Forgot your password?
typodupeerror
Security

+ - How to detect 'Botted' machines

Submitted by
Alpha830RulZ
Alpha830RulZ writes "A couple of us at work are pretty sure that we have at least one compromised machine inside our firewall. We get a lot of SPAM that has contiguous email addresses from our company address book, and they have shown up in enough ways that it looks like some user's machine has been pretty well read over. This is happening repeatedly enough, and new employee's addresses are showing up, so I am concerned that we have some botted machines. We run current Symantec AV, corporate version, on all machines.

Everything I read about the Storm Worm and similar just scares the piss out of me. Is there any way for a normal sysadmin type to detected a Storm botted machine? We are familiar with the likes of rootkit revealer, and when we have had suspicions about a particular box, we run that, Kaspersky, Symantec, and Bitdefender. We haven't found anything definitive, but we have found:

— one machine that prevents Kaspersky from being installed on it. The install hangs on an access violation of a directory newly created by the Kaspersky installer during the install. Symantec, Rootkit Revealer, and Bitdefender find nothing on this machine.

— one machine that has entries deep in the user's temp directories which can't be deleted. These were found by Rootkit Revealer, but we haven't been able to remove them.

We've got the machines segregated for now, and are wondering what we can do to get a handle on this. Help me, my geek brethren."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

How to detect 'Botted' machines

Comments Filter:

Anything free is worth what you pay for it.

Working...