Have virus I can't get rid of and I need HELP!

T

tom contino

I have recently got a JS.exception.exploit virus that I
can not completely clean. This virus bypasses all the
current security updates available and resets your
explorer setting and downloads a bunch of malicious
software on your computer. I know that IE6.0 SP1 is
suppose to fix these type of attacks but this one slams
your computer with ease. I was able to remedy most of the
problems except for one. If i enter a URL into the
address area of IE and the URL can not be found when the
not found status is returned to the browser I get
redirected to the following web
site "search.xrenoder.com" and then all hell breaks
loose. ANYONE READING THIS DO NOT GO TO THIS URL!!!! IT
BYPASSES ALL THE LATEST SECURITY UPDATES!!! All of my
registry settings for my browser are fine so I can not
determine why when search is invoked I am getting
redirected to this malicious web site. Something is
trapping on the standard search
URL "http://www.microsoft.com/isapi/redir.dll?
prd=ie&ar=iesearch" and redirecting my computers
browsers. If I type this URL into the address bar in IE
or Netscape on my XP Pro platform the redirection occurs
immediately in either browser.

If anyone knows how to resolve this I would appreciate
your help. If anyone knows how to alert the people at
Microsoft about this I will gladly take care of that as
well.

Thanks!

Tom
 
T

Tom Contino

The first web site did find some remnants of what I had
removed it still did not fix the problem. I noted that
the virus had changed my "hosts" file but removing the
improper information and restarting the computer still
did not correct the problem. Even powered off for awhile.

This ones a bugger!

Tom
 
N

Nina

-----Original Message-----
I have recently got a JS.exception.exploit virus that I
can not completely clean. This virus bypasses all the
current security updates available and resets your
explorer setting and downloads a bunch of malicious
software on your computer. I know that IE6.0 SP1 is
suppose to fix these type of attacks but this one slams
your computer with ease. I was able to remedy most of the
problems except for one. If i enter a URL into the
address area of IE and the URL can not be found when the
not found status is returned to the browser I get
redirected to the following web
site "search.xrenoder.com" and then all hell breaks
loose. ANYONE READING THIS DO NOT GO TO THIS URL!!!! IT
BYPASSES ALL THE LATEST SECURITY UPDATES!!! All of my
registry settings for my browser are fine so I can not
determine why when search is invoked I am getting
redirected to this malicious web site. Something is
trapping on the standard search
URL "http://www.microsoft.com/isapi/redir.dll?
prd=ie&ar=iesearch" and redirecting my computers
browsers. If I type this URL into the address bar in IE
or Netscape on my XP Pro platform the redirection occurs
immediately in either browser.

If anyone knows how to resolve this I would appreciate
your help. If anyone knows how to alert the people at
Microsoft about this I will gladly take care of that as
well.

Thanks!

Tom
.
JS.Exception.Exploit

Discovered on: August 16, 2001
Last Updated on: May 16, 2003 08:41:46 AM



JS.Exception.Exploit is a detection for an exploit that
allows Java applets to perform various actions on your
system if you are using an older or unpatched version of
Microsoft Internet Explorer.

In many cases, JS.Exception.Exploit may perform simple
actions such as changing your Internet Explorer home page.
(This is one of the most common uses of this exploit.) It
has been reported, but not confirmed, that some adware
programs use JS.Exception.Exploit to do this. As a result,
your Symantec antivirus program may detect
JS.Exception.Exploit when the adware program displays a
pop-up ad that uses the exploit.

IMPORTANT:
If your Symantec antivirus program alerts you to
JS.Exception.Exploit, this means that it has stopped the
exploit and prevented it from running. It does not mean
that your computer is "infected" with this threat. Rather,
it means that the antivirus program has stopped it.
Because the exploit is usually not on your computer, in
most cases you will not be able to "delete" it, since
there is nothing to delete.

To be sure that your computer is free of currently-known
threats, we suggest that you run LiveUpdate and then run a
full system scan.

If you continue to receive alerts when pop-up ads are
displayed, you need to determine what adware you have
installed on your computer, then disable or remove it. You
may need to contact your computer vendor for assistance in
identifying and disabling advertising software. You can
also obtain and run programs that are designed to detect
and remove adware.



