How does a virus get past anti-virus software

G

Guest

I have a win 2000 server with xp pro and win98 clients on a TCP/IP network.
We have CA's eTrust loaded on the server and workstations and the server
update its signature files every night, if their is one, and updates the
clients when they log into the network.

This works pretty good, but I have found on my server some files that were
infected with the win32/Mytob.57470 worm. I did clean them out and deleted
them but I am curious how they got through in the first place. eTrust has
caught several of them, one this morning, and cured and quarantined the file
immediately.

So, I guess my basic question is how do infected files get into your system
if you have anti-virus software running?

Thank you.
 
G

Guest

OK, I figured that one out. I was curious if their is any other way for it
to happen.

Thanks.
 
D

Dan Seur

There are a number of other ways. Some are spookier than others, and
most are unlikely as long as nobody else uses your machine, assuming
your malware sniffer is well built, well maintained, and updated every day.
 
D

David H. Lipman

From: "Zach" <[email protected]>

| I have a win 2000 server with xp pro and win98 clients on a TCP/IP network.
| We have CA's eTrust loaded on the server and workstations and the server
| update its signature files every night, if their is one, and updates the
| clients when they log into the network.
|
| This works pretty good, but I have found on my server some files that were
| infected with the win32/Mytob.57470 worm. I did clean them out and deleted
| them but I am curious how they got through in the first place. eTrust has
| caught several of them, one this morning, and cured and quarantined the file
| immediately.
|
| So, I guess my basic question is how do infected files get into your system
| if you have anti-virus software running?
|
| Thank you.
|


There are anti virus News Groups specifically for this type of discussion.

microsoft.public.security.virus
alt.comp.virus
alt.comp.anti-virus


As Bob I indicated the chances are most likely that it was on the PC prior to signatures
being installed.

Is the CA eTrust on the server a Server version of the software or is it a workstation
version of AV software ?

Now one must realize that this infector is usually sent via email so one must note where the
file(s) that were infected were found and the security ramifications of the infector. That
is the fully qualified name and patgh of the infected files.

Is the Server being used as a email client ?

Is it an email server ?

Have you properly patched the Server ?
The worm also spreads via the LSASS Buffer Overflow exploit via TCP port 445.
KB835732 -- http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

The worm also spreads via the RPC/RPCSS DCOM Buffer Overflow exploit via TCP port 135.
KB828741 -- http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx

The MyTob worm basically combines W32/Mydoom@MM functionality with W32/Sdbot.worm
functionalities.

If you were infected, the MyTob has the ability to shutdown anti malware/FireWall
applications so it can make a platform more vulnerable.

That fact that it was found on a server is NOT good at all ! It means the Information
Assurrance (IA) Level of the server is severely low and was too easily compramised. You
really need to scan the platform with Harris Stat or Digital eEye Retina or other scanner to
check to see how vulnerable and/or secure your server really is. You also need to look at
who accesses the server and what those administrators are doing on that server that may have
caused the system to be compramised.

This infection can BNOT be taken lightly !

I suggest you scan the server with alternate AV scanners . The following tool contains AV
scanners from; Mcafee, Sophos, Trend Micro and Kaspersky.


Download MULTI_AV.EXE from the URL --
http://www.ik-cs.com/programs/virtools/Multi_AV.exe

It is a self-extracting ZIP file that contains the Kixtart Script Interpreter {
http://kixtart.org Kixtart is CareWare } 4 batch files, 6 Kixtart scripts, one Link
(.LNK) file, a PDF instruction file and two utilities; UNZIP.EXE and WGET.EXE. It will
simplify the process of using; Sophos, Trend, Kasperski and McAfee Anti Virus Command Line
Scanners to
remove viruses, Trojans and various other malware.

C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS}
This will bring up the initial menu of choices and should be executed in Normal Mode. This
way all the components can be downloaded from each AV vendor’s web site. The choices are;
Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC.

You can choose to go to each menu item and just download the needed files or you can
download the files and perform a scan in Normal Mode. Once you have downloaded the files
needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key
during boot] and re-run the menu again and choose which scanner you want to run in Safe
Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode.

When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help
file.

To use this utility, perform the following...
Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS }
Choose; Unzip
Choose; Close

Execute; C:\AV-CLS\StartMenu.BAT
{ or Double-click on 'Start Menu' in C:\AV-CLS }

NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your
FireWall to allow it to download the needed AV vendor related files.

* * * Please report back your results * * *
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top