Author Topic: Adware  (Read 2221 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
Adware
« on: July 13, 2014, 04:28:47 AM »
Okay so this started some weeks ago without a reason a adware showed up make a scan with avast then only detects some malwares but then in some pages like youtube imgur etc shows ads even if i have adblock entering to the page is http://gyr.mappingsection.net/ so i did a scan with avast and no virus detected i searched 'bout this and i don't know how to remove it can you help me people?

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76012
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: Adware
« Reply #1 on: July 13, 2014, 07:59:08 AM »
Attach your logs. (MBAM, FRST and aswMBR..!!)
Instructions: https://forum.avast.com/index.php?topic=53253.0
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

REDACTED

  • Guest
Re: Adware
« Reply #2 on: July 22, 2014, 08:51:14 AM »
A few weeks ago I was being hit by frequent (not quite constant) random ads when browsing in Internet Explorer.  Since it happened with two different computers running two different Windows operating systems and two different versions of IE it was puzzling.  Eventually I discovered that my router (wireless, but that's not essential) had been compromised by a worm that reset the DNS from auto to manual with primary and secondary DNS server IP's plugged in for a site called onclickads.com.  My fix was to restore auto DNS using the admin logon in the router and improve the strength of the admin logon password, then run boot-time full scans on both computers.  So far this seems to have worked, but I remain vigilant because some threads I researched suggest that the admin password makes no difference since the route in is via a hardware exploit which bypasses the password entirely.  Note that while the ads were annoying they were not damaging, but there is nothing to suggest that this exploit could not be used for much more serious theft or damage.  For the time being I am content to manually recheck for auto DNS in my router now and then and keep my fingers crossed.  The following link has interesting technical details about similar worms and recommends turning off Remote Management Access or the Home Network Administration Protocol (HNAP) in the router, a step which my ISP discourages but which I will take following any additional infectons.

  http://arstechnica.com/security/2014/02/bizarre-attack-infects-linksys-routers-with-self-replicating-malware/ .