email hack attacks, nothing found

Discussion in 'Malware Help (A Specialist Will Reply)' started by ginahoy, Mar 9, 2014.

  1. ginahoy

    ginahoy Private E-2

    My wife manages her aol email addy via Outlook Express client app installed on her computer. About a week ago I received one of those single line spam emails from her, promoting some website, with "Hi, there" or similar in the subject field. In addition, she received messages from several friends alerting her that her system was inflected. I grabbed the latest definition file and ran MBAM. It found nothing.

    A dozen or so delivery failure notices had arrived in her inbox... attempts to send messages to invalid email addresses in her outdated OE Address Book. So it's obvious the hacker has access to her address book.

    I inspected the detailed header for the email I received. It does not appear to be a spoof, but appears to have been sent via aol webmail. This means the hacker must also have hacked her aol password (unless the bad guys have figured out a way to spoof the sever hand-offs shown in the header).

    AOL locked her email account in response to suspicious activity, thus prompting a p/w change. She changed the p/w but two days later, another attack occurred with exact same MO. That means the process must still be alive on her computer, and able to hack stored p/w in OE.

    This time, I had her change her password on my computer and told her NOT to store it in OE client on her PC. Five days have passed with no more attacks.

    She can avoid further problems by using webmail or a different email client, but I gotta find and get rid of that virus!!

    In addition to running MBAM, I checked running processes and services and found nothing unusual. Beyond that, I'm pretty much at the limit of my diagnostic ability.

    So, I registered here and read carefully and followed the scanning / reporting instructions. Attached are log files. Nothing was found.

    THANKS FOR MAKING THIS GREAT SERVICE POSSIBLE!
     

    Attached Files:

    Last edited: Mar 9, 2014
  2. ginahoy

    ginahoy Private E-2

    In case they prove useful, here are the message headers for the messages I received. The originating servers are in Asia (no surprise) but the messages appear to have been sent via legitimate AOL webmail servers, which would require the password.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    IP addresses/URL's can always be spoofed.

    There are no obvious real malware problems showing. Potentially the Master Boot Record ( MBR ) is infected which is sometimes the case when email issues like this occur. Your MBR shows as unknown but that does not necessarily mean it is infected.

    You larger problems are the below:
    1. Totally out of date an unsecure version of Windows is running. Why haven't you update to Win XP SP3 and all other Windows updates. Windows XP SP2 is a major security risk and add to it the below
    2. Many other programs like Java are not updated!
    3. You have NO protection software installed!
    4. You are using MSconfig to control startup process and have a variety of things trapped in there now that are not even installed anymore. Read this to better understand why not to use MSconfig: Dealing with Startup Process
    You need to undate Windows immediately. In a couple more weeks you will no longer be able to do so since it will stop being supported. Also you need to update other software on this PC and remove old versions. Like Java for example. All of the below need to be uninstall.

    IBM 32-bit Runtime Environment for Java 2, v1.4.1J2SE Runtime Environment 5.0 Update 6
    Java 7 Update 25
    Java Auto Updater
    Java(TM) 6 Update 22
    Java(TM) 6 Update 5

    Now install the current version of Sun Java from:

    Also uninstall Adobe Reader 7.1.0 and install the current version.
     
  4. ginahoy

    ginahoy Private E-2

    I opted not to install SP3 due to some compatibility horror stories I read about when first introduced. In any case, I avoid OS upgrades until forced to do so. My own system still runs SP2. But with Windows XP support ending next month, I suppose I should go ahead and install SP3. Thanks for the reminder.

    I refuse to run background protection s/w or a s/w firewall. Too many negative side effects and maintenance effort. Instead, I scan both systems every few months. I rarely find anything, which I attribute that to common sense browsing and email management, and using FF instead of IE (although I'm not sure that's still the factor it once was). I uninstalled Avira on my wife's system yesterday prior to running scans for this thread, and intend to replace with AVG (was already on my to-do list).

    Indeed I was remiss in not cleaning up old JAVA and maintaining the latest version on my wife's computer. She relies on me to keep her system up to date. I just took care of that. Thanks.

    I have used HijackThis over the years to remove certain unwanted processes, BHO's, etc., and use MSConfig as well as Services from Admin Tools to disable unnecessary services. For example, I only have about 17 background processes running after boot-up on my own PC, which helps with performance. I will be interested to read your page on MSConfig, as my methods are rather haphazard. On the other hand, I'm obsessive with making regular drive image backups. I'm hesitant to revert to a backup image in this case unless I can find the culprit.

    To the point of this thread, I'm curious about your comment regarding spoofing. I was under the impression that a trained eye can always tell if parts of a msg header are spoofed. I forwarded headers to an internet security expert I happen to know in the UK and he said the routing information in the header is legit. The fact that no attacks have occurred since the 2nd p/w change six days ago is consistent with this. On the other hand, if another attack were to occur now that p/w is no longer stored in OE, I would have to question my friend's assertion re: legitimacy of routing info in the msg headers I provided.

    In any case, the fact that my wife's address book was accessed suggests there must be an infection, although I suppose it's possible the process deleted itself.

    Regarding MBR, what would cause it to show as 'unknown'? Is there another tool I could use for this?

    Again, thanks for all of your advice.
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Bad idea and not too secure especially if you use your PC for anything requiring security ( online banking, online purchase, trying to keep emails private...etc ). Scanners miss tons of problems including rootkits and MBR infections which are known information stealers.

    Per our every day observations in this forum, IE is less of a problem than Firefox.

    Perhaps but I don't think this is reliable unless you are capturing at the ethernet/IP packet level and decoding the contents there. Look at the email info headers is already much later in the chain and could have already been modified to make it look valid.

    Not likely that the infection if any deleted itself. More likely there was no infection and you just had your passwords stolen somehow. Possibly do to using public wifi to log into email accounts, using library, hotel, or other public and unsecure networks. Or even using a friends PC to login to your email accounts. A friends PC could be infected.

    It is quite common that PC vendors use modified MBRs that are not the standard Windows MBR. And many of these are not rceognized by tools used to read the MBR. Thus it is reported as unknown. Sometimes this could mean there is an infection. More frequently, it is just unknown. Repairing the MBR to create a true Windows MBR would make it recognized but it could also make your PC unbootable if the MBR the vendor put there is really necessary for the PC to be fully functional. And even if the PC is still bootable, it could cause any special factory image restore parititions to now be unusable.
     
  6. ginahoy

    ginahoy Private E-2

    Which is exactly why I'm interested in scanning her MBR. See last comment below.

    According to my consultant, once the spammer sends the email, they can't affect routing headers that are automatically added as the message makes its way to the recipient's server. He said the spoofed routing declarations will always precede the real ones, meaning further down the string. The match-up of each subsequent IP's in the routing path would necessarily be broken if an entry is spoofed. That was not the case here, which is why he believes the hacker actually used AOL webmail, thus must have had her p/w. Recall when she changed her p/w after first attack, a second attack occurred the following day. How could that be explained if there's no script installed?

    Aside from the fact that the hacker captured her second p/w right away, my wife has never, ever accessed her email other than from home on her own computer. She doesn't even know how, and she doesn't have a smart phone.

    But even if my consultant is wrong about the limitations of msg header spoofing and hacker doesn't have her p/w and was able to spoof the AOL webmail routing, he definitely has her complete address book. She rarely sends emails, and never to more than one person. Moreover, I noticed some of the delivery failure notices were for msgs sent to invalid domains that obviously came from her address book. For example, I made a couple of typos when I manually entered email addys for some family member, (e.g, hotnail.com).

    Is there a way a hacker can copy an address book without installing a script on the PC?

    Thanks for the explanation. She has an IBM ThinkPad. No doubt ThinkPads have custom MBR. I will post in a ThinkPad forum I belong to see if anyone there knows of a MBR scanner that will work.

    BTW, I upgraded both computers to SP3. It took 3 passes to get everything that applied. Thanks again for the discussion!
     
  7. ginahoy

    ginahoy Private E-2

    As I was posting a question in the ThinkPad forum regarding MBR, I remembered that I had used EASEUS Partition Master to create another partition. Would this explain the "unknown" MBR result? And if so, would removing the partition allow your tools to properly scan the MBR?
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I believe there is a misunderstanding here. I never stated that what we had you run did not check your MBR. The tools we ran did check it. RogueKiller simply reported an unknown MBR. And as I stated earlier, this does not mean it is infected. It just means that it is not a recognized standard MBR. I also stated this was likely because of your PC manufacturer putting in their own special MBR which is not a standard Windows MBR. Again this in no way means it is a problem. It just means the information in it is not standard. If it was truly infected, it would have shown up in one of the logs as a problem.

    In addition to RogueKiller, the logs from MGtools simply show that you have multiple partitions:
    Code:
      Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
      ----------  ---  -----------  -----  ----------  -------  ---------  --------
      Volume 0     D                       DVD-ROM         0 B                     
      Volume 1     C   Local Disk   NTFS   Partition     46 GB  Healthy    System  
      Volume 2     E   Backup       NTFS   Partition     24 GB  Healthy            
     
    Disk 0 is now the selected disk.
      Partition ###  Type              Size     Offset
      -------------  ----------------  -------  -------
      Partition 1    Primary             46 GB    32 KB
      Partition 2    Extended            24 GB    46 GB
      Partition 3    Logical             24 GB    46 GB
      Partition 4    OEM               4474 MB    70 GB
     
    Get Partition Info From WMI in K-bytes                          
    ==============================================================  
    Bootable  Name                   Size         Type                     
    TRUE      Disk #0, Partition #0  49189077504  Installable File System  
              Disk #0, Partition #1  4691312640   Unknown                  
              Disk #0, Partition #2  26142842880  Extended Partition       
    
    There are no problems showing. For example there are no hidden partitions. The 4 GB partition is likely a factory restore partition.

