User User name Password  
   
Monday 27.10.2025 / 19:52
Search AfterDawn Forums:        In English   Suomeksi   På svenska
afterdawn.com > forums > announcements > news comments > how to clean gameover zues during two-week window
Show topics
 
Forums
Forums
How to clean Gameover ZueS during two-week window
  Jump to:
 
The following comments relate to this news article:

How to clean Gameover ZueS during two-week window

article published on 3 June, 2014

The UK's National Crime Agency has said that there is a two week window of opportunity to clean as many Gameover ZeuS infections as possible, before cybercriminals may regain control of the botnet. As we reported yesterday, a U.S./FBI-led international effort significantly disrupted the operation of the Gameover ZeuS botnet, which uses peer-to-peer communications and encryption to send ... [ read the full article ]

Please read the original article before posting your comments.
Posted Message
Senior Member
_
3. June 2014 @ 11:34 _ Link to this message    Send private message to this user   
I would have thought that the latest combofix from bleepingcomputer.com would probably get it too.

I've also seen it rescue files that have been locked up by some sort of ransom-ware, which seemed miraculous at the time. I can't say that would apply to Cryptolocker necessarily.

Its a lot easier being righteous than right.

DSE VZ300-
Zilog Z80 CPU, 32KB RAM (16K+16K cartridge), video processor 6847, 2KB video RAM, 16 colours (text mode), 5.25" FDD
Advertisement
_
__
Staff Member
_
3. June 2014 @ 12:13 _ Link to this message    Send private message to this user   
Originally posted by Jemborg:
I would have thought that the latest combofix from bleepingcomputer.com would probably get it too.

I've also seen it rescue files that have been locked up by some sort of ransom-ware, which seemed miraculous at the time. I can't say that would apply to Cryptolocker necessarily.

Combofix might get it but combofix does a LOT more to the system than just target a single rootkit, so I wouldn't suggest running Combofix when there's more targeted tools.

As for the ransomware, unfortunately Cryptolocker-encrypted contents can't be decrypted yet. Only way to get your stuff back is pay the ransom right now.
ddp
Moderator
_
3. June 2014 @ 13:27 _ Link to this message    Send private message to this user   
not even a system restore to before that problem started?
Staff Member
_
3. June 2014 @ 13:55 _ Link to this message    Send private message to this user   
Originally posted by ddp:
not even a system restore to before that problem started?

Cryptolocker wouldnt be affected by system restore because it literally encrypts your personal files in the background, so a system restore cannot undo that.

Where System Restore can help is when people get scammed by a cold caller who enables encryption of the SAM hive in Windows. In that case, you can usually restore a SAM hive from a recent snapshot or even if the original hives are still on the drive after Windows' initial setup. But in that case its simply a Windows feature (SYSKEY) that has been activated and once it has been it shouldn't be reversible.. but of course if you can get recent registry hives before it was enabled than you should be able to fix it.

As for the rootkit itself, rootkits have evolved well beyond the point of beating system restore for quite some time so I'd be surprised if that worked. But system restore can't do anything about a bootkit for example, as system restore doesn't affect the MBR right?
Senior Member
_
3. June 2014 @ 20:44 _ Link to this message    Send private message to this user   
When I do Format my machine and didn't save any file for one reason or another. I use Test-Disk (cmd - Forensic tool).

I guess this tool can do the trick if the files are lost inside your machine, and you want a "quick" recovery by date.

P.S.
It work on SD-Cards, Smartphones, etc. deleted data too.

http://www.cgsecurity.org/wiki/TestDisk_Download

Tutorial:
http://www.youtube.com/watch?v=jhWbSM-630E

Live Free or Die.
The rule above all the rules is: Survive !
Capitalism: Funnel most of the $$$ to the already rich.

This message has been edited since posting. Last time this message was edited on 3. June 2014 @ 21:43

ddp
Moderator
_
3. June 2014 @ 21:10 _ Link to this message    Send private message to this user   
i've used Easy Recovery Professional 6 a number of times to recover data for various reasons like missing password for an account before reloading windows.
Senior Member
_
3. June 2014 @ 21:18 _ Link to this message    Send private message to this user   
Originally posted by Dela:
Originally posted by Jemborg:
I would have thought that the latest combofix from bleepingcomputer.com would probably get it too.

I've also seen it rescue files that have been locked up by some sort of ransom-ware, which seemed miraculous at the time. I can't say that would apply to Cryptolocker necessarily.

Combofix might get it but combofix does a LOT more to the system than just target a single rootkit, so I wouldn't suggest running Combofix when there's more targeted tools.

As for the ransomware, unfortunately Cryptolocker-encrypted contents can't be decrypted yet. Only way to get your stuff back is pay the ransom right now.
Fair enough. And I suppose too one only runs Combofix when they know they have a problem.

With Cryptolocker they ask for a money transfer (not CC or bank details) right?



-----------------------------------------------------------------------

Its a lot easier being righteous than right.

DSE VZ300-
Zilog Z80 CPU, 32KB RAM (16K+16K cartridge), video processor 6847, 2KB video RAM, 16 colours (text mode), 5.25" FDD

This message has been edited since posting. Last time this message was edited on 3. June 2014 @ 21:20

Staff Member
_
3. June 2014 @ 21:30 _ Link to this message    Send private message to this user   
Originally posted by Jemborg:
Originally posted by Dela:
Originally posted by Jemborg:
I would have thought that the latest combofix from bleepingcomputer.com would probably get it too.

I've also seen it rescue files that have been locked up by some sort of ransom-ware, which seemed miraculous at the time. I can't say that would apply to Cryptolocker necessarily.

Combofix might get it but combofix does a LOT more to the system than just target a single rootkit, so I wouldn't suggest running Combofix when there's more targeted tools.

As for the ransomware, unfortunately Cryptolocker-encrypted contents can't be decrypted yet. Only way to get your stuff back is pay the ransom right now.
Fair enough. And I suppose too one only runs Combofix when they know they have a problem.

With Cryptolocker they ask for a money transfer (not CC or bank details) right?



-----------------------------------------------------------------------

Ye typically one bitcoin, which at the moment is over $600 to acquire. Cryptolocker can be delivered to a PC on Gameover ZeuS botnet if that PC has failed to provide any other means of fraud. So basically, if your details / money aren't stolen directly, Cryptolocker can be used to extort money from you.
Senior Member
_
4. June 2014 @ 03:12 _ Link to this message    Send private message to this user   
Freaking parasites. Scum.

Useful info. I'll pass it on. Surprised it's not all over the news.

(Been hacked in the past... got our money back. Glad we do all our banking and financial transactions on Puppy now. Deliberately use a CC card with the lowest credit amount too. (I realise it's not protection from exortionware.))



-----------------------------------------------------------------------

Its a lot easier being righteous than right.

DSE VZ300-
Zilog Z80 CPU, 32KB RAM (16K+16K cartridge), video processor 6847, 2KB video RAM, 16 colours (text mode), 5.25" FDD

This message has been edited since posting. Last time this message was edited on 4. June 2014 @ 03:14

Advertisement
_
__
 
_
Senior Member
_
18. June 2014 @ 01:23 _ Link to this message    Send private message to this user   
Better late than never. :)

I ran this program from my desktop and a txt file immediately appeared there (also) titled FixNecurs64bit. I could not find a file on my drive labelled Fixtool.log anywhere.

I assume that is the logfile referred to above.

The txt file was utterly blank. Neither confirming or denying any infection. Which I suppose was a good thing.

I don't mean to be a pedant but could someone confirm that I've made the correct assumptions here and that things are ok?

Cheers in advance, much obliged.



-----------------------------------------------------------------------

Its a lot easier being righteous than right.

DSE VZ300-
Zilog Z80 CPU, 32KB RAM (16K+16K cartridge), video processor 6847, 2KB video RAM, 16 colours (text mode), 5.25" FDD

This message has been edited since posting. Last time this message was edited on 18. June 2014 @ 01:25

afterdawn.com > forums > announcements > news comments > how to clean gameover zues during two-week window
 

Digital video: AfterDawn.com | AfterDawn Forums
Music: MP3Lizard.com
Gaming: Blasteroids.com | Blasteroids Forums | Compare game prices
Software: Software downloads
Blogs: User profile pages
RSS feeds: AfterDawn.com News | Software updates | AfterDawn Forums
International: AfterDawn in Finnish | AfterDawn in Swedish | AfterDawn in Norwegian | download.fi
Navigate: Search | Site map
About us: About AfterDawn Ltd | Advertise on our sites | Rules, Restrictions, Legal disclaimer & Privacy policy
Contact us: Send feedback | Contact our media sales team
 
  © 1999-2025 by AfterDawn Ltd.

  IDG TechNetwork