Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 
Kookoo

869 posts

Ultimate Geek
+1 received by user: 407

Trusted

  #3297559 15-Oct-2024 11:28
Send private message

Done. A minor hiccup with graphics drivers and Lenovo BIOS update, but so far - so good.





Hello, Ground!



networkn
Networkn
32863 posts

Uber Geek
+1 received by user: 15453

ID Verified
Trusted
Lifetime subscriber

  #3297584 15-Oct-2024 12:44
Send private message

You did the right thing. You have reduced your risk of a more serious problem down the track. Well Done. 

 

 


ANglEAUT
altered-ego
2436 posts

Uber Geek
+1 received by user: 842

Trusted
Lifetime subscriber

  #3297668 15-Oct-2024 15:48
Send private message

Kookoo: Done. ...

 

Did you use the Microsoft Media Creation Tool or the Lenovo image creator?





Please keep this GZ community vibrant by contributing in a constructive & respectful manner.




Kookoo

869 posts

Ultimate Geek
+1 received by user: 407

Trusted

  #3297903 15-Oct-2024 20:17
Send private message

ANglEAUT:

 

Kookoo: Done. ...

 

Did you use the Microsoft Media Creation Tool or the Lenovo image creator?

 

 

Lenovo USB Recovery. It's been a while since I had any use for large USB sticks, so I ended up popping down to the warehouse get a 32GB one. Then it was mostly smooth sailing.





Hello, Ground!

ANglEAUT
altered-ego
2436 posts

Uber Geek
+1 received by user: 842

Trusted
Lifetime subscriber

  #3297922 15-Oct-2024 22:37
Send private message

networkn:

 

The problem you have, is if this crypto miner is there, you don't know what else is there. I'd assume that machine was compromised and I'd install from fresh (Wipe not reinstall OS over the top) ...

 

 

Emphasis mine, because of Perfectl Malware. Don't focus on the OS, focus on the ideas & concepts of the malware.

 

Excerpt:
=====

 

Perfctl further cloaks itself using a host of other tricks. One is that it installs many of its components as rootkits, a special class of malware that hides its presence from the operating system and administrative tools. Other stealth mechanisms include:

 

  • Stopping activities that are easy to detect when a new user logs in
  • Using a Unix socket over TOR for external communications
  • Deleting its installation binary after execution and running as a background service thereafter
  • Manipulating the Linux process pcap_loop through a technique known as hooking to prevent admin tools from recording the malicious traffic
  • Suppressing mesg errors to avoid any visible warnings during execution.

...

Besides using the machine resources to mine cryptocurrency, Perfctl also turns the machine into a profit-making proxy that paying customers use to relay their Internet traffic. Aqua Security researchers have also observed the malware serving as a backdoor to install other families of malware.
=====

 

and much more at the link.





Please keep this GZ community vibrant by contributing in a constructive & respectful manner.


1 | 2 
Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.