My computer is a zombie. My IP has been blacklisted as a spammer. I
am not and never have been a spammer. I don’t know how to liberate my
computer. The spammy network grabs control for 48 to 72 hours at a
time, and won’t let me log on to the internet. My ISP is unfamiliar
with zombies.
Unfortunately, while your visible symptoms are more severe than
most, what you’re experiencing is frighteningly common. It seems like
every day there’s another study out showing that some incredibly high
percentage of machines are infected with malware that can turn them
into zombies at a moment’s notice.
I’ll look at exactly what we mean when we say “zombie”, how to tell
if your machine is one, how to prevent it and how to try to recover if
your machine has been taken over.
]]>
<
The folks at Trend Micro have a couple of free tools that might help: HouseCall and RUBotted.
http:// http://www.trendsecure.com/portal/en-US/tools/security_tools/housecall
http:// http://www.trendsecure.com/portal/en-US/tools/security_tools/rubotted
IF your solution is to wipe and rebuild the computer remember your backup maybe infected.
Use caution when restoring your backed up data.
I hate to prove my ignorance but I don’t see what’s good about an image backup to restore from a malware infection. I can see how you might restore data files but you can never use the image to restore anything that has to be installed. Can you? You’re back to format, install, update etc. I would say this is almost impossible on a dial-up. You’d be old and gray before you finished and then it might happen again right away. That’s why I like to deal face to face with local brick and mortar computer stores. They can fix things.
18-Mar-2009
In prescribing recovery for a machine already infected with malware, Leo counsels a backup for the infected machine before a complete format of its boot drive and reinstallation of Windows.
However, the logic of this escapes me, since the malware almost certainly will be imaged to the backup, and if the image is ever restored, so will be the malware.
The only possible defense of this approach is when the user has NO backup of any kind of system data, and must make one before the format, or lose the data. In that case, the user should restore selectively only the data required, but not the whole image.
Anyone contemplating this process should understand the difference between restoring a full image and a restoring selectively.
18-Mar-2009
These are very helpful tips and i would like to another.
If you purchased a computer second hand you may have received very genuine looking restore disks that were silk screened by a resourceful scammer.
Always purchase restore media from the manufacturer’s site secure and time-saving as all the needed drivers are in one place.