Ramnit.gen Yardım ( Turkey )

View previous topic View next topic Go down

Ramnit.gen Yardım ( Turkey )

Post by dexterjc1 on 23rd May 2014, 6:05 pm

Merhaba, oyun dosyası indirmiştim ve Sonra bu virüs bulaştı kurtulamadım ve Uzmanlarınız bakabilir mi acaba ? PC temizlenmiş mi hala var mı ?


dexterjc1
Beginner
Beginner

Posts Posts : 1
Joined Joined : 2014-05-23
OS OS : Windows starter
Points Points : 9313
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Ramnit.gen Yardım ( Turkey )

Post by Superdave on 23rd May 2014, 6:16 pm

Hello and welcome to GeekPolice.Net My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
*****************************************************************
|This is an english forum and I have some bad news.

If it's Ramnit.....

I'm afraid I have very bad news.

[You must be registered and logged in to see this link.] is a [You must be registered and logged in to see this link.] with [You must be registered and logged in to see this link.] functionality which infects .exe, and .HTML/HTM files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files. The infected .HTML or .HTM files may be detected as [You must be registered and logged in to see this link.] [You must be registered and logged in to see this link.] is a related [You must be registered and logged in to see this link.] often seen with this infection. It too has [You must be registered and logged in to see this link.] functionality which infects .exe, .dll and .HTML/HTM files and opens a back door that compromises your computer. This component is injected into the default web browser by [You must be registered and logged in to see this link.] which is dropped by a Ramnit infected executable file.

-- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.
[You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]
With this particular infection the safest solution and only sure way to remove it effectively is to [You must be registered and logged in to see this link.] and reinstall the OS.

Why? The malware injects code in legitimate files similar to the [You must be registered and logged in to see this link.] and in many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files often become corrupted and the system may become unstable or irreparable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of infection can vary.

Ramnit is commonly spread via a [You must be registered and logged in to see this link.] (usb, pen, thumb, jump) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, [You must be registered and logged in to see this link.] and [You must be registered and logged in to see this link.] sites. These type of sites are infested with a smörgåsbord of malware and are a major source of system infection.

In my opinion, Ramnit.A is not effectively disinfectable, so your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. Further, your machine has likely been compromised by the [You must be registered and logged in to see this link.] and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed.

Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, [You must be registered and logged in to see this link.] and reinstall the OS. Please read:
[You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system
[You must be registered and logged in to see this link.]
This is what Jesper M. Johansson at Microsoft TechNet has to say: [You must be registered and logged in to see this link.]

The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).

Important Note:: If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to to include those used for banking, email, eBay, paypal and any online activities which require a username and password. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Failure to notify your financial institution and local law enforcement can result in refusal to reimburse funds lost due to fraud or similar criminal activity.

Superdave
Captain
Captain

Posts Posts : 4202
Joined Joined : 2010-02-01
Gender Gender : Male
OS OS : Windows 8.1 and a dual-boot with XP Home SP3
Protection Protection : MSE, Windows Defender, Windows firewall
Points Points : 83211
# Likes # Likes : 0

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum