{"id":2094,"date":"2010-01-25T17:16:40","date_gmt":"2010-01-26T00:16:40","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2094"},"modified":"2018-01-30T12:36:48","modified_gmt":"2018-01-30T19:36:48","slug":"rogue-av-payload-blocks-popular-websites","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/01\/25\/rogue-av-payload-blocks-popular-websites\/","title":{"rendered":"Rogue AV Payload Blocks Popular Websites"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2004.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/01\/25\/rogue-av-payload-blocks-popular-websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2014.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;title=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2024.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;title=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2034.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;title=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2044.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;title=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2054.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;Title=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2064.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2074.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2084.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;t=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2094.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F01%2F25%2Frogue-av-payload-blocks-popular-websites&amp;h=Rogue%20AV%20Payload%20Blocks%20Popular%20Websites\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2104.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2114.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_warning2.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2101\" title=\"20100125-annoyed_warning2_crop_60pct\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_warning2_crop_60pct.jpg\" width=\"314\" height=\"172\" \/><\/a>A payload file installed along with some variants of the rogue <strong>Internet Security 2010<\/strong> &#8220;antivirus&#8221; program modifies victims&#8217; networking settings within Windows, inserting itself into the network stack and preventing victims from visiting some of the Web&#8217;s most popular Web sites. More than 40\u00a0sites have been targeted, including: Microsoft&#8217;s <strong>live.com<\/strong> and <strong>Bing <\/strong>search engine; social networking giants <strong>Facebook<\/strong>, <strong>Twitter<\/strong>, <strong>MySpace<\/strong>, <strong>Bebo<\/strong>, <strong>LinkedIn<\/strong>, and <strong>YouTube<\/strong>; news organizations including <strong>Fox News, The New York Times, the Washington Post<\/strong>, and the UK&#8217;s <strong>Guardian<\/strong> and <strong>BBC <\/strong>news sites; and blogs hosted by <strong>blogger.com, livejournal.com<\/strong>, and <strong>wordpress.com<\/strong>.<\/p>\n<p>The payload modifies the Layered Service Provider (<strong>LSP<\/strong>) so that calls to those Web sites pass through the malicious file, which displays a warning message in the browser instead of the blocked Web site. The message says:<\/p>\n<blockquote><p><strong>This web site is restricted based on your security preferences<\/strong><\/p><\/blockquote>\n<p>and<\/p>\n<blockquote><p><strong>Your system is infected. Please activate your antivirus software.<\/strong><\/p><\/blockquote>\n<p>We&#8217;ve seen an increase in the number of spies that bollix the LSP chain lately. In cases where this happens, if you simply remove the malicious file that is referenced in the LSP, the computer remains unable to connect to the Internet afterwards. To fully repair the PC, you&#8217;ll need to <a href=\"http:\/\/www.malwarebytes.org\/forums\/index.php?showtopic=5357\" target=\"_blank\">fix that broken chain<\/a>.<\/p>\n<p>Fortunately, the fix for this spy &#8212; which we&#8217;re calling <strong>Trojan-Annoyinator<\/strong> &#8212; is fairly easy. Users of Webroot&#8217;s products can simply sweep, and the spy along with its LSP modifications will be removed upon reboot. If you don&#8217;t have one of Webroot&#8217;s antimalware product installed, you can go through the process manually, which isn&#8217;t difficult for someone familiar with Windows tools such as Regedit. The only problem might be getting to Microsoft&#8217;s Web site (where <a href=\"http:\/\/www.howtonetworking.com\/Windows\/rebuildchain2.htm\" target=\"_blank\">the instructions<\/a> are posted) from an infected computer.<br \/>\n<!--more--><br \/>\nThe spy only injects itself into a short list of Internet-capable applications; unfortunately, that list includes every popular browser for Windows: <strong>Internet Explorer, Firefox, Opera, Chrome, Safari<\/strong>, and the <a href=\"http:\/\/flock.com\/\" target=\"_blank\"><strong>Flock <\/strong>browser<\/a> (which runs Firefox as its core engine). In addition to the sites listed above, it also blocks some file-sharing sites (<strong>The Pirate Bay, RapidShare<\/strong>), shopping sites (<strong>Amazon.com, Craigslist<\/strong>), some porn sites, and a few oddballs, like <strong>MapQuest, Monster.com<\/strong> and <strong>Wikipedia<\/strong>.