Cleaning up after the WMF exploit



OK, I mentioned that I infested a virtual machine with the current WMF 0-day exploit. First I should probably clarify. An exploit is a means of getting in to a system. The payload is the software that is installed. In the case of my experience there was a long list of pests installed. Given that the exploit enables any software to be installed, your experience may be different. That’s the first thing I want to make clear, depending on where and when you were affected you may see vastly different malware.


The second thing I want to make clear is that the best solution for a badly infested system is to clean the hard drive and reinstall. Remote access trojans and keyloggers are many and varied and it’s entirely possible that many (or at least one) will be missed in the cleaning process. That much said, a cleaning of this image is what I did. (Although after I’m done looking at it, it will be replaced with it’s clean copy.)

The next series of articles will deal with the problems I ran into trying to clean the system. I’ll try to keep them in continuous order, but won’t be giving “part x” names for the most part. As we speak the image is booting up with full networking and I’m keeping an eye on it to so if it’s really clean. It appears that the infestation is over, but I don’t trust it yet.

Related Posts

Blog Traffic Exchange Related Posts
  • Cleaning up after WMF exploit - BHO removal Browser helper objects (BHO's) are listed in the registry and load with explorer when it runs (Internet Explorer/ File explorer are so closely tied it affects both.) I've used BHOdemon in the past to identify and disable BHO's and a tool like that is the preferred method. However, in my......
  • Cleaning up after WMF Exploit - summary Can I say enough times that after a bad trojan infestation you should format and reinstall? I've cleaned up the infested image that I "sacrificed" to the WMF exploit and as I've said you're pestware install will likely be somewhat different. An exploit is just the road, the spyware and......
  • Windows 98 and the WMF exploit I've seen breathless headlines that say "Windows PCs face 'huge' virus threat; Affects every MICROSOFT OS shipped since 1990..." and really would like to try to clarify (again) what the situation is. Yes, the bug or vulnerability that's currently being exploited exists as far back as Windows 3.0, but as......
Blog Traffic Exchange Related Websites
  • Teaching Teen Moneymakers Not to Spend it All at Once Guiding money-making teens down the path to financial stability is much easier if they have had some experience with handling money in their early teen years, but even if they have had absolutely no responsibilities up to this point all is not lost. If your teen has not previously been......
  • 3 Steps to Safely Clean and Preserve Your Rare Silver Coins The value of a coin is something which is affected by the appearance of the coin itself. There are a few different times when you might not want to clean a silver coin. When the coin is extremely old, you might actually cause the silver to weaken and deteriorate by......
  • Tips for a Frugal and Eco-Friendly Spring Guest Post Author Bio: This post was written by Les Roberts money saving writer at Moneysupermarket.com. The evenings are getting lighter, the birds are singing and the weather is completely erratic…all of which means that spring time is upon us once more. And with spring time comes spring cleaning, the chance......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Cleaning up after the WMF exploit”

  1. The PC Doctor Says:


    The effects of the WMF exploit

    Avery J. Parker has spent a great deal of time and energy in detailing how to remove the WMF exploit from a PC.  He’s detailed his work in a series of blog posts that I think are well worth taking the time to read.

    Cleaning up after the …


Switch to our mobile site