Pinfi virus detection
Results 1 to 4 of 4

Thread: Pinfi virus detection

  1. #1
    Junior Member
    Join Date
    Aug 2004
    Posts
    2

    Pinfi virus detection

    This virus from 2001 is kicking my butt right now. I believe I have at least one rogue system on my network infected with it and it has found nearly every open share and infected files. Our detection tactics are so geared toward worms that create SYN traffic or BO attacks. Since the virus is infecting files through mapped drives there seems to be virtually no way of tracking it through sniffers or the like. Out of our 12,000 users we have identified around 200 systems that are not running managed AV clients and we are tracking those down. I am sure the infected systems are within this group but would like to find the virus asap. Only Trend seems to list a possible port opened by the virus, 30167 but due to the behaviour of the virus it is not always active to avoid detection. Has anyone found a good way of dealing with this sort of threat? Thanks for any input.

    http://securityresponse.symantec.com...w32.pinfi.html
    http://us.mcafee.com/virusInfo/defau...&virus_k=99690
    http://www.trendmicro.com/vinfo/viru...me=PE_PARITE.A

  2. #2
    Senior Member
    Join Date
    Aug 2003
    Posts
    119
    Well, judging from what I read briefly contained in the links you provided, it doesn't seem to attack AV. According to this it appends to all .exe & .scr files it can access with remote network shares. Depending on how your shares are setup is the issue here, is everyone allowed to access these? If so you may have trouble, if your somewhat restrictive on who can share and what they can do, doesn't look like it will spread that quickly.

    Now your AV, I know Symantec CE, has the ability to do remote installs. Being that this virus won't attack the AV, just push out managed clients to your infected systems. Update them, poof. You can even create a new group for them under SSC 8.1 X and have it set to scan immediately on new virus definitions, thereby fixing theirself!

  3. #3
    Junior Member
    Join Date
    Aug 2004
    Posts
    2
    Yeah, that really did point out some problems we had with permissions, but at the same time a few users with admin privelages got infected and that pointed out a misconfiguration in the Symantec config. I'm concentrating right now on 200 or so systems that are not responding not remote install for Symantec. We are going to down those PC's by either remote shutdown or killing their network port and if found disabling their user ID's. We're trying to flush out those systems that are rogue builds or have been under somebody's desk for 2 years.

  4. #4
    I'd rather be fishing DjM's Avatar
    Join Date
    Aug 2001
    Location
    The Great White North
    Posts
    1,867
    Originally posted here by xmbalmr
    I'm concentrating right now on 200 or so systems that are not responding not remote install for Symantec.
    Do you mean these system will not take a remote install?

    If so, what error message are you gettting back?

    Are you trying to install the "NT Client" or the "AV Server"?

    Cheers:
    DjM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •