Cleaning up after the WMF exploit



OK, I mentioned that I infested a virtual machine with the current WMF 0-day exploit. First I should probably clarify. An exploit is a means of getting in to a system. The payload is the software that is installed. In the case of my experience there was a long list of pests installed. Given that the exploit enables any software to be installed, your experience may be different. That’s the first thing I want to make clear, depending on where and when you were affected you may see vastly different malware.


The second thing I want to make clear is that the best solution for a badly infested system is to clean the hard drive and reinstall. Remote access trojans and keyloggers are many and varied and it’s entirely possible that many (or at least one) will be missed in the cleaning process. That much said, a cleaning of this image is what I did. (Although after I’m done looking at it, it will be replaced with it’s clean copy.)

The next series of articles will deal with the problems I ran into trying to clean the system. I’ll try to keep them in continuous order, but won’t be giving “part x” names for the most part. As we speak the image is booting up with full networking and I’m keeping an eye on it to so if it’s really clean. It appears that the infestation is over, but I don’t trust it yet.

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft working to ensure Windows Validation works with Firefox I've got to say, I'm impressed that this is happening. From the IEblog... The core of my team’s job is to make IE7 and Windows Vista so compelling so that people choose our products. The people who work on Windows want you to have a good experience, whether you use......
  • Update on the Internet Explorer VML vulnerability Just catching up on the days VML vulnerability news from today.... It looks as though... the exploit is now MUCH more widespread this blog has some video of an infection, what's notable is that the first take was VERY UNEVENTFUL, it was used to stealthily install a keylogger. (So that......
  • Opengroupware install on Ubuntu 6.06 Dapper Drake One recent task was install opengroupware on a dapper drake 6.06 install in a virtual machine. I followed the instructions found here and ran into a slight problem. The default install from Ubuntu does not have apache in the enabled repositories. (Apache2)... following the intsructions given I first added opengroupware's......
Blog Traffic Exchange Related Websites
  • How to Learn More about Paper Money Image There are different things that you want to do whenever you are collecting currency. Among the different things that you want to do is to make sure that you are getting the right choices for your collection. The main thing to make sure of is that you are getting exactly......
  • Pc Repair Using Registry Cleaners How can you speed up your pc when it starts slowing down? For you to fix this issue, you need to understand why it happens. Generally, slow operations on a PC are caused by a problem within the windows registry. This is the devote the pc system where all of......
  • Proper Care and Maintenance of a Violin If you have just received or purchased a violin, and you are worried that you may damage or break your violin accidentally, then the following set of instructions will help you keep your violin looking and playing well. 1 - First and foremost, you need to make sure that you......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Cleaning up after the WMF exploit”

  1. The PC Doctor Says:


    The effects of the WMF exploit

    Avery J. Parker has spent a great deal of time and energy in detailing how to remove the WMF exploit from a PC.  He’s detailed his work in a series of blog posts that I think are well worth taking the time to read.

    Cleaning up after the …


Switch to our mobile site