57. Reason: Update
    Microsoft MVP. Consumer Security 2006-2014


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •