The Student Room Group

Malware keeps logging me off computer

Hi,

Tonight I recieved an email from a temporay email adress and they are claiming to have information about me knowing I have been torrenting from KAT even though they are down. If anyone knows how to help please help! Also they are threatening to release information about me snd if it helps they are Spanish.

Thanks

Scroll to see replies

have you run an up to date malware killer and a virus killer?
Reply 2
Original post by 999tigger
have you run an up to date malware killer and a virus killer?

No i cant as everytime I attempt to install spybot it comes up with Access is Denied then turns me off.

The thing that annoys me is that i had an email 1 min before saying see ya
Does it send you to a particular webpage? google it and add the word malware to the search to see the solution
Download malwarebytes
Reply 5
Original post by 999tigger
Does it send you to a particular webpage? google it and add the word malware to the search to see the solution


I have no webpage come up. I have attempted to trace their IP but they are spoofing by using a VPN
Reply 6
Original post by niteninja1
Download malwarebytes


I downloaded SpyBot which is pretty much the same thing and when I attempt to install it, it came up with Access is Denied then turned off thr computer
Try malewarebytes

If not download knoppix and burn to USB this is a live OS then it can hunt down the malware
Reply 8
Original post by niteninja1
Try malewarebytes

If not download knoppix and burn to USB this is a live OS then it can hunt down the malware

There is no need bothering replying to thid thread, the guy ran a scheduled task to delete the contents of C drive at boot deleting system volume information aling with all file in C drive meaning that the computer will not boot at all
What guy? The person in charge of the malware?
He has wiped your C drive?
Were there important docs on the drive? No back up?

You will still be able to access important docs with a file recovery utility.

You can access more geeks on kitguru, hexus.net or toms hardware forums.
(edited 7 years ago)
Reply 10
Original post by 999tigger
What guy? The person in charge of the malware?
He has wiped your C drive?
Were there important docs on the drive? No back up?

You will still be able to access important docs with a file recovery utility.

You can access more geeks on kitguru, hexus.net or toms hardware forums.

I am getting someone else to do it. I will have to re-image then computer and put the hard drivr into an Apple Mac as Windows viruses do not carry over you Mac OS to hopefully recover my documents if they can be recovered at all!
Original post by Leggyyy
I am getting someone else to do it. I will have to re-image then computer and put the hard drivr into an Apple Mac as Windows viruses do not carry over you Mac OS to hopefully recover my documents if they can be recovered at all!


No idea. Not the way I would do it, but its unsuitable to try and sort the issue out over the forum. Its all a bit unclear. Doubt you will have lost any data.
Reply 12
Original post by 999tigger
No idea. Not the way I would do it, but its unsuitable to try and sort the issue out over the forum. Its all a bit unclear. Doubt you will have lost any data.


Okay well thank you for your help but i'm judt sad it was all just too little too late :frown:
Original post by Leggyyy
Okay well thank you for your help but i'm judt sad it was all just too little too late :frown:


It doubt he has wiped your drive properly, so am confident you should be able to recover your documents. You might just have to reinstall everything.

Anyone that knows enough about pcs might be able to get it working via a boot disc/ usb.

First sep is to identify what malware iit was. You wont have been the only person hit, so the solution is likely online.
Knoppix allows you to retrieve documents and the viruses can't follow.
Reply 15
I have fixed the problem for the OP. We re-imaged it with a custom Windows 7 image. He found out he had a backup of his files taken previously to which we were able to copy back. We found out that it was a scheduled task that was configured to wipe the drive had been created along with a few other malicious actions. The OP is now subject to a full security checkup + strategic analysis to prevent it happening again.

The OP and I are grateful for all other posts.
(edited 7 years ago)
Original post by Cycosmon
I have fixed the problem for the OP. We re-imaged it with a custom Windows 7 image. He found out he had a backup of his files taken previously to which we were able to copy back. We found out that it was a scheduled task that was configured to wipe the drive had been created along with a few other malicious actions. The OP is now subject to a full security checkup + strategic analysis to prevent it happening again.

The OP and I are grateful for all other posts.


Thanks for the update and how fortunate for them to have a friend who could assist. Its very hard to do over the internet and I still wasnt getting a clear picture of what happened or where it came from. I suspect the OP has a good idea how they acquired it.

Did they have a full virus and anti malware in place?
Did you identify what the malware was?

GJ for sorting them out. Glad it was resolved.
Reply 17
Original post by 999tigger
Thanks for the update and how fortunate for them to have a friend who could assist. Its very hard to do over the internet and I still wasnt getting a clear picture of what happened or where it came from. I suspect the OP has a good idea how they acquired it.

Did they have a full virus and anti malware in place?
Did you identify what the malware was?

GJ for sorting them out. Glad it was resolved.


Hi,
The OP obtained some files off a Torrent site (I have already discussed the ethics with him regarding this, and has now promised to stop) and believes they obtained "something" from there. It may well have been a SAAS application, as he doesn't recall having his computer "taken over" at any point i.e. when he was using it as that would allow scheduled tasks to be created remotely through a command line.

The computer was, when I received it completely unbootable and wasn't able to boot into any recovery options or even get it to recognize any system volume information for the OS. I think a script must of landed on his drive at some point, basically wiping the drive as much as his Admin permissions permit. If your aware of Security permissions within Windows, some folders/files can't be deleted as they are owned by "TrustedInstaller".

Sadly using some syntax' within command prompt is enough to wipe the drive enough that it can become un-bootable without removing the files.

The OP is running Sophos Endpoint Security and Control, full enterprise grade Anti-Virus as I have a license for it. We PXE booted the machine into my deployment server at home and it was re-imaged in about 25 minutes.

There wasn't any anti-malware installed as the free version of Malwarebytes doesn't have on-access scanning. I may write a script to start the application to do this and create a scheduled task if I can figure out the switches for it. That's a task, although I don't suppose I'd be licensed to distribute it as it circumvents one of the features of Premium?

Thanks again,

Tom
Original post by Leggyyy
Hi,

Tonight I recieved an email from a temporay email adress and they are claiming to have information about me knowing I have been torrenting from KAT even though they are down. If anyone knows how to help please help! Also they are threatening to release information about me snd if it helps they are Spanish.

Thanks


Not relevant but your username is my cat's name
Original post by Cycosmon
Hi,
The OP obtained some files off a Torrent site (I have already discussed the ethics with him regarding this, and has now promised to stop) and believes they obtained "something" from there. It may well have been a SAAS application, as he doesn't recall having his computer "taken over" at any point i.e. when he was using it as that would allow scheduled tasks to be created remotely through a command line.

The computer was, when I received it completely unbootable and wasn't able to boot into any recovery options or even get it to recognize any system volume information for the OS. I think a script must of landed on his drive at some point, basically wiping the drive as much as his Admin permissions permit. If your aware of Security permissions within Windows, some folders/files can't be deleted as they are owned by "TrustedInstaller".

Sadly using some syntax' within command prompt is enough to wipe the drive enough that it can become un-bootable without removing the files.

The OP is running Sophos Endpoint Security and Control, full enterprise grade Anti-Virus as I have a license for it. We PXE booted the machine into my deployment server at home and it was re-imaged in about 25 minutes.

There wasn't any anti-malware installed as the free version of Malwarebytes doesn't have on-access scanning. I may write a script to start the application to do this and create a scheduled task if I can figure out the switches for it. That's a task, although I don't suppose I'd be licensed to distribute it as it circumvents one of the features of Premium?

Thanks again,

Tom


Thanks for the detailed explanation. You know far more than I do. Hope hes buying you a few pints.

Quick Reply

Latest

Trending

Trending