Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 5 April 2013

Remove Sirefef.gen!C and associated malware

Posted on 08:30 by Unknown
Sirefef.gen!C is a generic detection of the Sirefef rootkit which can steal passwords and other sensitive information. Imagine if there was someone who was watching every move you made on your computer. Someone who knew exactly which websites you were looking at, knew the content of all your files and documents and who had access to your passwords, user names and log in information. Sounds like something out of George Orwell’s famous novel 1984 where Big Brother was the all seeing eye that knew everything about everybody doesn’t it? But in actual fact it can be a reality for anyone who is unfortunate enough to have been hacked by someone using this rootkit.

So what is a rootkit? If you haven’t heard of this term before, it is certainly something to know a little more about so that you can protect yourself from one of the most serious computer crimes currently around. The clue to what a rootkit is and does is in the name: in the simplest terms this is a set – or a kit – of processor utilities and tools that enables someone to monitor and maintain the files and activity on your PC at its most root core. Sirefef.gen!C is even more sophisticated. It has various modules that can load popup ads on your computer and redirect your browser to malicious or spammy websites.

And the worse thing about a rootkit is that it is almost completely undetectable. I mean without using anti-rookit and anti-malware software. Sounds scary but in actuality a rootkit cannot be described simply as malware (i.e. malicious software) as it can be used for rather more innocent purposes as well as for hacking. For example an employer, concerned parents or a law enforcement agency could use a rootkit to monitor its workforce, children or suspected criminals. The ethics of this may be debated but where rootkits really garner attention is when they are used in illegal or suspect activity.

But first things first, how does the Sirefef.gen!C end up on your computer? Well, it can be installed by a virus or a Trojan – a piece of malicious software which has been disguised as a normal application. In this case, it's named TrojanDropper:Win32/Sirefef.gen!C. As its name suggests, this dropper Trojan installs Win32/Sirefef.gen!C virus on the affected machine. You may have clicked on a link in an email from an unknown sender or opened an infected file or email attachment; any of these could have been designed to install a rootkit on your PC or laptop.

So what can a hacker who has installed this rootkit on your computer do? Well, they pretty much have access to anything and everything that you have saved and can see everything that you do. Once a rootkit is installed on your computer the hacker will have access to all of your information and can use this to spread throughout your network collecting different passwords and user names to create new personas for him or herself. This is called creating a DoS – a Denial of Services and means that they can then target and attack other computers remotely via yours, without the target knowing their identity.

The hacker will enter your computer system using ‘back door entry’ which basically means that it’s undetectable. They will also alter and change the log files and administrator tools to further avoid detection, making it very difficult to know that someone other than you, or other authorized users has been in your system.

So how do you know if you have been hacked and someone has installed a rootkit on your computer’s system? Unfortunately it is not that easy to tell however if you’ve spotted some unusual activity such as popups and Chrome redirects, ports that you didn’t open suddenly appearing or other bizarre behavior then you may well have been hacked.

And although it is also equally difficult to avoid being the victim of a rootkit, there are steps that you can take to try and do your best to prevent it from happening. Make sure you have reputable antivirus and security software installed on your PC or laptop and make sure that the version and patches are always up to date. Remember never to click on any link or open an attachment in an email from a sender that you do not know or trust.

Finally, if you do suspect that you have had Sirefef.gen!C rootkit installed on your computer, I recommend following the removal instructions below. While it's a rather sophisticated malware it can be removed in a few minutes if you know the right tools and how to use them. I'm afraid manual removal is almost impossible unless you are a computer genius. So, don't waste your time and if you want to remove Sirefef.gen!C virus completely, follow the step in the removal guide below. Yes, it’s a pain, but at least you know that you know that you are not being monitored by someone with malicious intentions. And one ore thing, if one or more of your accounts have been hacked, change your passwords immediatily. Please read my post about strong passwords.

Written by Michael Kaur, http://deletemalware.blogspot.com



Sirefef.gen!C virus removal instructions:

1. Download and run TDSSKiller. Press the button Start scan for the utility to start scanning.



2. Wait for the scan and disinfection process to be over. Then click Continue. Please reboot your computer after the disinfection is over.



3. Download recommended anti-malware software (direct download) and run a full system scan to remove the remnants of this virus from your computer.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Rootkits | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • Remove RiskTool.Win32.BitCoinMiner (Uninstall Guide)
    RiskTool.Win32.BitCoinMiner is a risk tool or potentially unwanted application that may use your computer's resources to generate bitco...
  • Remove Rattlingsearchsystem.com (Uninstall Guide)
    Rattlingsearchsystem.com is a ZeroAccess/Sirefef rootkit-related browser hijacker that redirects users to shady websites while searching on...
  • Remove TR/ATRAPS.Gen2, removal instructions
    Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different...
  • Remove Ask Search and Ask Toolbar (Uninstall Guide)
    Ask Search and Ask Toolbar are very often incorrectly classified as virus/spyware that may cause search redirects. The majority of us pref...
  • How to remove 'TidyNetwork' adware virus from your computer
    As internet users most of us have seen those irritating little pop-up windows that are advertising something that we normally have little or...
  • Remove Windows Attention Utility (Uninstall Guide)
    Windows Attention Utility is a rogue security application that generates misleading warnings about nonexistent viruses and attempts to lure...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ▼  2013 (173)
    • ►  December (6)
    • ►  November (13)
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ►  June (31)
    • ►  May (25)
    • ▼  April (15)
      • Remove ad.adserverplus.com, removal instructions
      • Remove hotstartsearch.com, removal instructions
      • How to remove ib.adnxs.com, removal instructions
      • Remove Hola Search, removal instructions
      • Remove Portaldosites, removal instructions
      • Remove Ads by Browse to Save, removal instructions
      • Remove Win32.downloader.gen, removal instructions
      • Qvo6 Removal, How To Uninstall
      • XP Security Cleaner Pro Removal, How To Get Rid Of...
      • System Care Antivirus Removal, How To Uninstall
      • How to Remove Start Sweetpacks and Sweetpacks Toolbar
      • Remove Optimizer Pro (Uninstall Guide)
      • Remove Mixi Dj Claro Search – mixidj.claro-search....
      • Remove Sirefef.gen!C and associated malware
      • FBI Cybercrime Division Ransomware Virus Removal –...
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (11)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ►  2011 (239)
    • ►  December (8)
    • ►  November (18)
    • ►  October (21)
    • ►  September (24)
    • ►  August (28)
    • ►  July (32)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile