PSA: Cryptomining is a thing. Also something ironic.
Could have been something lurking about on the laptop since before you recovered it.
Might have even played a part in the decision to discard it in the first place. There's some really cunning shit out there. Good luck isolating and containing it. RKill is an option, if you can start Windows in safe mode. [19:36]#Mirror_stacking_clown: try smoke ganja every day for 10 years and do memory game
|
|
" It's hosed, period. Once it's compromised, image nothing. Dump the drive, preferably deleted with a hole drilled through it and then set on fire... and then download the preferred OS and install it on a fresh drive. (For Windows, use the attached registration and call them if it doesn't like it. Explain the problem and it's usually not a hassle to get it authenticated.) |
|
" doeesn't make a difference. Only If the chipset of the hdd is compromised. but thats not really possible as the controller of most cheap hdds is not programmable. Only serverlevel hdds have programable disc controllers. A wiped Hdd is the same as a new hdd outside of that (you can zerofill it if you're not sure) the problem is, most of the time with this level of attack the the chipset on the motherboard is compromised. there only a new eprom would work (or flashing the old one and hoping the attackprogram doesn't trick the flash process :) ). Current Build: Penance Brand
God build?! https://pobb.in/bO32dZtLjji5 |
|
" I am boring... I basically do next-to-nothing online these days. I visit a handful of sites and that's about it. I install well-known software from the source and attempt to make sure it's vetted properly. I block most scripts, don't go near Flash, and purposefully avoid places that bait netizens. And, other than that, I'm the most boring dude on the 'net in terms of surfing habits and stuffs I do. If someone is flashing my bios or issuing chipset updates while I'm looking at dog memes... The only solution is to unplug and go get some sunlight or something. BTW, Micro$oft recently released an update that addresses some curious CPU usage issues associated with its Search features. I guess they mean some sort of indexing issue they have of some sort. (Or, something forgot how to send M$oft all the user-data possible for any Search, EVAR, or something.) Why in the F do they keep screwing around with indexing services because they sure as $@$% don't care about "User Experience." |
|
" Hmm yes, the filesystem indexing. That shit is broken since it's inception back in xp i think? long time ago. Instead of investing in a better/more performant filesystem they try to improve the search/indexing... aw well, this has btw nothing to do with internet searching if you don't use MS internet explorer(and who exactly would do that xD) I think think you can even disable them, per harddisk... Current Build: Penance Brand
God build?! https://pobb.in/bO32dZtLjji5 |
|
" Yeah, you can disable it, restrict it, yada yada. It's been a PITA for a long time, yet M$oft insists on trying to use it for everything. "Hey, user! I heard you wanted to speed up your system while slowing it down, so I decided to index your system so you could speed up indexing while slowing everything else down! <If you liked this addition, please consider donating to our [Microsoft Office] page!>" So, M$oft's "Emergency Patch" got squeezed out yesterday. There's a patch there for something called "Internet Explorer." And, get this... It has to be applied "manually." Manually. As in some poor Internet Explorer user has to go out and actually manually download the update pack and then... click on it and "make it happen." For "Internet Explorer" and the people that use it... This is not a doable thing. They use Internet Explorer and M$oft expects them to manually patch it? How are they going to do that through AOL? |
|
" back in my days we had to climb a snowy mountain of redmond with a packet 5 1/2" floppy discs and no shoes to get a patch from the patchman in his cellar office. So don't whine around! Current Build: Penance Brand
God build?! https://pobb.in/bO32dZtLjji5 |
|
" Ah, the beloved 5.25. I still have my notch-cutter around, somewhere... And, the sound! clank, fwip, click ... tick tick tick tick tick tick...GRAAANK GRAAANK GRAAANK...tick tick tick... GRAANK GRAAANK GRAAANK...tick tick tick...GRAANK GRAAANK GRAAANK... tick tick tick tick tick... <Please Insert Disk 2> clank, swhoop, click ... tick tick tick tick tick... GRAAANK GRAAANK GRAAANK..... But, on an OT-Related Note: Something has to be done about the current situation with not only commercial advertising support for websites deteriorating due to script-blocking and privacy tools, but the use of such routes of attack by malware developers using advertising systems as a method of distributing malware. We've all likely experienced it at least once, depending upon how long one has been interacting online. Since Teh Intrawebz started, I've had approximately four javascript-related attacks. Not too shabby considering that has been over decades. Most likely it's because I'm boring as ____. But, users are very motivated to use script-blocking software and plug-ins for this very reason - It can dramatically cut down on one's risk factor and prevent script-based attacks through distributed advertising on otherwise legitimate and safe websites. Script-blocking software gained popularity for just this reason. It wasn't only intrusive advertising and popup-hell, but the real danger of getting malware installed on one's deveice/computer simply because one viewed one's favorite website of cat pictures... But, this means that websites that rely on funding through commercial advertising are not getting the revenue they once did. And, while there is certainly the importance of privacy included, even mandated in certain countries, the fact is that many general security tools people use frequently even prevent other means of non-intrusive saleable data that could be used by some websites. The whole point of this being: Should or could websites use cryptomining as a method of revenue generation as long as it is not overly intrusive and does not violate the visitor's privacy rights or present a security risk? Yes, I know - Anything that can access the resources necessary to cryptomine through a browser will, by definition, expose the user to certain risks. That's why it's important to think about this and plan accordingly rather than "just let it happen" and then try to fix all the screwups... A highly secure, third-party validated and maintained, system of commercial cryptomining for legitimately safe/mainstream websites and with the informed consent of their users "could" actually reduce certain risks inherent in current advertising models and might even allow for better support for independent websites. Opinions, anyone? Can we ever get away from sketchy marketers pushing advertising riddled with malware-inducing scripts? |
|
" It's funny)))) |
|