GliqInfo
2013-01-25, 02:33
Hello, Spybot SD...
My Dell Inspiron MT537 Windows XP Pro has been invaded at least twice since August 2011 and was turned into a Proxy Server apparently for use by a large company that provides VPN's and other Proxy services.
In the first incident, my machine was rigged by a .exe associated with a Free Dialup service known as Dialup_for_Free. It took me more than a year before I realized that my Windows Remote Access was used, at least in part, for using my computer(s) & IP address as a proxy server.
Because I check my machine regularly for Remote Access intruders, the 2nd takeover took me 25 days to realize my computer had been turned into a proxy server. It is quite possible that a third takeover may have occurred, but there are no indications of this in the 'remoteaccess' sections of the Windows XP Pro Registery.
The basic proof of the takeover/proxy server was originally discovered when I used an Eset Antivirus app known as 'SysInspector.exe' which listed the domain names that Windows labels as 'EVAL=5'... all told, there were about 10,000 different domain names.
Without going too far into the complete history of these events, I would like to ask safer-networking to take a deep look into this not-so-recent phenomenon. There are YouTube videos that describe how to invade someone's computer using Windows 'Remote Assistance' that date back as far as 2008.
What I think is needed are as follows...
1) An immediate 'red flag' to appear when anyone enters a computer through the Windows Remote Assistance Software
2) An app that would undo all of the proxy server settings which would immediately stop the machine from being used as a proxy server.
3) A method to clear the Windows Registry of all the domains that were flagged through the use of the installed Proxy Server.
4) And a TRACERT that would attempt to track down the organization that is providing proxy service through the criminal use of an unsuspecting person's computer.
Thank you
My Dell Inspiron MT537 Windows XP Pro has been invaded at least twice since August 2011 and was turned into a Proxy Server apparently for use by a large company that provides VPN's and other Proxy services.
In the first incident, my machine was rigged by a .exe associated with a Free Dialup service known as Dialup_for_Free. It took me more than a year before I realized that my Windows Remote Access was used, at least in part, for using my computer(s) & IP address as a proxy server.
Because I check my machine regularly for Remote Access intruders, the 2nd takeover took me 25 days to realize my computer had been turned into a proxy server. It is quite possible that a third takeover may have occurred, but there are no indications of this in the 'remoteaccess' sections of the Windows XP Pro Registery.
The basic proof of the takeover/proxy server was originally discovered when I used an Eset Antivirus app known as 'SysInspector.exe' which listed the domain names that Windows labels as 'EVAL=5'... all told, there were about 10,000 different domain names.
Without going too far into the complete history of these events, I would like to ask safer-networking to take a deep look into this not-so-recent phenomenon. There are YouTube videos that describe how to invade someone's computer using Windows 'Remote Assistance' that date back as far as 2008.
What I think is needed are as follows...
1) An immediate 'red flag' to appear when anyone enters a computer through the Windows Remote Assistance Software
2) An app that would undo all of the proxy server settings which would immediately stop the machine from being used as a proxy server.
3) A method to clear the Windows Registry of all the domains that were flagged through the use of the installed Proxy Server.
4) And a TRACERT that would attempt to track down the organization that is providing proxy service through the criminal use of an unsuspecting person's computer.
Thank you