P
philo
Guest
Daave wrote:
> philo wrote:
>> Daave wrote:
>>> philo wrote:
>>>> Daave wrote:
>>>>> philo wrote:
>>>>>> PA Bear [MS MVP] wrote:
>>>>>>> philo wrote:
>>>>>>>
>>>>>>>> About a year ago I repaired a machine that had been compromised.
>>>>>>>>
>>>>>>>> It had been used for on-line banking and credit card
>>>>>>>> transactions and two accounts had been hacked.
>>>>>>>>
>>>>>>>> First thing I did was scan for root kits in all the places one
>>>>>>>> would expect.
>>>>>>>>
>>>>>>>> Nothing found.
>>>>>>>>
>>>>>>>> After giving the machine a thorough scan...
>>>>>>>> the root kit was found "hiding" in the restore volume!
>>>>>>> So what? That "restore volume" wasn't active & posed no threat
>>>>>>> unless you or the user selected that particular Restore Point.
>>>>>>>
>>>>>> You missed the point entirely..
>>>>>>
>>>>>> the root kit was able to "phone home"
>>>>>>
>>>>>> from within the restore volume.
>>>>>>
>>>>>> those Russian chaps are rather clever
>>>>> If the rootkit was phoing home, it was doing so from a location
>>>>> other than the restore volume. Just because you are unable to
>>>>> detect it doesn't mean it isn't there!
>>>>>
>>>>>
>>>> I'll answer the both of you here:
>>>>
>>>> Wrong
>>> Unsubstantiated.
>>>
>>> It has already been established that certain rootkits are
>>> next-to-impossible to detect.
>>>
>>> The rootkit that you say was "hiding" in the restore point obviously
>>> wasn't hidden! However, the rootkit very likely remained in the
>>> system (the restore volume doesn't count unless you use SR, using
>>> that particular restore point), hidden from you. And your situation
>>> is not the only one.
>>>
>>>
>> I used the word "hiding"
>> as I needed to scan the drive from another system to detect it.
>>
>> The rootkit was designed to operate from within the restore volume.
>
> Please provide documentation.
>
>
some good reading here
(may warp)
http://books.google.com/books?id=5C...v=onepage&q=rootkit in restore volume&f=false
> philo wrote:
>> Daave wrote:
>>> philo wrote:
>>>> Daave wrote:
>>>>> philo wrote:
>>>>>> PA Bear [MS MVP] wrote:
>>>>>>> philo wrote:
>>>>>>>
>>>>>>>> About a year ago I repaired a machine that had been compromised.
>>>>>>>>
>>>>>>>> It had been used for on-line banking and credit card
>>>>>>>> transactions and two accounts had been hacked.
>>>>>>>>
>>>>>>>> First thing I did was scan for root kits in all the places one
>>>>>>>> would expect.
>>>>>>>>
>>>>>>>> Nothing found.
>>>>>>>>
>>>>>>>> After giving the machine a thorough scan...
>>>>>>>> the root kit was found "hiding" in the restore volume!
>>>>>>> So what? That "restore volume" wasn't active & posed no threat
>>>>>>> unless you or the user selected that particular Restore Point.
>>>>>>>
>>>>>> You missed the point entirely..
>>>>>>
>>>>>> the root kit was able to "phone home"
>>>>>>
>>>>>> from within the restore volume.
>>>>>>
>>>>>> those Russian chaps are rather clever
>>>>> If the rootkit was phoing home, it was doing so from a location
>>>>> other than the restore volume. Just because you are unable to
>>>>> detect it doesn't mean it isn't there!
>>>>>
>>>>>
>>>> I'll answer the both of you here:
>>>>
>>>> Wrong
>>> Unsubstantiated.
>>>
>>> It has already been established that certain rootkits are
>>> next-to-impossible to detect.
>>>
>>> The rootkit that you say was "hiding" in the restore point obviously
>>> wasn't hidden! However, the rootkit very likely remained in the
>>> system (the restore volume doesn't count unless you use SR, using
>>> that particular restore point), hidden from you. And your situation
>>> is not the only one.
>>>
>>>
>> I used the word "hiding"
>> as I needed to scan the drive from another system to detect it.
>>
>> The rootkit was designed to operate from within the restore volume.
>
> Please provide documentation.
>
>
some good reading here
(may warp)
http://books.google.com/books?id=5C...v=onepage&q=rootkit in restore volume&f=false