Number of viruses 93, infected objects 719

Java files deleted.

I'm still having problems with some forms in MS Explorer. CPU goes to 100% for 10 minutes, and page cannot refresh, with 2 files max upload. That's my website upload file manager page, so I just use FTP, but it has problems too.

Opera is not working at all on some forms and pages, like my email. Text is still having an earthquake on one page with Flash and Javascript, but only on that one page (piratenews.org). No Java on that page.
 
Hi

That is sorry to hear but as those are not malware issues and not part of my knowledge, is it OK to re-direct you to some windows forum?
 
Hi

That is sorry to hear but as those are not malware issues and not part of my knowledge, is it OK to re-direct you to some windows forum?

Yes, any links are welcome, so long as they don't have viri embedded in html.

The problems in MS Explorer did not stop when I disabled all Java. FTP is now working, perhaps because I disabled Java?

It's just weird that this problem didn't start until after the virus attack. Perhaps this is another symptom of antiviri eating Windows?

Otherwise, looks like my computer is "cured". Thanks.

So what are you doing in Finland? Are you expat American? I lived in UK for 8 years, 1 year in Germany.

My virus problems began the same day I pissed off a bunch of police and federal government employees, who verbally threatened me and banned me from a forum that same day, and who try to ban me on other forums, for reporting on govt corruption. Coincidence theory or coincidence factory?

How can I join the army of counter-intelligence computer investigators, to identify, track and arrest hackers?

As a footnote, I spoke with a waitress at Hooters, who was stationed in Germany in US Air Force Intelligence, at a base near where I was stationed in USAF. She said her main job was writing code to create computer viruses. Later that same night a gunman shot the manager and killed a customer at that restaurant. That gunman previously knocked on the door of the home of the guy I dined with at Hooters that night. Gotta love those Victim Disarmament Zones. As a journalist with a weekly TV news show, I've gotten several death threats from govt employees. Seems to go with the territory. Hacking is a pleasant change from death threats.
 
FYI - Germany seems to be the source of the milspec attack on the web:

Analysis: U.S. military to patrol Internet

UPI
June 30, 2008

WASHINGTON -- The U.S. military is looking for a contractor to patrol cyberspace, watching for warning signs of forthcoming terrorist attacks or other hostile activity on the Web.

"If someone wants to blow us up, we want to know about it," Robert Hembrook, the deputy intelligence chief of the U.S. Army's Fifth Signal Command in Mannheim, Germany, told United Press International.

In a solicitation posted on the Web last week, the command said it was looking for a contractor to provide "Internet awareness services" to support "force protection" -- the term of art for the security of U.S. military installations and personnel.

"The purpose of the services will be to identify and assess stated and implied threat, antipathy, unrest and other contextual data relating to selected Internet domains," says the solicitation.

Hembrook was tight-lipped about the proposal. "The more we talk about it, the less effective it will be," he said. "If we didn't have to put it out in public (to make the contract award), we wouldn't have."

He would not comment on the kinds of Internet sites the contractor would be directed to look at but acknowledged it would "not (be) far off" to assume violent Islamic extremists would be at the top of the list.

The solicitation says the successful contractor will "analyze various Web pages, chat rooms, blogs and other Internet domains to aggregate and assess data of interest," adding, "The contractor will prioritize foreign-language domains that relate to specific areas of concern … (and) will also identify new Internet domains" that might relate to "specific local requirements" of the command.

Officials were keen to stress the contract covered only information that could be found by anyone with a computer and Internet connection.

"We're not interested in being Big Brother," said LeAnne MacAllister, chief spokeswoman for the command, which runs communications in Europe for the U.S. Army and the military's joint commands there....


Blonde and blue-eyed. Meet the new 'white' Al-Qaeda

Fox Video: White, blonde, blue-eyed AllCIAduh

Bring it on! I got my Spybot S&D!
 
Thanks. I'll check it out.

How come these 20,000 soldiers don't protect us from hack attack?

The Network Warfare Battalion

July 12, 2008: The U.S. Army has activated its first Network Warfare Battalion. The unit will not operate together, but mostly as many detachments, supporting combat forces in Iraq and Afghanistan, counter-terror operations throughout the world, as well as in joint Cyber War operations with other services and foreign countries. The battalion belongs to the 704th Military Intelligence Brigade, which is in turn subordinate to INSCOM (the U.S. Army Intelligence and Security Command).

All the services are making a major effort to develop defensive and offensive Cyber War weapons. The U.S. Air Force has established a major command (involving over 20,000 specialists) for this, and is attempting to become the lead for all Department of Defense Cyber War activities. The other services oppose this attempt to take over, although they appreciate air force efforts to develop new tools and capabilities. The army and navy both have thousands of troops, in many different units, working on Cyber War activities. Creating major units (battalions and larger) dedicated to Cyber War, is a new development.

Unless their job is to manufacture viruses.
 
Can't find any problems. Scans are clean.

Is there software that logs surfing and firewall activity, that can backtrack to when malware and virus files are first downloaded, then identify the URL of the hacker?

A name and address can be identified for that account, and that exhibit can be taken to federal police, along with an affidavit of probable cause for criminal complaint. I don't mind testifying in court to send a crook to prison for felony vandalism, etc. Federal court here in Knoxville Tennessee sends little old ladies to prison for selling puppies, so I'm sure they like to hang a hacker.
 
Hi

"Is there software that logs surfing and firewall activity, that can backtrack to when malware and virus files are first downloaded, then identify the URL of the hacker?"

I don't think that there is one but most popular firewalls have logging ability.

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Now lets uninstall ComboFix:

  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

Next we remove all used tools.

Please download OTCleanIt and save it to desktop.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.

Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

  • Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and re-enable system restore here:

    Windows XP System Restore Guide

Re-enable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialize and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • Change the Navigate sub-frames across different domains to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
  • Install Malwarebytes' Anti-Malware - Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. Tutorial on installing & using this product can be found below:

    Malwarebytes' Anti-Malware Setup Guide

    Malwarebytes' Anti-Malware Scanning Guide

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety


Stand Up and Be Counted ---> Malware Complaints <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place

Happy surfing and stay clean!
 
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.
 
Back
Top