Trojan Horse

Duis mollis, est non commodo luctus, nisi erat porttitor ligula, eget lacinia odio sem nec elit. Sed posuere consectetur est at lobortis. Vestibulum id ligula porta felis euismod semper. Donec ullamcorper nulla non metus auctor fringilla. Aenean lacinia bibendum nulla sed consectetur. Cras justo odio, dapibus ac facilisis in, egestas eget quam. Cras mattis consectetur purus sit amet fermentum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. Sed posuere consectetur est at lobortis. Etiam porta sem malesuada magna mollis euismod. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Duis mollis, est non commodo luctus, nisi erat porttitor ligula, eget lacinia odio sem nec elit. Cras justo odio, dapibus ac facilisis in, egestas eget quam. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Curabitur blandit tempus porttitor. Sed posuere consectetur est at lobortis.

What is the name of the Trojan Horse?

How do you knoe you have one? 

Recently i have found that i have a  Trojan Horse, went online and did everything it asks, it says its in a Restricted Area, so should i reformat or…


jwalker wrote:
Because of this, whenever there is or recently has been a backdoor or Trojan horse on a system it is Symantec’s best recommendation to backup data and format the system to ensure system security.

_________________________________________________________

 

I don't mean to be picky, but I'd like to emphasize "backup data" (basically your My Documents folder and whatever other files you have created) ... and not your entire system.

 

As you rightfully point out, though, that still doesn't guarantee your data files haven't been damaged. :smileysad: 

Coalminer,

I’m sorry to hear about your computer’s infection. Unfortunately, ‘backdoor viruses’ and Trojan Horses can lower system security settings and open “backdoors” into a computer system. This allows cyber-thieves to hack into the system and gain access to the entire range of information that is stored on that computer. Even if these threats are successfully detected and removed by security software it is impossible to guarantee the security of the computer, without formatting the hard drive, because of what the cyber-thieves may have done to the computer prior to the threat being removed. Because of this, whenever there is or recently has been a backdoor or Trojan horse on a system it is Symantec’s best recommendation to backup data and format the system to ensure system security. I sincerely apologize for any inconvenience this may cause you.

For future reference and for anyone elso who may stumble upon this post, I’d like to include a list of safe computing habits which can reduce your risk of future infections significantly:

Home/Home Office Computing—Best Security Practices

1. Use an Internet security solution that combines antivirus, firewall, intrusion detection, and vulnerability management for maximum protection against malicious code and other threats.

2. Ensure that security patches are up-to-date and that they are applied to all vulnerable applications in a timely manner.

3. Ensure that passwords are a mix of letters and numbers. Do not use dictionary words. Change passwords often.

4. Never view, open, or execute any email attachment unless the attachment is expected and the purpose of the attachment is known.

5. Keep virus definitions updated regularly. By deploying the latest virus definitions, consumers can protect their computers against the latest viruses known to be spreading “in the wild.”

6. Check to see if your PC or Macintosh® system is vulnerable to threats by using Symantec Security Check at: http://security.symantec.com/.

7. All computer users need to know how to recognize computer hoaxes and phishing scams. Hoaxes typically include a bogus email warning to “send this to everyone you know” and/or improper technical jargon that is intended to frighten or mislead users. Phishing scams appear to come from a legitimate organization and entice users to enter credit card or other confidential information into forms on a Web site designed to look like that of the legitimate organization. You should never disclose confidential information without confirming that the request is legitimate.

8. Both spyware and adware can be automatically installed on a computer along with file-sharing programs, free downloads, and freeware and shareware versions of software, or by clicking on links and/or attachments in email messages, or via instant messaging clients. Therefore, you should be informed and selective about what you install on your computer.

9. Don’t just click those “Yes, I accept” buttons on end-user licensing agreements (EULAs). Some spyware and adware applications can be installed after you accept the EULA, or as a consequence of that acceptance. Read EULAs carefully to examine what they mean in terms of privacy. The agreement should clearly explain what the product is doing and provide a way to uninstall it.

10. Beware of programs that flash ads in the user interface. Many spyware programs track how users respond to these ads, and their presence is a red flag. When you see ads in a program’s user interface, you may be looking at a piece of spyware. Don’t click on ads that appear unexpectedly in your browser window. Instead, close the window immediately.

Best of luck with the issue,

JW

(Edited formatting.)

Message Edited by Dave_Coleman on 06-09-2008 10:51 AM

I have this trojan problem that i dont understant.

I will post 2 vidoes of what happens and its wried.

The videos go fast so you may want to slow down the speed of the video.

Someone please help

im using norton 360 Version: 3.5.2.11

and for some reason when im adding the vieos an unexpected error comes

 

If you are trying to add videos to your post:

You cannot post or embed videos in your messages when posting in this forum. 

 

Has Norton 360 caught a trojan? Can you please  be more specific about "trojan problem"? Thanks.

ok i have uploaded the videos

link:

- Video 1

- Video 2

watch them both

you may want download them first and then play them in windows media player and change the speed to as slow it can get.

youtube downloader link

- Youtube downader

 

Hi shubby.  I have asked for some assistance for you.

 

 

ok but please help me fast this virus make my internet really slow

Wow these were very fast indeed. was I right to see these were tracked down in your temp folder? If that is the case please clear that folder. 

Do you have any other security programs installed? 

no i only have norton

and i did clear those folders but it just kept on going making folders and taking me to some random page

ok that virus wouldnt let the computer start as i think

but i always have a backup disc and recovery disc(lucky me)

it was alright to go but i still dont get that virus.

it looked like a trojan dorpper to me but still not sure 

If your computer is not booting/loading properly, then you might just have to reformat your computer like you did the last time; you might also - please excuse my being direct - have to consider using and maintaining safer browsing habits…and following Norton’s suggestion to not download an infected file instead of turning off Norton and downloading the infected file.

Was it a BSOD code 7B ******************************************* ???

 

As your video 1 shows files connected to TDSS, probably Gen3

 

Quads 

yea i did reformat the computer.

and dont know what BSOD code 7B is or was in my old settings

 

this is the screen i got when my computer shutdown(not the post the blue screen)

i got this picture from another post

 

 1.jpg

 

 

[edit: Resized image to fit.]

Message Edited by shannons on 12-11-2009 08:01 PM
Message Edited by shubby on 12-11-2009 08:10 PM

Bugger another Code 7B, with Norton and TDL3 (TDSS Gen 3).

 

Quads 

Was this caused by norton if it was that is sad..

i think it should be fixed and fixed fast(if its caused by norton)

Message Edited by shubby on 12-11-2009 09:09 PM