this post was submitted on 22 Jul 2023
89 points (96.8% liked)
Technology
59311 readers
6308 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Running a virus scan wouldn't be enough? I'd rather not factory reset everything.
To be fair, factory resets are a huge pain in the ass. Might as well try other things before busting out the nuclear option.
Once you suspect a device is infected the only good option is the nuclear option. Anything else will not be guaranteed to 100% remove it, or really, anywhere near close to that, or even detect everything wrong in the first place or after attempted removal. And with a month long period between attacks that is a long time to wait and see to see if any other option might work.
Absolutely. Use an efficient disk imager that can take incremental snapshots and you can keep backups for months or years without needing a ton of storage.
True, but I would confirm a device is compromised before nuking the OS, not just do it willy-nilly because maybe it could be. A better way to phrase what OP is asking is: what are some ways to troubleshoot this without making a ton of potentially unnecessary work for myself?
...to which I would say, run a
netstat
on any systems that you can, check those IP's against WHOIS and/or traceroute. Anything that traces to Eastern Europe, Russia, China, most of SEA is a red flag. Dig a little deeper with Wireshark or Glasswire to inspect some actual packets for suspicious content. I think there's a network logger that can trace the process using a given connection, but the name eludes me).Find your smoking gun, then torch the OS.
Less of a pain in the ass than using a compromised device and having your payment card info stolen repeatedly?
If it ends up not being the culprit, kinda yeah. I'm just saying, try some less disruptive troubleshooting first.
Honestly you do have a point.
A virus scan can only scan for something it knows. If you have something new or esoteric on your device, the scanner may not pick it up.
If you’re not using a reputable antivirus, also consider that the database is wildly out of date at best, or the “antivirus” is malicious on its own.
Are you trying to fix the issue or have this repeat? Start listening to the genuine advice being offered
No, it won't. If you value that situation enough to post here, you should also listen to the advices you're given.
If you have an antivirus running and you're still being pwnd, a scan won't change anything.
Format everything, computers, phones, everything with an Internet connection really. Yes, it's a pain, but also yes, it's necessary.
Do it
No, those can be bypassed. If your kernel is what's infected, then it's probably not going to find anything either.
Scanners are useful, but what they can look for is limited.
It's not like virus scanning is useless, but it varies depending on which scanning seevice you're using, and none of them are foolproof. The fact that you're still getting compromised suggests that your scanner(s) might be missing something.