Hello Couple of things to note. The file is signed by IGetNet, LLC using a Verisign cert. I suppose that signed applications are always trustworthy? I realize the obvious painful answer is that it was installed by clicking on a link on a web site, and allowing it to install HOWEVER - everyone I have heard from has NO recollection of doing such a thing. IMO This thing behaves like a sticky virus, it mysteriously gets installed on the machine, and seems to be difficult to remove. Chris Wagner kindly posted a link on this ng to removal instructions that seem to work, however one person telephoned me last night and indicated that the conditions persist even after following the instructions. I haven't heard anyone making the claim that the "browser upgrade" from IGetNet is useful, in fact everyone I have heard from is upset about it and from wants it permanently removed from their system as quickly as possible. It brings to my mind the term "viral marketing". In my opinion IGetNet wants to come into the picture, apparently through the back door, as a replacement for RealNames. I am not sure that enough, if any, people would actually buy keywords from them. After losing close to $1200 US when RealNames got its plug pulled, I wouldn't touch IGetNet with a ten foot pole. I have a hunch that this is coming in through a program that does unattended (or attended for that matter) automatic updates, or a program that routinely gets stuff off the Internet, like a music player. Additionally, I imagine any day now the phone will start ringing off the hook from our clients that have mysteriously contracted the virus and seek removal. My guess is that this is the tip of the iceberg - bigger better faster harder is certain to come. Best, Waitman Gobble EMK Design Buena Park, California +1.7145222528 On Tue, 2002-11-12 at 02:39, J. Foobar wrote: I have recently detected a few internal machines being solicited to download a file called "Internet.Explorer.Browser.Security.Upgrade.exe" I perform a parse of proxy logs looking for .exe downloads by users in my enterprise periodically (maybe 3 times a week) and I have just noticed this for the first time a few days ago in the 3-4 months I have been doing this. I have a close look at the traffic of the one internal dolt stupid enough to actually download the file. He was surfing animatedgif.com, which is pop-up and cookie hell, and was probably solicited to download this by the IP 216.40.225.62, which serves some sort of "Keyword Tracking" function and is an IP assigned to Everyones Internet, Inc (ev1.net, Texas). I wonder if they are related, at least conceptually. I have not yet had a chance to examine the end user's machine and I do not yet know if he was silly enough to actually run the .exe. Regards, Justin --- "Waitman C. Gobble" <waitmanat_private> wrote: > Hello > > I have found more information regarding my original > 030.com post. > > The machine that is infected is running Windows XP > Professional with all > service packs and hotfixes. > > Additionally, it is running Norton Antivirus 2003 > with the latest > database, and the machine checks clean. > > There is a file running on boot: > > C:\WINDOWS\WinStart.exe (the date of this file is > November 11, 2002) > > The file properties indicate that it originates from > IGetNet, LLC. The > whois information shows that this is the owner of > ignkeywords.com > > Also, this file exists: > C:\WINDOWS\prefetch\WINSTART.EXE-2C11637C.pf. > > It's date and time reflect the last time the machine > was booted. Please > note that I am not sure what this file is, but it > seems to relate. > > The machine now seems to go to ignkeywords.com, > however sometimes it > goes to 030.com, which is what we originally > observed. > > The WinStart file is labelled as a "Browser Upgrade" > in the file > properties thingy. > > Thanks and Best > > Waitman Gobble > EMK Design > Buena Park, California > +1.7145222528 > > > > ---------------------------------------------------------------------------- > This list is provided by the SecurityFocus ARIS > analyzer service. > For more information on this free incident handling, > management > and tracking system please see: > http://aris.securityfocus.com > __________________________________________________ Do you Yahoo!? U2 on LAUNCH - Exclusive greatest hits videos http://launch.yahoo.com/u2 ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Tue Nov 12 2002 - 12:52:30 PST