Mercutio
Fatwah on Western Digital
It's back to school time, which for me means getting to look at or hear about the malware that's been on high school and college students' computers since May, the last time they actually looked at a device other than their phone.
I have a standard procedure that works pretty well (install MBAM, Spybot, Avast and do updates by whatever means necessary, do boot-time or safe mode scans, on reboot make sure ABP is on all browsers with at least the Malware Domains subscription and all apps are updated via ninite), but at this point I'm going to say my procedure needs to be better.
Browser settings: IE and Chrome both say they have a "reset all user-defined settings" option. Both browsers are lying about that. And most people still don't even know what an add-on is or where to look for them.
I see a lot of bad applications that use GPOs to enforce bad behavior. If removal apps don't kill the GPO, I have to think it's beyond my ability to explain to anyone other than an experienced IT guy how to fix that.
I also see manipulation of shortcuts and compatibility settings. That's not a big deal as such, but again, forcing someone to an unwanted page that can contain further exploit code AND burying the user settings by running the program in compatibility mode for Windows XP so that it's abstracted out of general user settings? Normal humans are not going to go look at that stuff.
My other new favorite thing is malware that flat-out downloads its own malware-infested version of Chrome, usually called Browser.exe. It looks like Chrome and it still has Chrome branding, which creates a side effect of making impacted persons switch to some other browser (probably IE), which will run them right in to other exploit code. The user can't start browser.exe, but if they're savvy enough to recognize that it IS a Chrome window, it's going to scare them off Chrome anyway.
So, at odds with the cleanup procedure I've written for others, my real cleanup procedure looks more like:
Disconnect from the internet
Run the Norton or AVG or Webroot or Mcaffee remover.
Take a look at services.msc. Disable pretty much everything that I don't know with 100% certainty needs to be there.
Install MBAM, Spybot and Avast from a Flash drive. Copy the whole stupid MBAM folder off my thumb drive into %appdata%\stupidlongpath because the MBAM people can't be bothered with a non-stupid offline installer. Install the other
offline updates.
Run adwcleaner (this will ultimately reboot the machine).
Reset IE. Reset Chrome. Reset Firefox.
Run PC Decrapifier.
Do a boot scan with Avast with Delete as the default detection action.
Boot into Safe mode (this is a HUGE PITA on Windows 8).
Run other scans.
Reboot.
Check Services for crap, look to make sure that Browser Settings are where they should be. Run netshell commands if networking is hosed.
Run ninite to get other crap in order. Install ABP and relevant subs three times.
Yeah, I'd love to say "Just reinstall Windows" every single time, but of course that's not realistic.
So what are people using these days for malware cleaning?
I have a standard procedure that works pretty well (install MBAM, Spybot, Avast and do updates by whatever means necessary, do boot-time or safe mode scans, on reboot make sure ABP is on all browsers with at least the Malware Domains subscription and all apps are updated via ninite), but at this point I'm going to say my procedure needs to be better.
Browser settings: IE and Chrome both say they have a "reset all user-defined settings" option. Both browsers are lying about that. And most people still don't even know what an add-on is or where to look for them.
I see a lot of bad applications that use GPOs to enforce bad behavior. If removal apps don't kill the GPO, I have to think it's beyond my ability to explain to anyone other than an experienced IT guy how to fix that.
I also see manipulation of shortcuts and compatibility settings. That's not a big deal as such, but again, forcing someone to an unwanted page that can contain further exploit code AND burying the user settings by running the program in compatibility mode for Windows XP so that it's abstracted out of general user settings? Normal humans are not going to go look at that stuff.
My other new favorite thing is malware that flat-out downloads its own malware-infested version of Chrome, usually called Browser.exe. It looks like Chrome and it still has Chrome branding, which creates a side effect of making impacted persons switch to some other browser (probably IE), which will run them right in to other exploit code. The user can't start browser.exe, but if they're savvy enough to recognize that it IS a Chrome window, it's going to scare them off Chrome anyway.
So, at odds with the cleanup procedure I've written for others, my real cleanup procedure looks more like:
Disconnect from the internet
Run the Norton or AVG or Webroot or Mcaffee remover.
Take a look at services.msc. Disable pretty much everything that I don't know with 100% certainty needs to be there.
Install MBAM, Spybot and Avast from a Flash drive. Copy the whole stupid MBAM folder off my thumb drive into %appdata%\stupidlongpath because the MBAM people can't be bothered with a non-stupid offline installer. Install the other
offline updates.
Run adwcleaner (this will ultimately reboot the machine).
Reset IE. Reset Chrome. Reset Firefox.
Run PC Decrapifier.
Do a boot scan with Avast with Delete as the default detection action.
Boot into Safe mode (this is a HUGE PITA on Windows 8).
Run other scans.
Reboot.
Check Services for crap, look to make sure that Browser Settings are where they should be. Run netshell commands if networking is hosed.
Run ninite to get other crap in order. Install ABP and relevant subs three times.
Yeah, I'd love to say "Just reinstall Windows" every single time, but of course that's not realistic.
So what are people using these days for malware cleaning?