@merlin02131 BleepingComputer has their own tools and methods to help people, even if they have done nothing against the malware yet, there are no prerequisites when asking for help.
My Computer
System One
-
- OS
- Windows 10 Pro
Chip on anything that has a "brain" --> HDD, MB, GPU, Soundcard, Modem, Router...anything really...even your fridge, if it is internet connected.
Cannot agree more ! losing faith in verizon fast ! Wanted to set up the new router in bridge mode but FIOS squashed that as the CR1000 goes into bridge mode then tries to pick up an ip address that comes from another device hence killing the internet connection ( that ip address belongs to another device ) and somehow they have no fix for it forcing me back into regular mode. So on my network, i will trace out the router while the pc is off the network being re imaged via dvd disk looking for rogue devices ..! Was out there at bleeping computers this am and will go back when i have time after work - Thx !This, 100% - if the infection is not on the local machine but on another machine that this local machine will access at some point - the infection has survived the clean install - and will survive every clean install until it is removed from every other device / neutered so it cannot propagate.
I realize this was not the scope of the original question asked by Hayden, but it clearly needs to be emphasized and discussed more thoroughly.
So true as I have found out ! Thx John !And adding to the above - file stores, backups and the like need to be scanned. Today's malware is not simple "Print hello world 100000 times on the screen' type scripts that SKs were writing 30 years ago. They are very sophisticated, and if you're worried enough about your machine as it is to get infected enough that you actually scan and maintain with AM products, you should be just as worried about your backups.
For example, a lot of ransomware are savvy enough to infect backups so you cannot use them to get rid of them in the first place. Even if you keep your backup drives disconnected, or on another physically separate machine, when you do connect it's easy enough for them to see the presence of a new drive and start infecting.
Well, frankly, that's an inconsequential difference.Transferable and trasmittable are not quite the same thing, though. And infections is the catchall for all types of malware....
For example, a lot of ransomware are savvy enough to infect backups so you cannot use them to get rid of them in the first place. Even if you keep your backup drives disconnected, or on another physically separate machine, when you do connect it's easy enough for them to see the presence of a new drive and start infecting.
True but you can only do so much to fight these things. Firmware malware is even scarier.You have to know when you get infected. If it is there for a couple of days, lying in wait, before executing the actual encryption and starting the ransom process, then what?
You connect to make a backup at some point. And as long as your AM program / suite says you're clean, you think you're OK. But if it is a recent release that has not been found in the wild (and thus definitions have not been developed for it), then what?
Well, we have to agree to disagree, then.
An infection that does not spread is not really an infection, it is a defect that exists in only one computer.
An infection by its very definition spreads from one computer to another, by whatever means.
Vice versa, there is only so much the attacker can do. For firmware malware, the hurdle is even higher. The vast majority of computer users never heard of firmware malware and never got one.True but you can only do so much to fight these things. Firmware malware is even scarier.
Vice versa, there is only so much the attacker can do. For firmware malware, the hurdle is even higher. The vast majority of computer users never heard of firmware malware and never got one.
Safe computing is the same for firmware or other malware. You don't wear a tin foil hat to ward off lightning strikes.
That's stating the obvious.Safe computing is the same for firmware or other malware
You don't wear a tin foil hat to ward off lightning strikes
That's stating the obvious.Safe computing is the same for firmware or other malware
You lost me.You don't wear a tin foil hat to ward off lightning strikes