Solved

can't see networked computers after getting win32/rbot-ir worm

Posted on 2006-06-11
3
186 Views
Last Modified: 2013-12-04
Hi,

recently got infected with win32/rbot-ir worm on 2 servers and couple of pcs and seems that now on infected servers when going to my network can't see any other pcs on network and can't map to the servers from pcs or other servers.  Is this from this particular worm or does this seem like symptom of another type of worm?  Is it affecting tcpip or some network or domain component?  When you browse for the infected servers from other pcs and you hit plus sign on the server name to open up the shares, it doesn't open up anything.  Also ran a cleaner utility from sophos which is enterprise antivirus we use and it came up with no worm but i did it remotely so maybe has to be done locally within network.  Also, our isp alerted us about the worm and shut down internet access by putting filter on our t1 line.  Is this common practice by isps coz once they shut down internet access, how would we update ides for existing pcs and how would we use internet to remedy and troubleshoot the worm?  
0
Comment
Question by:eservando
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 32

Accepted Solution

by:
r-k earned 500 total points
ID: 16882923
Download this from another PC which still has Internet access and run it on the one with network problems. See if it helps:

  http://www.spychecker.com/program/winsockxpfix.html

While you're at it, also download and save the following, and use it if the problem persists:

 http://www.cexx.org/lspfix.htm

Re. the ISP blocking your network access, I guess some will and some won't, there isn't a fixed protocol. You will want to temporarily disconnect your still infected PC's (if any) and then request the ISP to turn your access back on.

If you want to be sure that the worm is really gone or disabled, then do the following:

Download and run HijackThis from http://www.hijackthis.de/
Copy-and-paste the resulting log back to that same web site (not here)
Click on "Analyze", and then click on "Save Analysis" at the bottom of the next page.
Finally post a link here to the saved analyzed page.

Good luck.

0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question