• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

What causes viruses etc to reinfect itself?

speedy11131

New Member
Joined
Oct 15, 2006
Messages
120 (0.02/day)
Location
New York City, USA
Processor Phenom II X4 965 Black Edition
Motherboard Gigabyte GA-M68MT-SP2
Video Card(s) EVGA GeForce GTX 580 1.5GB
Storage Crucial RealSSD C300 128GB SSD, Western Digital Caviar Black 1.5TB
Display(s) JVC 32"
Audio Device(s) onboard
Power Supply RP-550
Software Windows 7 Ultimate
Basically other than visiting an infected site or running it, what else can cause a virus to reinfect?
 

von kain

New Member
Joined
Sep 13, 2006
Messages
780 (0.12/day)
Location
athens/greece
System Name intel-hate
Processor Amd phenom 2 955 @ 3800
Motherboard msi 790fx-gd70
Cooling coolermaster
Memory 4096 @1600 corsair
Video Card(s) sapphire 5770 @950-1350
Storage 1 seagate 80gb sata2 1 160gb seagate sata
Display(s) 20inch wide lg
Power Supply chieftech 750w
Software windows 7 x64
Benchmark Scores nah
a line in its code.
 

speedy11131

New Member
Joined
Oct 15, 2006
Messages
120 (0.02/day)
Location
New York City, USA
Processor Phenom II X4 965 Black Edition
Motherboard Gigabyte GA-M68MT-SP2
Video Card(s) EVGA GeForce GTX 580 1.5GB
Storage Crucial RealSSD C300 128GB SSD, Western Digital Caviar Black 1.5TB
Display(s) JVC 32"
Audio Device(s) onboard
Power Supply RP-550
Software Windows 7 Ultimate
i mean even after its removal by something like MalwareBytes?
 

2DividedbyZero

New Member
Joined
Aug 2, 2008
Messages
776 (0.14/day)
Location
in retarded hell
if the virus has been removed, then it has to be reintroduced to reinfect

can be from a USB pen, a recently created CD, web page, portable HDD, anything that can have Data written to it.


i was gonna say Floppy but, gave myself a reality check :p
 

speedy11131

New Member
Joined
Oct 15, 2006
Messages
120 (0.02/day)
Location
New York City, USA
Processor Phenom II X4 965 Black Edition
Motherboard Gigabyte GA-M68MT-SP2
Video Card(s) EVGA GeForce GTX 580 1.5GB
Storage Crucial RealSSD C300 128GB SSD, Western Digital Caviar Black 1.5TB
Display(s) JVC 32"
Audio Device(s) onboard
Power Supply RP-550
Software Windows 7 Ultimate
what sort of methods would it use?
 

2DividedbyZero

New Member
Joined
Aug 2, 2008
Messages
776 (0.14/day)
Location
in retarded hell
anything. a virus can auto run on insertion of a USB stick for example. what are u getting at?
 

AsRock

TPU addict
Joined
Jun 23, 2007
Messages
18,875 (3.07/day)
Location
UK\USA
Processor AMD 3900X \ AMD 7700X
Motherboard ASRock AM4 X570 Pro 4 \ ASUS X670Xe TUF
Cooling D15
Memory Patriot 2x16GB PVS432G320C6K \ G.Skill Flare X5 F5-6000J3238F 2x16GB
Video Card(s) eVga GTX1060 SSC \ XFX RX 6950XT RX-695XATBD9
Storage Sammy 860, MX500, Sabrent Rocket 4 Sammy Evo 980 \ 1xSabrent Rocket 4+, Sammy 2x990 Pro
Display(s) Samsung 1080P \ LG 43UN700
Case Fractal Design Pop Air 2x140mm fans from Torrent \ Fractal Design Torrent 2 SilverStone FHP141x2
Audio Device(s) Yamaha RX-V677 \ Yamaha CX-830+Yamaha MX-630 Infinity RS4000\Paradigm P Studio 20, Blue Yeti
Power Supply Seasonic Prime TX-750 \ Corsair RM1000X Shift
Mouse Steelseries Sensei wireless \ Steelseries Sensei wireless
Keyboard Logitech K120 \ Wooting Two HE
Benchmark Scores Meh benchmarks.
Some don't use the original file and copy them self's else were to run. Although that file needs to be ran again to reinfect. Could be triggered from a website or coming from code in the website it self.
 

streetfighter 2

New Member
Joined
Jul 26, 2010
Messages
1,655 (0.33/day)
Location
Philly
The question is kinda flawed. So I done fixed it :D:
what causes viruses malware etc to reinfect itself a computer after removal?
The answer is, of course, incomplete removal. There are a billion and one places for malware to hide on Windows; the most common of which being system restore, registry, services, ADS and rootkits (with significant overlap between places). If malicious software is not completely and utterly removed it can easily reinfect a system.
 

speedy11131

New Member
Joined
Oct 15, 2006
Messages
120 (0.02/day)
Location
New York City, USA
Processor Phenom II X4 965 Black Edition
Motherboard Gigabyte GA-M68MT-SP2
Video Card(s) EVGA GeForce GTX 580 1.5GB
Storage Crucial RealSSD C300 128GB SSD, Western Digital Caviar Black 1.5TB
Display(s) JVC 32"
Audio Device(s) onboard
Power Supply RP-550
Software Windows 7 Ultimate
Thanks for the correction streetfighter.

Yaah, I was wondering how it could reinfect with improper removal, not how it originally gets on there. Thanks guys.
 

2DividedbyZero

New Member
Joined
Aug 2, 2008
Messages
776 (0.14/day)
Location
in retarded hell
Thanks for the correction streetfighter.

Yaah, I was wondering how it could reinfect with improper removal, not how it originally gets on there. Thanks guys.

well u kinda got it right there, improper removal. it will be hidden waiting till you fall asleep, then it will sneak up behind you and BAM

re-infected.

full format and install OS from the original disk

but even then, it could be hidden in your back-up files, its like having herpes.... (err... so I've read:wtf:)

best tip, stop surfing pr0n
 

speedy11131

New Member
Joined
Oct 15, 2006
Messages
120 (0.02/day)
Location
New York City, USA
Processor Phenom II X4 965 Black Edition
Motherboard Gigabyte GA-M68MT-SP2
Video Card(s) EVGA GeForce GTX 580 1.5GB
Storage Crucial RealSSD C300 128GB SSD, Western Digital Caviar Black 1.5TB
Display(s) JVC 32"
Audio Device(s) onboard
Power Supply RP-550
Software Windows 7 Ultimate
hehe, not my machine, was just wondering is all :D
 
Joined
Mar 1, 2010
Messages
3,565 (0.69/day)
Location
By the Channel Tunnel, Kent, England
System Name Benny
Processor Phenom II 1055t @ 3.3GHz; 300x11; 1.380v; NB 2700; HT 2400
Motherboard ASUS Crosshair IV Formula (2002 BIOS)
Cooling Thermalright TRUE 120 Black + 2 Xilence Red Wing PWM 120mm (push/pull) + polycarbonate fan holders
Memory 8GB GeIL Ultra 2133MHZ C9 running at 1600MHz @ 7-7-7-21 1T 1.5v
Video Card(s) MSI Twin Frozr II GTX470 @ Stock w/CPU fan cable-tied on, as one of the GPU fans broke.
Storage 60GB OCZ Agility3 (OS);500GB WDC Grn; 1x1TB WDC Blk (Backup)
Display(s) ASUS PA823Q
Case Silverstone Raven 2 (all cables custom sleeved with velcro mod on side panel...)
Audio Device(s) X-Fi (Onboard) + Harmon Kardon HK6100 amp powering JVC HA-RX700's with Zalman mic
Power Supply Corsair HX650W
Software Win7 Pro x64
Benchmark Scores No benchies so making this space useful! Corsair M90, Logitech G19. Phobya FlexLight LED's (gawjus)
Other computers on your network.
I always have a rule of disconnecting the infected PC from the network, cleaning/re-installing OS, sorting out anti-virus and ONLY THEN reconnecting to the net/network.

streetfighter, I suppose you're the man to ask:

If a virus infects someone and they clean it, can they be re-infected by another (infected) computer over the internet (not network) without any user action?
Kinda like all infected computers keeping a note of other infected computer's ip's, and "calling" them periodically to check to see if they are still infected (and reinfecting if not)? Over the internet, not PC's on the same network.
 
