TIP: Click on subject to list as thread! ANSI
echo: doghouse
to: WAYNE CHIRNSIDE
from: George Pope
date: 2006-08-01 16:54:46
subject: story making the rounds

That's frightening  you goy going on! :(

If it were me, I'd haul out the HDD, unplug the BIOS battery(for 48
hours, to totally drain the BIOS in case the malware stashed a copy of
itself in the boot run proggies) then start fresh and just avoid
everything you'd been doing the week before getting infucted! :(

Sucks.

Good luck in recovery!

Because I care,
|<+]::-)  (Cyberpope(the Bishop of ROM!))


On (01 Aug 06) WAYNE CHIRNSIDE wrote to CINDY HAGLUND...

 WC> ->  WC> Now that's a good one.
 WC> ->  WC> thanks.
 WC>
 WC> ->  WC> I needed a laugh just now.
 WC>
 WC> ->  Don't we all and you are very welcome, Wayne.
 WC>
 WC> ->  WC> Got the darndest malware going on here.
 WC>
 WC> ->  Viri? Bugs? Worms? Spam?
 WC>
 WC> Two possible infection vectors.
 WC> One, the application upgrade utility for this O.S. apt-get has lousy
 WC> insecure configuration defaults.
 WC> Two, a trojan horse possibly attached to the Mozilla browser.
 WC>
 WC> -> WC> Two absolutely perfect hard drives but I dare not use or
 WC> connect
 WC> ->  WC> either.
 WC>
 WC> ->  Why?
 WC>
 WC> Well because...
 WC> Whoever aimed this crud at me was extremely good at programming.
 WC> I *cannot* remove or even fdisk the hard drive.
 WC> I cannot even *destroy* the hard drive.
 WC> All too easy to do ordinarily with Linux however this
 WC> malware has a *real* healthy survival instinct.
 WC> It *will not* die.
 WC>
 WC> This particular malware runs a super user account ( owns the machine)
 WC> and has the Linux equivelent of a TSR program running in the
 WC> backgraound
 WC> ( a daemon).
 WC> This is a malicious program resident in RAM.
 WC> It's running 5 times the processes I am as user and logs my
 WC> keystrokes,
 WC> steals my addresses from my address book and phones home if I happenm
 WC> to
 WC> be logged on at 12:14 A.M. in the morning.
 WC> As I use online banking this s a *very bad* thing.
 WC> All my passwords are at risk, well more than that, it's a sure thing
 WC> they'll be stolen including that to the online banking.
 WC>
 WC> Because I'm very weird I noticed _something_ was up with the computer
 WC> and looked very very hard to dig out the information I've got.
 WC> This particular malware has set up it's own peculiar unknown
 WC> invulnerble
 WC> ( to me at least) hidden partition on the hard drive.
 WC>
 WC> Even using Linux in eXpert mode it refuses to allow alter the hard
 WC> drive geometry parameters.
 WC> It _appears_ to allow it but reboot, it's still there and nothing's
 WC> changed.
 WC> Physically a perfectly good hard drive it's worse than useless.
 WC> Someone HAS tried phishing my online banking account.
 WC> I got an email ( with malicious file attachment)
 WC> Right logos for my bank, even the right information on where to look
 WC> for
 WC> the information about suspicious account activity.
 WC> Only the account activity indicates the bank *never sent the alerting
 WC> email*
 WC> By this time I'd disconnected the hard drive power and data cables
 WC> and rebooted plain vanilla Linux live CD in RAM to get online.
 WC> By powering down and disconnecting the drives the optical CD
 WC> isn't writtable so thus uncorruptable I could *then* safely check the
 WC> account.
 WC>
 WC> ->  WC> Nor buy a new one unless I figure out the infection vector.
 WC>
 WC> ->  ah. yeah. :( I wish there was something to do to stop those
 WC> -> assholes.. they never quit!!!!
 WC>
 WC> If I were healthy it wouldn't be the big deal it is.
 WC> As is it's a huge hassle.
 WC> Likely change my password a few more times this week just in case he
 WC> or
 WC> she is still at it.
 WC> Not that I've got any money to speak of, it's just that every dollar
 WC> is
 WC> survival.
 WC> --- Platinum Xpress/Win/WINServer v3.0pr5
 WC> 14


--- PPoint 1.76
WC> * Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
* Origin: Cyberpope pointing via Bandmaster BBS! (1:153/715.1275)
SEEN-BY: 633/267 270 5030/786
@PATH: 153/715 7715 140/1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.