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_fullsitelist.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2116\" title=\"20100125-annoyed_fullsitelist_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_fullsitelist_crop.jpg\" width=\"131\" height=\"245\" \/><\/a><\/p>\n<p>Notably, the spy doesn&#8217;t block access to the Web sites of legitimate antivirus companies or other businesses in the computer security industry. Malicious hosts files and <a href=\"http:\/\/blogs.msdn.com\/oldnewthing\/archive\/2005\/12\/19\/505449.aspx\" target=\"_blank\">IFEO registry keys<\/a> that disable legitimate security applications become almost a <em>de-facto<\/em> part of the infection package (especially with Chinese phishing Trojans). But not with this one.<\/p>\n<p>Fixing the LSP chain manually on a Windows XP computer is a relatively straightforward process. If you don&#8217;t want to use a freeware tool such as <a href=\"http:\/\/www.cexx.org\/lspfix.htm\" target=\"_blank\">LSP-fix<\/a>, you have to delete a few registry traces, then reinstall Windows&#8217; TCP\/IP protocol over the top of itself; this forces Windows to rebuild the LSP chain from scratch. After a reboot you should be up and running again, as long as the malicious files have been removed from the computer.<\/p>\n<h3>Manual LSP repair instructions<\/h3>\n<ul>\n<li>Click Start, choose Run&#8230;, type Regedit in the dialog, then click OK. In the left pane of Regedit, navigate to:<\/li>\n<\/ul>\n<pre><strong>HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWinsock<\/strong>\r\n\r\n<a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_winsock.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-2103\" title=\"20100125-annoyed_winsock\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_winsock.jpg?w=300\" width=\"300\" height=\"184\" \/><\/a><\/pre>\n<ul>\n<li>Right-click the item labeled Winsock in the left pane, and choose Delete, then Yes in the Confirm Key Delete dialog box.<\/li>\n<\/ul>\n<ul>\n<li>Repeat the same steps with the item labeled Winsock2, also in the left pane, directly beneath Winsock.<\/li>\n<\/ul>\n<ul>\n<li>Close the Regedit program. Next, open the Network Connections control panel (click Start -&gt; Settings -&gt; Control Panel -&gt; Network Connections), then right-click Local Area Connection and choose Properties.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_addprotocol.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2104\" title=\"20100125-annoyed_addprotocol\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_addprotocol.jpg\" width=\"368\" height=\"442\" \/><\/a><\/p>\n<ul>\n<li>Click the button labeled &#8220;Install&#8230;&#8221; then select &#8220;Protocol&#8221; and &#8220;Add&#8230;&#8221;<\/li>\n<\/ul>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_selectprotocol1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2107\" title=\"20100125-annoyed_selectprotocol\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_selectprotocol1.jpg\" width=\"438\" height=\"320\" \/><\/a><\/p>\n<ul>\n<li>In the Select Network Protocol dialog, click the Have Disk&#8230; button.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_installfromdisk.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2106\" title=\"20100125-annoyed_installfromdisk\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_installfromdisk.jpg\" width=\"429\" height=\"218\" \/><\/a><\/p>\n<ul>\n<li>Type &#8220;C:Windowsinf&#8221; into the field labeled Copy manufacturer&#8217;s files from: and click OK.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_selecttcpip.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2108\" title=\"20100125-annoyed_selecttcpip\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/01\/20100125-annoyed_selecttcpip.jpg\" width=\"440\" height=\"320\" \/><\/a><\/p>\n<ul>\n<li>In the Select Network Protocol dialog, select the Internet Protocol (TCP\/IP) item and click OK.<\/li>\n<\/ul>\n<p>After a reboot, Windows will rebuild your LSP and (unless you need to modify any custom TCP\/IP settings for your particular setup) you should be able to connect to the Internet.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A payload file installed along with some variants of the rogue Internet Security 2010 &#8220;antivirus&#8221; program modifies victims&#8217; networking settings within Windows, inserting itself into the network stack and preventing victims from visiting some of the Web&#8217;s most popular Web sites. More than 40\u00a0sites have been targeted, including: Microsoft&#8217;s live.com and Bing search engine; social [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4215,7137,7131,4693,7135,7147,7133,4687,7139,7143,7129,7145,7141,7127,7125,4167,3471,4621,6089,3951],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2094"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2094"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2094\/revisions"}],"predecessor-version":[{"id":23845,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2094\/revisions\/23845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2094"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2094"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}