Last edited:

W1zzard

Administrator
Staff member
Joined
May 14, 2004
Messages
27,049 (3.71/day)
Processor Ryzen 7 5700X
Memory 48 GB
Video Card(s) RTX 4080
Storage 2x HDD RAID 1, 3x M.2 NVMe
Display(s) 30" 2560x1600 + 19" 1280x1024
Software Windows 10 64-bit

streetfighter 2

New Member
Joined
Jul 26, 2010
Messages
1,655 (0.33/day)
Location
Philly
If a virus infects someone and they clean it, can they be re-infected by another (infected) computer over the internet (not network) without any user action?
The only way I can imagine that being possible is if the virus had (prior to removal) opened a port in the firewall(s)/router(s) which was not detected and repaired during the removal process. That port would have to be connected to a service (running on the machine in question) that the virus either created/modified or was capable of exploiting.

There are probably other ways of a virus reinfecting over the internet without user interaction, but if your firewall(s)/router(s) and security settings are intact the risk should be minimal.
 
Joined
Mar 1, 2010
Messages
3,565 (0.69/day)
Location
By the Channel Tunnel, Kent, England
System Name Benny
Processor Phenom II 1055t @ 3.3GHz; 300x11; 1.380v; NB 2700; HT 2400
Motherboard ASUS Crosshair IV Formula (2002 BIOS)
Cooling Thermalright TRUE 120 Black + 2 Xilence Red Wing PWM 120mm (push/pull) + polycarbonate fan holders
Memory 8GB GeIL Ultra 2133MHZ C9 running at 1600MHz @ 7-7-7-21 1T 1.5v
Video Card(s) MSI Twin Frozr II GTX470 @ Stock w/CPU fan cable-tied on, as one of the GPU fans broke.
Storage 60GB OCZ Agility3 (OS);500GB WDC Grn; 1x1TB WDC Blk (Backup)
Display(s) ASUS PA823Q
Case Silverstone Raven 2 (all cables custom sleeved with velcro mod on side panel...)
Audio Device(s) X-Fi (Onboard) + Harmon Kardon HK6100 amp powering JVC HA-RX700's with Zalman mic
Power Supply Corsair HX650W
Software Win7 Pro x64
Benchmark Scores No benchies so making this space useful! Corsair M90, Logitech G19. Phobya FlexLight LED's (gawjus)
The only way I can imagine that being possible is if the virus had (prior to removal) opened a port in the firewall(s)/router(s) which was not detected and repaired during the removal process. That port would have to be connected to a service (running on the machine in question) that the virus either created/modified or was capable of exploiting.
There are probably other ways of a virus reinfecting over the internet without user interaction, but if your firewall(s)/router(s) and security settings are intact the risk should be minimal.
Mmm I suppose it's a quite narrow "maybe" then.
I'm guessing you would need:

Infectee (you)
Infected PC (over net)
Inadequate firewall/AV
Exploitable exploit/freshly installed OS (no recent updates etc.)

For a reinfection to occur. Throw "user error" into the mix and you're f****d...
 

Mussels

Freshwater Moderator
Staff member
Joined
Oct 6, 2004
Messages
58,413 (8.18/day)
Location
Oystralia
System Name Rainbow Sparkles (Power efficient, <350W gaming load)
Processor Ryzen R7 5800x3D (Undervolted, 4.45GHz all core)
Motherboard Asus x570-F (BIOS Modded)
Cooling Alphacool Apex UV - Alphacool Eisblock XPX Aurora + EK Quantum ARGB 3090 w/ active backplate
Memory 2x32GB DDR4 3600 Corsair Vengeance RGB @3866 C18-22-22-22-42 TRFC704 (1.4V Hynix MJR - SoC 1.15V)
Video Card(s) Galax RTX 3090 SG 24GB: Underclocked to 1700Mhz 0.750v (375W down to 250W))
Storage 2TB WD SN850 NVME + 1TB Sasmsung 970 Pro NVME + 1TB Intel 6000P NVME USB 3.2
Display(s) Phillips 32 32M1N5800A (4k144), LG 32" (4K60) | Gigabyte G32QC (2k165) | Phillips 328m6fjrmb (2K144)
Case Fractal Design R6
Audio Device(s) Logitech G560 | Corsair Void pro RGB |Blue Yeti mic
Power Supply Fractal Ion+ 2 860W (Platinum) (This thing is God-tier. Silent and TINY)
Mouse Logitech G Pro wireless + Steelseries Prisma XL
Keyboard Razer Huntsman TE ( Sexy white keycaps)
VR HMD Oculus Rift S + Quest 2
Software Windows 11 pro x64 (Yes, it's genuinely a good OS) OpenRGB - ditch the branded bloatware!
Benchmark Scores Nyooom.
Basically other than visiting an infected site or running it, what else can cause a virus to reinfect?

