Just so everyone is aware of a new nasty making the rounds
Trojan.Mebroot takes control of the system by overwriting the MBR with its own code. Analysis of Trojan.Mebroot shows that its current code is at least partially copied from the original eEye BootRoot code. The kernel loader section, however, has been modified to load a custom designed stealth back door Trojan 467 KB in size, stored in the last sectors of the disk.
The main problem is that some versions of Microsoft Windows allow programs to overwrite disk sectors directly (including the MBR) from user mode, without restrictions. As such, writing a new MBR into Sector 0 as a standard user is a relatively easy task. This issue has been known for quite some time, and still affects the 2K/XP families, while Vista was partially secured in 2006 (after Release Candidate 2) after a successful attack demonstration made by Joanna Rutkowska. The attack is called the “Pagefile Attack”.
Rootkits themselves are hardly a new threat, but the inclusion of the MBR as part of the infection is not considered common. They were previously demonstrated as possible, but were not identified in the wild. Now that this has changed, we expect to see more variants targeting the MBR to appear in the future.
For now, Trojan.Mebroot seems to run successfully only on Windows XP (all Service Packs) due to some hard-coded values inside the attack code. For a complete analysis of the threat, please refer to our writeup for Trojan.Mebroot.
There appears to be a link between Trojan.Mebroot and Trojan.Anserin. Similarities such as the main distribution Web site and the polymorphic packer used in both threats suggest that they may be closely related.
Note: The rootkit cannot be removed while the OS is running, as it must be removed while the rootkit code itself is not running. During our tests, running the “fixmbr” command from within the Windows Recovery Console successfully removed the malicious MBR entry. To help prevent similar attacks in the future, and if your system BIOS includes the Master Boot Record write-protection feature, now is a good time to enable it!
As long as you have the recovery consol on XP you shoud be OK. Need to check Vista though
EDIT : Found it
/FixMbr
The /FixMbr option writes a Windows Vista-compatible MBR to the system partition. This option does not overwrite the existing partition table. Use this option when you must resolve MBR corruption issues, or when you have to remove non-standard code from the MBR.
If you surf safely then the great majority of these infections will not affect you - but if you like crakz - p**n sites and use p2p without scanning then I will await your visit
But a lot of this is, in a way paranoia, I mean I just have an AV and windows firewall and have yet to be unintentionally infected, and the times I tried to get myself infected I found it hard. Be safe
It will replace the old MBR with a clean version from the recovery consol, but I am not sure how that would affect Linux. But doesn’t Linux have its own version of MBR or am I thinking of Bootstrap ???
Yes, Linux has. But when you have a dual boot system, some of them should control the MBR. Windows has its own boot loader, and Linux has LILO or GRUB. My system uses the Windows loader at the boot sector of the first partition and it is redirected to Linux in another partition.
Maybe I’m messing MBR and boot sector ???
Avast can handle this now, but of course a cure for this is using the fixmbr command which is a recovery console command that is available in the below Microsoft Operating Systems.
Praises aside, it is nice to know you’re protected, but I haven’t noticed any official statement from Alwil in this thread. Or am I missing something here ? Who can guarantee this “good news there is detection” is official ?