We have just had our second outbreak of a variant of the Windows XP home security malware (malwarebytes called it Trojan.fakeAlert). It manages to kill our antivirus (nod 32), and then kill attempts to start the task manager or to install malwarebytes. I have managed to clean it off by logging in as an admin, removing the file remotely before it starts up and getting malwarebytes to scan and remove it. My question relates to prevention:
So my question is, how does FakeAlert work?!....I can find nothing on the internet explaining in detail how it's getting in and executing, it seems to be embedded in webpages and then gets automatically download and run?
We can clean it off with malwarebytes, (and are more than a little outraged that windows doesn't prevent these things from installing control panels, interrupting ctrl-alt-del/ctrl-alt-esc etc etc), but we're reluctant to shell out for a Malwarebytes site license if there is a free way of blocking it, but to do that we need to know how it works (and if MBam will keep us safe from this in future)
Some more details on our setup, our client machines are Win XP boxes, connecting to a win server 2003 AD domain