Questions tagged [malware]

Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.

"Malware" is a portmanteau of "malicious" and "software"

Common forms of malware include:

  • Botnet clients, which grant the malware author some degree of control over the compromised operating system and are generally employed in sending spam e-mail and may be rented out to perform DDoS attacks.
  • Data exfiltrators, which collect and transmit data about the computer they reside on back to the creator. These are commonly used to target login and account details for financial, social networking, and gaming websites.
  • Rogue Utility Applications, which attempt to use scare tactics in order to entice the computer's user to purchase the "full version" of the Rogue Utility.
  • Adware, which causes advertisements to appear on the user's desktop, in webpages, or elsewhere.
  • Rootkits, which attempt to conceal the presence of both the root kit and (usually) an accompanying piece of malware from another category from standard system tools and diagnostic utilities.
333 questions
2
votes
5 answers

Do you maintain an OMG it's !@#$ed CD with Utilities to recover and clean computers? What is on it?

I'm getting ready to build one with some of the common apps I use including malwarebytes, Spybot, and memtest86 . What elese do you recommend I add? Is there a single CD image out there that has all these tools already that I can just burn?
Zak
  • 1,032
  • 2
  • 15
  • 25
2
votes
1 answer

How can I block/reject doc, docx containing macro on my mail server?

I'm wondering if it is possible to block/reject emails with .doc or .docx containing macro? Is there any solution for postfix to be used in order to reject this kind of attachments? Today I just received file which is type of ransomware - containing…
user134969
  • 439
  • 2
  • 6
  • 18
2
votes
1 answer

How to get SCEP to notify the user when they just downloaded a virus?

We're using Microsoft's System Center Endpoint Protection (SCEP) as our antivirus solution. We have it set within SCCM to send the help desk and the sysadmins an email when a virus detection is found. However, I can't see where I can configure it…
Wes Sayeed
  • 1,902
  • 6
  • 28
  • 43
2
votes
2 answers

Detecting/preventing malicious outlook rules

Attackers like to abuse Outlook for a variety of purposes. For example, an attacker could auto forward emails to a remote address or persist inside a network by creating client-side rules that execute a malicious program/script when a user receives…
tifkin
  • 288
  • 2
  • 7
2
votes
1 answer

How can I scan files (or data streams) for virus/malware before uploading them into the server and database?

How can I scan an incoming file upload (or a datastream) into a webserver and database for virus/malware? I know how (using the excellent Clam) to scan things after they have been uploaded, but I would like to do the scanning before I upload them…
ahron
  • 365
  • 3
  • 14
2
votes
2 answers

Remove eml and HTML:Nimda viruses from my Linux machine

(yes, the title is strange, but read on...) I copied some data from here and there on my linux box and now i find some many eml and HTML:Nimda viruses on my system when i scan it using clamtk. Problem is that these are 1700+ files that i have to…
Shoaibi
  • 809
  • 1
  • 10
  • 28
2
votes
5 answers

What is the process of cleaning viruses from a network?

We have a problem with a network virus that spread through our network and most computers have been infected. What should I do to remove the virus? By installing and scanning anti-virus software, the virus wasn't removed. So I want to create Remote…
user19049
  • 487
  • 2
  • 14
  • 25
2
votes
1 answer

WMI query of DNS shows a root hint that's not present in the DNS plugin.

I was writing a Powershell script for my network when I came across some alarming information in our DNS. Bear in mind we still use Powershell v2, not v3. So I have to query DNS via the Get-WMI command. I wrote a query to get all A records from one…
2
votes
4 answers

What is the best way to deal with spam or virus infected hosts in wireless network with personal laptops?

What is the best way to deal with spam or virus infected hosts in wireless network with personal laptops (like personal students laptops in university)? What polices and tools use your company?
Kazimieras Aliulis
  • 2,324
  • 2
  • 26
  • 46
2
votes
3 answers

Do I need to deploy antivirus and anti-spyware software to all the PCs on my network?

I am already using antivirus on all our PCs, and, of course, we're behind a firewall. Does anti-spyware software like adaware still provide an additional benefit, or does modern antivirus/firewall software solve this problem?
user640
2
votes
6 answers

Websites on Ubuntu 8.04 LTS with Plesk are infected with viruses

I am running Plesk 9.5 on Ubuntu 8.04 LTS and have about 15 websites infected with some malicious code appended to the end of java files. I have installed Clamav and it has managed to pickup the infected files which have a pattern of starting with…
Paddington
  • 373
  • 5
  • 17
2
votes
2 answers

Why computer scanning network?

I have found out through Wireshark that a computer in my subnet scanning network ( sending ARPs for every IP-address in my subnet. Even if there no computers with such address). It repeats infinitely. About 200 ARPs per sec from this computer. …
Temak
  • 195
  • 1
  • 3
  • 11
2
votes
1 answer

Does windows 7 remember shared folder passwords to entire server instead of by share?

So I have a copy of Windows 7 Enterprise edition on my home computer. I've connected from the home computer to a network share on my windows 2003 server at work before. I assume that I told it to save my credentials when I did. I created a new…
2
votes
4 answers

HP Printer Malfunction (Virus?)

i'm having serious problems with several HP Printers. The issue is the following: my printer (different models) prints random ASCII character on the first line of a paper ( image sample: http://tinyurl.com/d2744sk ) and prints several papers ( 50+…
eldblz
  • 385
  • 2
  • 11
  • 21
2
votes
3 answers

Linux Stealth Process

I have a process named "stealth" that has infected my server (slamming my CPU) and I can't figure out where it is to remove it for good. Everytime I kill the process it somehow starts itself again... ps -ef | grep stealth gives me this: But I have…
Jesse Bunch
  • 324
  • 2
  • 9