I’ve been beating my head against an interesting infection. You’ve probably all had experience with the MyDoom worm, the one that modified the hosts file?
The effect of this one is similar, though through a different mechanism. The infection prevents contact with Microsoft.com or any antivirus or antimalware site that I’ve tried so far. It doesn’t touch the hosts file and removing same doesn’t help. Flushing the DNS cache doesn’t help. Neither does changing DNS servers. Nothing seems to detect or fix the malware.
The point of general interest is that many security applications insist on phoning home before they do anything else. Many of the antivirus downloads are just installers. They will try to download the rest of the application from their home web sites before they do anything else, and if they can’t make contact, they stop dead.
AVG and Avast! are both guilty of this. Malwarebytes’ Anti-Malware can’t update itself, and the “manual” downloaded data update uses a database in a different and incompatible format. You need the program update, not just the data update. MBAM gives a really lousy error message:
732(12007,0)
Hey, how helpful is THAT? And their forum treats this as the user’s fault, fiddling with a couple of useless settings that aren’t going to do anything.
I have access to a separate computer so have worked around this, but tye typical user, who probably does not, is just out of luck.
It’s a good attack, if that word can be applied. Most of the non-pirated antivirus software that isn’t purchased on physical disk, is going to be vulnerable. The software that IS on disk is vulnerable to the extent that it doesn’t include an update late enough to deal with this thing.
The security software can’t update itself, many can’t even install themselves, since all access to the home site is blocked. This needs to be a new consideration when evaluating security software, because it’s a huge vulnerability for most people. Every suite or application that you can get from (e.g.) download.com, but which relies on contacting a blocked server back home to complete the installation is now useless.
I could also use any ideas anyone might have about digging it out. MBAM, SuperAntiSpyware, NOD32, windows Defender. UnHackMe including Partizan rootkit, SpywareDoctor, SpywareHunter, AdAware, Spybot S&D, and reinstalling Windows (XP SP3) have all failed to cure this problem. Firefox and IE are both affected equally.
I can ping and nslookup the sites that are blocked. For www.avg.com I resolve to an address of 77.67.44.203 which is the same IP I get on the working machine. Trying to browse to that address gives me, “Firefox can’t find the server at www.avg.com”.
I can get to a stripped version (no graphics) of the site by adding a hosts record manually.
If anybody’s heard of this or has some ideas I’d like to hear from you. Meanwhile, think about what security software you’ve been recommending to others, and whether it’s vulnerable like this.