F5F Stay Refreshed Hardware Desktop RootkitA has compromised my computer.

RootkitA has compromised my computer.

RootkitA has compromised my computer.

F
FireWolf1316
Junior Member
37
03-03-2016, 01:19 PM
#1
Your machine had a Rootkit infection and cleaning efforts were hindered by BIOS flashing limitations. The issue stemmed from EZ Flash only supporting FAT32, requiring NTFS for the OS, which meant installing the operating system first. Once that was done, you could proceed with flashing the BIOS. Your computer was resolved, but you're concerned about residual threats or future infections. Thank you for reaching out.
F
FireWolf1316
03-03-2016, 01:19 PM #1

Your machine had a Rootkit infection and cleaning efforts were hindered by BIOS flashing limitations. The issue stemmed from EZ Flash only supporting FAT32, requiring NTFS for the OS, which meant installing the operating system first. Once that was done, you could proceed with flashing the BIOS. Your computer was resolved, but you're concerned about residual threats or future infections. Thank you for reaching out.

E
ethandizzy
Member
169
03-03-2016, 01:39 PM
#2
It may become infected once more if you install another virus. It seems you likely didn’t need to reprogram the BIOS; simply reinstalling Windows usually resolves it. However, clearing all data from every device should eliminate the threat.
E
ethandizzy
03-03-2016, 01:39 PM #2

It may become infected once more if you install another virus. It seems you likely didn’t need to reprogram the BIOS; simply reinstalling Windows usually resolves it. However, clearing all data from every device should eliminate the threat.

F
falcon11112
Junior Member
15
03-05-2016, 01:26 AM
#3
I didn't go all the way to the right to see this.
F
falcon11112
03-05-2016, 01:26 AM #3

I didn't go all the way to the right to see this.

S
Sheep_VeNoM
Member
112
03-05-2016, 08:58 AM
#4
Rootkit still lingers after I reinstalled Windows, I had to flash the BIOS and the virus disappeared, but I’m concerned about getting infected again.
S
Sheep_VeNoM
03-05-2016, 08:58 AM #4

Rootkit still lingers after I reinstalled Windows, I had to flash the BIOS and the virus disappeared, but I’m concerned about getting infected again.

A
atom_razor
Member
139
03-09-2016, 11:47 AM
#5
You could easily grab a few inexpensive flash drives at the shop. They’re likely set up with FAT32 by default. Updating your BIOS isn’t required just to remove an infection. Simply wiping the drive and creating a fresh partition table should suffice.
A
atom_razor
03-09-2016, 11:47 AM #5

You could easily grab a few inexpensive flash drives at the shop. They’re likely set up with FAT32 by default. Updating your BIOS isn’t required just to remove an infection. Simply wiping the drive and creating a fresh partition table should suffice.

_
_SmilesKillMe
Member
144
03-18-2016, 04:54 AM
#6
It would only cause reinfection if you install the same rootkit or if it spread to another device on your network. Since you don’t have another PC, you’re likely safe. Stay cautious online and avoid getting infected again.
_
_SmilesKillMe
03-18-2016, 04:54 AM #6

It would only cause reinfection if you install the same rootkit or if it spread to another device on your network. Since you don’t have another PC, you’re likely safe. Stay cautious online and avoid getting infected again.

C
CamoPixelz
Member
55
03-25-2016, 07:40 PM
#7
I understand you're trying to explain that your BIOS might still have a rootkit before you reformat the drives, and that this old BIOS rootkit could potentially re-infect your HDD.
C
CamoPixelz
03-25-2016, 07:40 PM #7

I understand you're trying to explain that your BIOS might still have a rootkit before you reformat the drives, and that this old BIOS rootkit could potentially re-infect your HDD.

D
Dingdongyou
Member
220
03-27-2016, 11:22 AM
#8
Avoid installing new hard drives on the motherboard if you already have a root kit installed. The infection may spread this way. Isolate the current drive, wipe it, and then reformat the BIOS using a BIOS flasher tool.
D
Dingdongyou
03-27-2016, 11:22 AM #8

Avoid installing new hard drives on the motherboard if you already have a root kit installed. The infection may spread this way. Isolate the current drive, wipe it, and then reformat the BIOS using a BIOS flasher tool.

E
Ellabobella513
Junior Member
14
03-27-2016, 05:26 PM
#9
It’s highly improbable you’re dealing with a rootkit, especially one embedded in your motherboard firmware. Do you have evidence showing which files were added to your system? Here are some ideas: Try Mozilla Firefox for privacy and ad-blocking, and add the NoScript browser extension. When set to "untrusted," it blocks scripts from running on untrusted sites. Most sites require their main scripts to load, so you’d need to enable every site in noscript as you open them. I do this—and it’s straightforward. A simpler alternative is Privacy Badger, created by eff.org. It won’t stop all malicious scripts, which is why I prefer NoScript. Another effective method is browsing through a virtual machine. It may seem complicated, but it’s actually quite simple. Visit the Windows software store and install Ubuntu (which means “harmony”). This downloads an operating system that runs in a separate virtual environment, isolated from your main system. Even in this sandbox, Ubuntu remains much safer than Windows—only about 40 known viruses exist, all requiring your password to access. Because it’s a Linux system, it powers everything from network devices to the space station and Voyager probes. The top 500 supercomputers use Linux, as do the Internet’s core components. If you ever suspect malware, you can safely browse without risking your main machine.
E
Ellabobella513
03-27-2016, 05:26 PM #9

It’s highly improbable you’re dealing with a rootkit, especially one embedded in your motherboard firmware. Do you have evidence showing which files were added to your system? Here are some ideas: Try Mozilla Firefox for privacy and ad-blocking, and add the NoScript browser extension. When set to "untrusted," it blocks scripts from running on untrusted sites. Most sites require their main scripts to load, so you’d need to enable every site in noscript as you open them. I do this—and it’s straightforward. A simpler alternative is Privacy Badger, created by eff.org. It won’t stop all malicious scripts, which is why I prefer NoScript. Another effective method is browsing through a virtual machine. It may seem complicated, but it’s actually quite simple. Visit the Windows software store and install Ubuntu (which means “harmony”). This downloads an operating system that runs in a separate virtual environment, isolated from your main system. Even in this sandbox, Ubuntu remains much safer than Windows—only about 40 known viruses exist, all requiring your password to access. Because it’s a Linux system, it powers everything from network devices to the space station and Voyager probes. The top 500 supercomputers use Linux, as do the Internet’s core components. If you ever suspect malware, you can safely browse without risking your main machine.

_
_juhuaxia12
Member
61
03-28-2016, 08:19 PM
#10
Do you own a phone? If so, you can connect it using a USB adapter to update its BIOS on a USB drive. Alternatively, if your device has an SD card slot, you can transfer files onto the SD card and then attach it to the USB for use with your PC. I went through this myself because my BIOS couldn't recognize my CPU and RAM.
_
_juhuaxia12
03-28-2016, 08:19 PM #10

Do you own a phone? If so, you can connect it using a USB adapter to update its BIOS on a USB drive. Alternatively, if your device has an SD card slot, you can transfer files onto the SD card and then attach it to the USB for use with your PC. I went through this myself because my BIOS couldn't recognize my CPU and RAM.