Type: Trojan Horse




Systems Affected: Windows 95, Windows 98, Windows
NT, Windows 2000, Windows XP, Windows Me
Systems Not Affected: Windows 3.x, Macintosh, OS/2,
UNIX, Linux
CVE References: CVE-2000-1061



# Virus Definitions (Intelligent Updater) *


August 20, 2001
# Virus Definitions (LiveUpdateT) **


August 20, 2001

*


Intelligent Updater definitions are released daily, but
require manual download and installation.
Click here to download manually.

**


LiveUpdate virus definitions are usually released every
Wednesday.
Click here for instructions on using LiveUpdate.

Wild:

* Number of infections: More than 1000
* Number of sites: More than 10
* Geographical distribution: High
* Threat containment: Easy
* Removal: Easy



Threat Metrics



Wild:
High


Damage:
Low


Distribution:
Low



The structure of the code is specific and involves the
illegal use of the <Applet> tag. The exploit was published
in at least one security forum. More information about
this vulnerability is available at Microsoft's Technet
site:

http://www.microsoft.com/technet/treeview/default.asp?
url=/TechNet/security/bulletin/ms00-075.asp

Although JS.Exception.Exploit may perform simple actions,
such as changing your Internet Explorer home page, it can
also be programmed to perform actions such as a mass
mailing, as in the case of VBS.Loding.A@mm, or to create
file on your computer that performs almost any malicious
action.

Detections of JS.Exception.Exploit when visiting a Web site
When you visit a JS.Exception.Exploit Web site, the
exploit is detected by Symantec antivirus products,
usually in a temporary Internet file. The antivirus
program then reports that it cannot repair, quarantine, or
even delete the file. This may happen more than once until
you close the Web site. If you then run a scan, it may
find no instances of JS.Exception.Exploit .

The reason for this is that your Symantec antivirus
program is detecting the exploit itself. Your Symantec
antivirus program detects it when scanned by Auto-Protect
as it is copied to the Temporary Internet Files folder.
Because these temporary files may be deleted as soon as
you close the Web page, the exploit will not be found
during a regular scan because it is no longer there. Also,
because it is the exploit itself that is being detected,
it will be detected even if you are using a patched system
or another Web browser.

NOTE: Because Temporary Internet Files are not always
deleted after you close a Web site, (this depends on you
Web browser's settings), we suggest that you close all Web
browser windows before running a full system scan. This
prevents the Temporary Internet Files from being "in use"
by Windows in the event that one is found to be infected
when running the scan.

Microsoft patch
Microsoft has released a patch that removes the security
vulnerability. You can download the patch from the
following Microsoft site:

http://www.microsoft.com/technet/treeview/default.asp?
url=/TechNet/security/bulletin/ms00-081.asp

What is an exploit, and what can JS.Exception.Exploit do?
An exploit is code that takes advantage of a security hole
in a program or the operating system. You can think of it
as a key to a locked door. If the door is open, almost
anything can come in. JS.Exception.Exploit can by
programmed to do almost anything on an unpatched system,
such as:

* Copy and run a virus, worm, or Trojan
* Create and run a file that sends information to a
hacker
* Change your Internet Explorer home page (This is the
most common use of JS.Exception.Exploit.)




Symantec Security Response encourages all users and
administrators to adhere to the following basic
security "best practices":

* Turn off and remove unneeded services. By default,
many operating systems install auxiliary services that are
not critical, such as an FTP server, telnet, and a Web
server. These services are avenues of attack. If they are
removed, blended threats have less avenues of attack and
you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network
services, disable, or block access to, those services
until a patch is applied.
* Always keep your patch levels up-to-date, especially
on computers that host public services and are accessible
through the firewall, such as HTTP, FTP, mail, and DNS
services.
* Enforce a password policy. Complex passwords make it
difficult to crack password files on compromised
computers. This helps to prevent or limit damage when a
computer is compromised.
* Configure your email server to block or remove email
that contains file attachments that are commonly used to
spread viruses, such as .vbs, .bat, .exe, .pif and .scr
files.
* Isolate infected computers quickly to prevent
further compromising your organization. Perform a forensic
analysis and restore the computers using trusted media.
* Train employees not to open attachments unless they
are expecting them. Also, do not execute software that is
downloaded from the Internet unless it has been scanned
for viruses. Simply visiting a compromised Web site can
cause infection if certain browser vulnerabilities are not
patched.



The following instructions pertain to all current and
recent Symantec antivirus products, including the Symantec
AntiVirus and Norton AntiVirus product lines.

1. Update the virus definitions.
2. Run a full system scan and delete all the files
detected as JS.Exception.Exploit.
3. Delete the value that was added to the registry.

For specific details on each of these steps, read the
following instructions.

IMPORTANT NOTES. PLEASE READ BEFORE YOU CONTINUE:

* These are general removal instructions for the most
commonly distributed variant of JS.Exception.Exploit. If
JS.Exception.Exploit has run on an unpatched system that
did not have current virus definitions, other registry
values or keys may have been changed or added and files
may have been copied to your system. These instructions
will reverse the most common changes. If you need
assistance, please obtain the services of a qualified
virus removal or computer consultant.
* Several cases have been reported in which
JS.Exception.Exploit was received in a compressed file.
(This has not been confirmed by Symantec Security
Response.) In general, while Symantec antivirus products
will detect an infected file that is contained within a
compressed file, by design it cannot extract or remove it.
If you receive an alert for this or any threat on a
compressed file (such as a .zip file) we recommend that
you simply delete the compressed file using Windows
Explorer.
* Removal is only necessary if you detect this threat
after it has actually run and made changes to your system.
(You can confirm this by disconnecting from the Web and
then running a full system scan. If nothing is found
during a full system scan, your computer is not infected.

1. Update the virus definitions.
2. Run a full system scan, and delete all files that
are detected as JS.Exception.Exploit.
3. In the registry key

HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Main

examine the text in the Data column for these values:

Start Page
Search Page
Default_Page_URL
Default_Search_URL
4. If any refer to a suspicious address (for example,
http:/ /jethomepage.com), clear the value data.

For details on how to do this, read the following
instructions.

1. Updating the virus definitions
Symantec Security Response fully tests all the virus
definitions for quality assurance before they are posted
to our servers. There are two ways to obtain the most
recent virus definitions:

o Running LiveUpdate, which is the easiest way
to obtain virus definitions. These virus definitions are
posted to the LiveUpdate servers once each week (usually
on Wednesdays), unless there is a major virus outbreak. To
determine whether definitions for this threat are
available by LiveUpdate, refer to the Virus Definitions
(LiveUpdate).
o Downloading the definitions using the
Intelligent Updater. The Intelligent Updater virus
definitions are posted on U.S. business days (Monday
through Friday). You should download the definitions from
the Symantec Security Response Web site and manually
install them. To determine whether definitions for this
threat are available by the Intelligent Updater, refer to
the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are
available. Read "How to update virus definition files
using the Intelligent Updater" for detailed instructions.


2. Scanning for and deleting the infected files

1. Start your Symantec antivirus program and make
sure that it is configured to scan all the files.
o For Norton AntiVirus consumer products:
Read the document "How to configure Norton AntiVirus to
scan all files."
o For Symantec AntiVirus Enterprise
products: Read the document "How to verify that a Symantec
Corporate antivirus product is set to scan All Files."
2. Run a full system scan.
3. If any files are detected as infected with
JS.Exception.Exploit , click Delete.


3. Deleting the value from the registry

CAUTION: Symantec strongly recommends that you back up the
registry before you make any changes to it. Incorrect
changes to the registry can result in permanent data loss
or corrupted files. Modify the specified keys only. Read
the document, "How to make a backup of the Windows
registry," for instructions.

1. Click Start, and then click Run. (The Run dialog box
appears.)
2. Type regedit

Then click OK. (The Registry Editor opens.)
3. Navigate to the key:

HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Main
4. In the right pane look for the following values:

Start Page
Search Page
Default_Page_URL
Default_Search_URL
5. For each one that you find, double-click the value.
The Edit String dialog box appears.
6. If the text in the Value data box points to a
suspicious Web page, such as the http:/ /jethomepage.com
value that appears in this graphic:



then delete all of the text in the Value data box,
as shown here:


7. Click OK. (It is not necessary to enter anything in
the box.)
8. After you have done this for all of the values
mentioned in step 4, click Registry, and click Exit.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top