    I cannot explain how your email password was stolen a second time if you have not been using other PCs to connect to the email but if someone did at one time have access to the AOL login then they probably have all the contact info already.


    Possibly but I don't think just modifiying the partition would make it appear as unknown. That is more due to what I stated above and previously. Removing the partition probably would not change anything.


    There were no real significant issues in your logs. I have know idea whether you had any in the past before coming here though. Your logs only showed some Babylon junkware which you can remove by deleting the below folder:

    C:\Documents and Settings\ADM\Application Data\Babylon

    Also it would be a good idea to run the below tool.



    Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Also as stated earlier, you need to update your software. The below are all security risks and need to be uninstalled and then replaced with current versions.
    Adobe Reader 7.1.0
    IBM 32-bit Runtime Environment for Java 2, v1.4.1
    J2SE Runtime Environment 5.0 Update 6
    Java 7 Update 25
    Java(TM) 6 Update 22
    Java(TM) 6 Update 5

    See this >> https://www.java.com/en/download/faq/remove_olderversions.xml
     
    Last edited: Mar 14, 2014
  9. ginahoy

    ginahoy Private E-2

    I read too much into your comment. I understood 'unknown' just meant the tools couldn't say yes or no for the boot sectors for that partition.

    She doesn't use AOL webmail and thus never populated the online address book. Her addresses were only stored in OE, and as I said, she never sent emails to multiple recipients, thus ruling out involvement of a 3rd party. In fact, most of her address book entries were automatically captured by OE from professional newsletters and the like (I failed to turn off that option). Some of the delivery failure notices proved without a doubt that the perpetrator had access to her address book.

    After posting my previous comment I went ahead and removed the 4GB partition and resized E: to recover that space. I re-ran RogueKiller (attached) and was surprised it still lists the BSP partition with the 'MBR Code unknown' annotation. The partition tagged as COMPAQ (partition 1 on original RK report) is gone. That means the partition I created with Partition Master (logical drive E: ) is the one that RK flags as unknown MBR code.

    If the drive is truly not infected, the only logical explanation I can think of is that a script grabbed her address book and is no longer present, AND my consultant is incorrect about routing entries in the msg header not being spoofed. The fact that no further attacks have occurred since she changed her p/w suggest otherwise, but that's only circumstantial.

    I really do appreciate your engagement. At this point, I'm declaring victory and moving on (even though the engineer in me demands a logical explanation ;)
     

    Attached Files:

    Last edited: Mar 14, 2014
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Okay then here is the most logical explanation from one engineer to another and it is based on the info you supplied and what I collected in your logs.

    Your PC was extremely out of date with Windows Updates and also for many other software applications. Out of date software can be an extreme security risk and can allow open back doors into your PC that hackers can make use of. It is possible that some access to your PC was gained via this method and possibly various information was collected.

    I do also see a packet capture program ( WinPcap ) installed which could be used for this. WinPcap is a legit program and it is used by other legit programs including games.. But it could also be used by hackers. Did you knowingly install this or do you know if it is has legit use on your PC by another application? If not then you should uninstall it.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. After doing the above, you should work thru the below link:
     
    Last edited: Mar 15, 2014
  11. ginahoy

    ginahoy Private E-2

    No gaming here, but based on folder date, WinPcap was installed by aTube Catcher, a video stream capture utility I installed in 2010. I only used it a couple of times to capture youtube videos my wife wanted to save on her HDD. I went ahead and uninstalled both programs.

    I hear what you're saying about out-of-date software (although I did install SP3 and all subsequent security updates a few days ago). This is a deliberate strategy, a calculated risk if you will, to avoid all the time/hassle incumbent with constantly changing software, and to avoid the resource overhead.

    I see the PC as simply a tool and as long as it accomplishes what I need it to do, I prefer to leave 'well enough' alone as much as possible. For example, I didn't upgrade to XP until '08 when I was unable to log into my bank account. I refuse to install Adobe products on my PC (bloatware), although I maintain a legacy version of Acrobat Reader on my wife's PC to print state tax forms, as they won't work with the PDF reader I use. Heck, I still routinely use legacy DOS software to manage my finances.

    Over the years my unorthodox strategy has paid off in spades as I can count on less than one hand the issues I've had with viruses or other malware in more than a decade. Go figure. But in all previous instances I was able to identify the culprit and quickly recover.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds