LAconsult
New Member
- Reaction score
- 0
- Location
- Los Angeles
This virus sucks. On one computer/server maybe it wouldn't be such a big deal, but I've got an uber infection on a client network that started a few days ago, and progress has been very slow. Hopefully something can be learned from this post as I keep trying to find a resolution, try any suggestions short of reinstalling everyone's computers from scratch, and document my attempts. This is an environment I've been trying to convert from time and material to managed services for a while now. They know the benefits of managed services, I've tried out two different kinds (GFI and Kaseya) on this network and they worked great, with no issues and staying on top of automated maintenance/virus notification etc for months, but the cost @ $12/computer and $30/server per month (I was trying to give a great deal because I really wanted the best for my client but needed to make -something- for management of the product), was apparently too high for the owner. Plus he complained that the RMM software made their computers too slow.
So I moved to AVG free on all of the computers, and again owner complained it made the computers too slow! Fed up with the complaints, I caved and hoped that the firewall on the Cisco WRVS4400N, latest Windows updates and encouragement of good security practices would suffice. Well it did for about the last 8 months or so. I would remote in and manually do a cleanup on all of the computers, check the health of the server regularly etc all for a minimal cost. We were skating by with no antivirus, but things seemed to be going well. Until just a few days ago. Wham! My phone rings off the hook, text messages, emails and all. "Our folders are gone!! we can't work!!" I knew within minutes of logging in, this office with 6 computers (4 on Win XP, 2 on Win 7), and a domain controller/file server running Server 2008 has been infected with W32.Changeup. http://www.symantec.com/connect/blogs/w32changeup-keeps-giving
I realized that in the interest of being the flexible tech, I have allowed the client to sacrifice his business so as to better accommodate convenience over security. Bad move!
Since I now live out of state, I had a tech I've worked with a lot go on site, after many attempts to resolve remotely had failed. Not only are all the desktops infected, but the network shares hosted by the server are as well.
The office had a half day yesterday, and we have been trying to remediate ever since. To reimage all the computers, deal with licensing, install/config of proprietary applications etc would literally take about 20 hours of work. Presently we have about 6hrs into it and once we get to about 12, I think we will pull the plug. I'm hoping there is a way other than starting over again to resolve this.
What we've tried so far:
Disable autorun on domain controller and in group policy.
For whatever reason this didn't take when I tried through group policy and ran gpupdate /force on all systems. Also on the XP systems, the policy for autorun was not listed in gpedit so I did it manually on each computer per the Microsoft KB article on this:
Install SEP 12 and update.
Boot every system (server included) into safe mode and run a full scan.
Boot into regular mode and run another full scan after wiping out quarantine.
At this point, all systems appeared clean, even the file shares.
The very next day, virus was back. Everything was infected again. I restored no backups, the only thing I can think of is that it's getting through the firewall, or someone used an infected external medium. I advised them to get all new flash cards for the company cameras until we can scan in a protected environment to make sure they were OK, and ran the same scans again. It appeared we had once again cleaned the network of the virus, but within a few hours it was back again!
According the all the info I can find via google, I've done everything I can do with the exception of finding/blocking the C&C servers that the virus communicates with and finding/blocking the ports that it uses. However, the firewall is configured to only allow what is specified, and deny anything else. I'm stumped! Here's what I'm considering:
-Running Wireshark or some other sniffer to gain insight into traffic patterns, and trying to block at the network level, however my experience with this is slim.
Hoping someone here has a recommendation. Thanks in advance!
So I moved to AVG free on all of the computers, and again owner complained it made the computers too slow! Fed up with the complaints, I caved and hoped that the firewall on the Cisco WRVS4400N, latest Windows updates and encouragement of good security practices would suffice. Well it did for about the last 8 months or so. I would remote in and manually do a cleanup on all of the computers, check the health of the server regularly etc all for a minimal cost. We were skating by with no antivirus, but things seemed to be going well. Until just a few days ago. Wham! My phone rings off the hook, text messages, emails and all. "Our folders are gone!! we can't work!!" I knew within minutes of logging in, this office with 6 computers (4 on Win XP, 2 on Win 7), and a domain controller/file server running Server 2008 has been infected with W32.Changeup. http://www.symantec.com/connect/blogs/w32changeup-keeps-giving
I realized that in the interest of being the flexible tech, I have allowed the client to sacrifice his business so as to better accommodate convenience over security. Bad move!
Since I now live out of state, I had a tech I've worked with a lot go on site, after many attempts to resolve remotely had failed. Not only are all the desktops infected, but the network shares hosted by the server are as well.
The office had a half day yesterday, and we have been trying to remediate ever since. To reimage all the computers, deal with licensing, install/config of proprietary applications etc would literally take about 20 hours of work. Presently we have about 6hrs into it and once we get to about 12, I think we will pull the plug. I'm hoping there is a way other than starting over again to resolve this.
What we've tried so far:
Disable autorun on domain controller and in group policy.
For whatever reason this didn't take when I tried through group policy and ran gpupdate /force on all systems. Also on the XP systems, the policy for autorun was not listed in gpedit so I did it manually on each computer per the Microsoft KB article on this:
Installed/updated/ran MBAM, removing many infected files.Click Start, click Run, type regedit in the Open box, and then click OK.
Locate and then click the following entry in the registry:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\NoDriveTypeAutorun
Right-click NoDriveTypeAutoRun, and then click Modify.
In the Value data box, type 0xFF to disable all types of drives. Or, to selectively disable specific drives, use a different value as described in the "How to selectively disable specific Autorun features" section.
Click OK, and then exit Registry Editor.
Restart the computer.
Install SEP 12 and update.
Boot every system (server included) into safe mode and run a full scan.
Boot into regular mode and run another full scan after wiping out quarantine.
At this point, all systems appeared clean, even the file shares.
The very next day, virus was back. Everything was infected again. I restored no backups, the only thing I can think of is that it's getting through the firewall, or someone used an infected external medium. I advised them to get all new flash cards for the company cameras until we can scan in a protected environment to make sure they were OK, and ran the same scans again. It appeared we had once again cleaned the network of the virus, but within a few hours it was back again!
According the all the info I can find via google, I've done everything I can do with the exception of finding/blocking the C&C servers that the virus communicates with and finding/blocking the ports that it uses. However, the firewall is configured to only allow what is specified, and deny anything else. I'm stumped! Here's what I'm considering:
-Running Wireshark or some other sniffer to gain insight into traffic patterns, and trying to block at the network level, however my experience with this is slim.
Hoping someone here has a recommendation. Thanks in advance!