Question:
Can a virus/malware stay even after re-installation?
Isis
2016-08-07 06:23:50 UTC
Hi, I have restored my system, installed Windows 10 all over again, but still have the problem of being redirected to either porn (Russian sites) or facebook.
Eighteen answers:
Smokies Hiker
2016-08-09 19:05:42 UTC
The virus/malware could be hiding in a Windows program. If that's the case, when the Windows programs are re-installed, so is the virus. You'd need to do a clean install of Windows 10. You mentioned that you "restored" the OS. You need to do a "recovery" of the OS, but even then if the virus was planted in a Windows program that is re-installed from the "D" Drive partition, you'd still get the virus back. Recovery and restore are two different things. You didn't mention if the Windows 10 OS is from the free upgrade or if your computer had it installed from the factory as a Microsoft Windows 10 OEM installation.
?
2016-08-10 04:58:29 UTC
Make sure that do all drives formatted and then re-install the windows.However,It is definitely possible for a slightly sophisticated attacker to leave malware outside the direct reach of the operating system. Reinstalling the operating system means a disk wipe at most. Even there, you need to be careful if you restore any data that may have been compromised.



Malware can be stored in one of the many rewritable memories that lurk in just about every component of a modern computer. These memories store that component's firmware and are usually rewritable; all it takes is knowing the right address to it, and manufacturers usually provide tools to upgrade the firmware, so all the attacker to do is substitute his own code (there is almost never any cryptography).



For example, there is a known (and fairly simple) exploit for Apple keyboards, found by K. Chen. Chen's presentation shows how to take advantage of the available memory (only about 1kB to spare) to open a shell on a TCP port by injecting keystrokes, or log keystrokes in a context where a passphrase is expected and replay them.

For another example of a firmware vulnerability in the wild, try CVE-2010-0104: Broadcom NetXtreme management firmware ASF buffer overflow. This is a bug in some Ethernet firmware that allows a remote attacker to take control of the network firmware (and so at the very least actively attack all network traffic), and potentially of the whole computer (I don't know if there's an exploit for that, but once you have access to the PCI bus, I doubt that much is barred). Interestingly, this vulnerability is easiest to exploit on a computer that's switched off, since the bug is in a remote management protocol parser, which in particular handles wake-on-LAN.



Yet another example is reflashing a hard disk controller (presented at OHM 2013).

This question asks for firmware on video cards. As I write, no one has given an example of a malware in the wild, but the possibility is definitely there.



There is no real protection against compromised firmware on a typical PC. You'd need to keep track of every single piece of flash memory in the computer. There are efforts to require firmware to be authenticated; on PCs, the most advanced such effort is the TPM, which currently can check the integrity of the BIOS and the OS bootloader, if you have the required hardware and a BIOS that supports it. I'm not aware of a PC where all components have their firmware checked for integrity (at least, before they're allowed to access the PCI bus). There are similar efforts in the smartphone world leveraging security features of ARM chips, but again it's a far cry from the existence of security feature to the inclusion of all firmware in the trusted base.



In practice, if you aren't a high-profile target, you don't need to worry much. There aren't any exploits in the wild at script kiddie level. But the possibilities are rife for your attacker with technical skills (or the means to hire a skilled hacker).



Firmware attacks are becoming easier over time. At Black Hat USA 2012, Jonathan Brossard presented “a generic proof of concept malware for the intel architecture, Rakshasa, capable of infecting more than a hundred of different motherboards”. The proof-of-concept (not publicly released) infects many BIOSes and common peripherals including network chips. It's only a matter of time until such firmware infection frameworks appear in the wild.
Geek Squad
2016-08-09 13:00:30 UTC
Hello,



Yes it is very possible if the computer is being only being restored. However, if Windows is reinstalled completely then it should remove everything saved on the computer's hard drive including the malware. Very rarely you may find malware that can insert themselves into the backup files and adapt to the restore.



Agent West R.

Geek Squad Online Support | Covert Dispatch

Geek Squad Social Media Team | Yahoo Answers

Badge #99545

8-9-2016
keerthi
2016-08-07 23:32:53 UTC
Remove all floppy disks, CDs, and DVDs from your computer, and then restart your computer.

If you are using Windows XP, Vista or 7 press and hold the F8 key as your computer restarts.Please keep in mind that you need to press the F8 key before the Windows start-up logo appears.

Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get the Advanced Boot Options screen.If you are using Windows 8, press the Windows key + C, and then click Settings. Click Power, hold down Shift on your keyboard and click Restart, then click on Troubleshoot and select Advanced options.
Yami
2016-08-07 06:28:05 UTC
Depends on their method of attack I suppose. If they have a dedicated partition that utilizes a file system that Windows can't detect, then perhaps. Boot from the windows installation disc and hit Shift+F10 to access the cmd prompt, then type diskpart. You're going to want to type list disk, and then select disk and then clean /all, then quit/exit,quit/exit and install normally
David
2016-08-07 21:30:01 UTC
It is possible, but very rare. There is malware in the wild that will modify your flash BIOS so that it can reinfected a new disk. But this only works on a very specific model of PC (Award BIOS).
anonymous
2016-08-07 12:31:29 UTC
Reinstalling often does NOT remove infections. It can leave hidden dormant infected files just waiting to reactivate. I have supported computers since before home pcs were available and have NEVER had to reinstall to remove infections. Why did you not use a good fully updated active anti-virus to protect your machine?
Isaac
2016-08-08 08:17:52 UTC
This sounds like a problem with your browser. I say this because if you wiped everything from your computer, then this was restored after the fact. Most browsers save your data. In this case, it is likely an extension you have enabled. My suggestion would be to go to the settings tab in your browser, clear all saved data (cookies, browsing history, extensions), and change your startup pages.
keerok
2016-08-07 07:29:37 UTC
Format the hard disk before installing Windows from scratch.
Belgariad
2016-08-08 15:14:46 UTC
You need to burn yourself some master disks or a master disk for your computer, This is step one. Step two, wipe your drive, Step three use your master disk to reformat your computer.

Make sure you turn off your computer for a moment after you wipe your drive. Then restart and reformat the drive.
Oliver
2016-08-09 00:53:15 UTC
unless you did so called "full restore/w wipe etc) from the laptop software (not windows), most of the time the drives dont get formated e.g. old data stays on in until overwritten.

run a prog like superantispyware to check if it stems from browser use/cookies.
adam.antoshin
2016-08-07 06:42:03 UTC
Did you do a factory reset, or just re-installed your operating system?
Murzy
2016-08-07 06:32:42 UTC
you need to run your anti-virus program from safe mode before anything loads
Fred
2016-08-08 12:23:25 UTC
Download antivirus. There are good out there for free.
anonymous
2016-08-08 09:52:07 UTC
Depends on the severity of the virus.
anonymous
2016-08-07 08:59:01 UTC
possible, but highly unlikely
anonymous
2016-08-14 06:56:29 UTC
download antivirus... there are good out there for free...
Boltz
2016-08-07 06:55:59 UTC
ok


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...