How do I get rid of Zango?

S

seaweed1317

This is driving me crazy. I have run Norton, Spysweeper, Microsoft Defender
& AdAware & they all say I am clean. Yet this doggone thing comes up every
time I turn around & a bunch of other web pages ie www.screensavers.com. I
don't even have to be "surfing" for this crap to pop up. I have done a
search & nothing. I am thinking maybe I have to reformat???????????
 
M

Malke

seaweed1317 said:
This is driving me crazy. I have run Norton, Spysweeper, Microsoft
Defender & AdAware & they all say I am clean. Yet this doggone thing
comes up every time I turn around & a bunch of other web pages ie
www.screensavers.com. I don't even have to be "surfing" for this crap
to pop up. I have done a search & nothing. I am thinking maybe I have
to reformat???????????

You aren't clean. Go through these malware removal steps systematically,
doing all the preparatory work first:

http://www.elephantboycomputers.com/page2.html#Removing_Malware

I know you've done some work, but I don't know if you did preparatory
work and/or if you scanned in Safe Mode. If you are systematic, you
should be able to remove Zango.

When all else fails, read the information about using HijackThis at the
link above and post to one of the specialty forums listed there (not
here, please).

Malke
 
D

David H. Lipman

From: "seaweed1317" <[email protected]>

| This is driving me crazy. I have run Norton, Spysweeper, Microsoft Defender
| & AdAware & they all say I am clean. Yet this doggone thing comes up every
| time I turn around & a bunch of other web pages ie www.screensavers.com. I
| don't even have to be "surfing" for this crap to pop up. I have done a
| search & nothing. I am thinking maybe I have to reformat???????????
|



If you are using any version of Sun Java that is prior to JRE Version 5.0,
then you are strongly urged to remove any/all versions that are prior to JRE
Version 5.0. There are vulnerabilities in them and they are actively being exploited.
It is possible that is how you got infected with malware.

Therefore, it is highly suggested that if there are any prior versions of Sun Java
to Version 5 on the PC that they be removed and Sun Java JRE Version 5.0 Update 6
be installed ASAP.

Simple check, look under...
C:\Program Files\Java

The only folder under that folder should be the latest version...

C:\Program Files\Java\jre1.5.0_06


http://www.java.com/en/download/manual.jsp



For non-viral malware...

Please download, install and update the following software...

* Ad-aware SE v1.06
http://www.lavasoft.de/
http://www.lavasoftusa.com/
http://www.lavasoft.de/ms/index.htm

* SpyBot Search and Destroy v1.4
http://security.kolla.de/
http://www.safer-networking.org/microsoft.en.html

* SuperAntiSpyware
http://www.superantispyware.com/superantispywarefreevspro.html

After the software is updated, I suggest scanning the system in Safe Mode.

I also suggest downloading, installing and updating BHODemon for any Browser Helper Objects
that may be on the PC.

* BHODemon

http://www.majorgeeks.com/downloadget.php?id=3550&file=11&evp=245a87539eea8ed6904332b4b8b8442d

For viral malware...

* Download MULTI_AV.EXE from the URL --
http://www.ik-cs.com/programs/virtools/Multi_AV.exe

To use this utility, perform the following...
Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS }
Choose; Unzip
Choose; Close

Execute; C:\AV-CLS\StartMenu.BAT
{ or Double-click on 'Start Menu' in C:\AV-CLS }

NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your
FireWall to allow it to download the needed AV vendor related files.

C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS}
This will bring up the initial menu of choices and should be executed in Normal Mode.
This way all the components can be downloaded from each AV vendor's web site.
The choices are; Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC.

You can choose to go to each menu item and just download the needed files or you can
download the files and perform a scan in Normal Mode. Once you have downloaded the files
needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key
during boot] and re-run the menu again and choose which scanner you want to run in Safe
Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode.

When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help
file. http://www.ik-cs.com/multi-av.htm

Additional Instructions:
http://pcdid.com/Multi_AV.htm


* * * Please report back your results * * *
 
G

Guest

I have a question. Is there any way of making jre1.5.0_06
more secure? Within the last two weeks, I was infected twice, and most of
the exploits were in the c:\documents and settings\"username"\applicaton
data\sun\java\deployment\cache\v1.0\jar.

David H. Lipman said:
From: "seaweed1317" <[email protected]>

| This is driving me crazy. I have run Norton, Spysweeper, Microsoft Defender
| & AdAware & they all say I am clean. Yet this doggone thing comes up every
| time I turn around & a bunch of other web pages ie www.screensavers.com. I
| don't even have to be "surfing" for this crap to pop up. I have done a
| search & nothing. I am thinking maybe I have to reformat???????????
|



If you are using any version of Sun Java that is prior to JRE Version 5.0,
then you are strongly urged to remove any/all versions that are prior to JRE
Version 5.0. There are vulnerabilities in them and they are actively being exploited.
It is possible that is how you got infected with malware.

Therefore, it is highly suggested that if there are any prior versions of Sun Java
to Version 5 on the PC that they be removed and Sun Java JRE Version 5.0 Update 6
be installed ASAP.

Simple check, look under...
C:\Program Files\Java

The only folder under that folder should be the latest version...

C:\Program Files\Java\jre1.5.0_06


http://www.java.com/en/download/manual.jsp



For non-viral malware...

Please download, install and update the following software...

* Ad-aware SE v1.06
http://www.lavasoft.de/
http://www.lavasoftusa.com/
http://www.lavasoft.de/ms/index.htm

* SpyBot Search and Destroy v1.4
http://security.kolla.de/
http://www.safer-networking.org/microsoft.en.html

* SuperAntiSpyware
http://www.superantispyware.com/superantispywarefreevspro.html

After the software is updated, I suggest scanning the system in Safe Mode.

I also suggest downloading, installing and updating BHODemon for any Browser Helper Objects
that may be on the PC.

* BHODemon

http://www.majorgeeks.com/downloadget.php?id=3550&file=11&evp=245a87539eea8ed6904332b4b8b8442d

For viral malware...

* Download MULTI_AV.EXE from the URL --
http://www.ik-cs.com/programs/virtools/Multi_AV.exe

To use this utility, perform the following...
Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS }
Choose; Unzip
Choose; Close

Execute; C:\AV-CLS\StartMenu.BAT
{ or Double-click on 'Start Menu' in C:\AV-CLS }

NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your
FireWall to allow it to download the needed AV vendor related files.

C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS}
This will bring up the initial menu of choices and should be executed in Normal Mode.
This way all the components can be downloaded from each AV vendor's web site.
The choices are; Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC.

You can choose to go to each menu item and just download the needed files or you can
download the files and perform a scan in Normal Mode. Once you have downloaded the files
needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key
during boot] and re-run the menu again and choose which scanner you want to run in Safe
Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode.

When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help
file. http://www.ik-cs.com/multi-av.htm

Additional Instructions:
http://pcdid.com/Multi_AV.htm


* * * Please report back your results * * *
 
D

David H. Lipman

From: "Enzo" <[email protected]>

| I have a question. Is there any way of making jre1.5.0_06
| more secure? Within the last two weeks, I was infected twice, and most of
| the exploits were in the c:\documents and settings\"username"\applicaton
| data\sun\java\deployment\cache\v1.0\jar.
|

That's just it. They are either Trojans or Exploits in JavaScript. They come in .CLASS
files or .CLASS files stored in Java Jars (ZIP type files).

Besides using AV software and not cacheing data, I'm not sure there is more to do. Albeit,
you can choose to not do Java at all.
 
G

Guest

Besides using AV software and not cacheing data, I'm not sure there is more
to do.


Thanks David,
Avg is always active, although it doesn't always catch everything.
By not cacheing data, do you mean within the java itself. There is a setting
in Java's control panel where you can set 0 bytes for the cacheing of java
temporary files.
 
D

David H. Lipman

From: "Enzo" <[email protected]>

| Besides using AV software and not cacheing data, I'm not sure there is more
| to do.
|
| Thanks David,
| Avg is always active, although it doesn't always catch everything.
| By not cacheing data, do you mean within the java itself. There is a setting
| in Java's control panel where you can set 0 bytes for the cacheing of java
| temporary files.
|


Yes, that's right.
 
C

cquirke (MVP Windows shell/user)

On Sat, 6 May 2006 10:26:01 -0700, Enzo
I have a question. Is there any way of making jre1.5.0_06
more secure? Within the last two weeks, I was infected twice, and most of
the exploits were in the c:\documents and settings\"username"\applicaton
data\sun\java\deployment\cache\v1.0\jar.

First, ensure that 1.5.006 is the onlt JRE installed - unlike MS
patching, Sun are too dumb to remove old JREs when installing new
ones, and the old ones can remain an exploitable risk.

Not all malware infects through Java, though it is a favorite tactic
for some. Other methods of (re-)entry include:
- File and Print Sharing that exposes C:\ and the startup axis
- hidden admin shares, as above (XP Pro + weak but non-black pwd)
- direct connection to 'net without NAT routing
- exploiting OS network surfaces, e.g. ye olde RPC, LSASS, etc.
- exploiting HTML rendering engine, including email "message text"
- Instant Messaging and emaul attackments
- fake graphics that exploit JPEG and WMF handlers
- exploits against Acrobat Reader, WinAmp, WinZip etc.
- dropped defences from previous malware attacks
- malware pushed through an existing malware presence
- malware pulled by an existing malware presence
- self-reinfection via System Restore
- self-reinfection through internal exploit surface
- cross-infection over your LAN, WiFi or Bluetooth
- persistence of infection; think rootkits, ADS, etc.



---------- ----- ---- --- -- - - - -
Don't pay malware vendors - boycott Sony
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top