Solved

Network hit with sexy.exe, porn.exe, secret.exe, password.exe etc.

Posted on 2013-01-18
7
1,940 Views
Last Modified: 2013-01-21
Looks like our network got smashed with the above virus. They are worms it looks like.

we have sophos

When accessing our network drives on various servers it has changed the file structure and folders to .EXE's etc and files are being hidden.
how to stop this from spreading and how to clean this up
0
Comment
Question by:Lidka
  • 3
  • 2
  • 2
7 Comments
 
LVL 23

Accepted Solution

by:
Thomas Grassi earned 500 total points
ID: 38794372
0
 
LVL 13

Expert Comment

by:Gabriel Clifton
ID: 38794388
You can remove it with malwarebytes antimalware and combofix from bleepingcomputer.com. To help stop it from spreading while cleaning I would disconnect everything from the domain and start from the servers and work my way down.
0
 

Author Comment

by:Lidka
ID: 38794461
this is spreading fast how do I know where it originated
0
Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

 
LVL 13

Expert Comment

by:Gabriel Clifton
ID: 38794473
It would be hard to determine where it originated but you can use wireshark to filter packets being sent and try to go from there.
0
 

Author Comment

by:Lidka
ID: 38794862
what is the best tool to remove this virus ?
0
 
LVL 13

Expert Comment

by:Gabriel Clifton
ID: 38794886
Malwarebytes antimalware, spybot search & destroy, and combofix from bleeping computer are good.
0
 
LVL 23

Expert Comment

by:Thomas Grassi
ID: 38795451
I would use a more well known company would not use freeware or shareware prodcuts to protect your server.

I suggest Kaspersky

http://www.kaspersky.com/virus-removal-tools
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
How to record audio from input sources to your PC – connected devices, connected preamp to record vinyl discs, streaming media, that play through your audio card: Vista, Windows 7, Windows 8, Windows 8.1 and Windows 10 – both 32 bit & 64.
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question