Viruses can come from:

The web (bad websites)
Files - either downloaded or remaining on your drives
External/portable drives: Autorun viruses that infect as soon as you recconect them
 
Joined
Sep 1, 2010
Messages
7,023 (1.41/day)
Viruses can come from:

The web (bad websites)
Files - either downloaded or remaining on your drives
External/portable drives: Autorun viruses that infect as soon as you recconect them

email
im
p2p
 

Mussels

Freshwater Moderator
Staff member
Joined
Oct 6, 2004
Messages
58,413 (8.18/day)
Location
Oystralia
System Name Rainbow Sparkles (Power efficient, <350W gaming load)
Processor Ryzen R7 5800x3D (Undervolted, 4.45GHz all core)
Motherboard Asus x570-F (BIOS Modded)
Cooling Alphacool Apex UV - Alphacool Eisblock XPX Aurora + EK Quantum ARGB 3090 w/ active backplate
Memory 2x32GB DDR4 3600 Corsair Vengeance RGB @3866 C18-22-22-22-42 TRFC704 (1.4V Hynix MJR - SoC 1.15V)
Video Card(s) Galax RTX 3090 SG 24GB: Underclocked to 1700Mhz 0.750v (375W down to 250W))
Storage 2TB WD SN850 NVME + 1TB Sasmsung 970 Pro NVME + 1TB Intel 6000P NVME USB 3.2
Display(s) Phillips 32 32M1N5800A (4k144), LG 32" (4K60) | Gigabyte G32QC (2k165) | Phillips 328m6fjrmb (2K144)
Case Fractal Design R6
Audio Device(s) Logitech G560 | Corsair Void pro RGB |Blue Yeti mic
Power Supply Fractal Ion+ 2 860W (Platinum) (This thing is God-tier. Silent and TINY)
Mouse Logitech G Pro wireless + Steelseries Prisma XL
Keyboard Razer Huntsman TE ( Sexy white keycaps)
VR HMD Oculus Rift S + Quest 2
Software Windows 11 pro x64 (Yes, it's genuinely a good OS) OpenRGB - ditch the branded bloatware!
Benchmark Scores Nyooom.
email
im
p2p

those three would be covered under 'the web'. i simply listed their base elements.


if you disconnect your internet, all of those are gone. if you do not attach any extra internal or external storage devices, you eliminate that risk. if you use a formatted drive with no leftover files, that risk is gone. a computer impossible to be infected (barring a virus infected OS installation disc)
 

Mussels

Freshwater Moderator
Staff member
Joined
Oct 6, 2004
Messages
58,413 (8.18/day)
Location
Oystralia
System Name Rainbow Sparkles (Power efficient, <350W gaming load)
Processor Ryzen R7 5800x3D (Undervolted, 4.45GHz all core)
Motherboard Asus x570-F (BIOS Modded)
Cooling Alphacool Apex UV - Alphacool Eisblock XPX Aurora + EK Quantum ARGB 3090 w/ active backplate
Memory 2x32GB DDR4 3600 Corsair Vengeance RGB @3866 C18-22-22-22-42 TRFC704 (1.4V Hynix MJR - SoC 1.15V)
Video Card(s) Galax RTX 3090 SG 24GB: Underclocked to 1700Mhz 0.750v (375W down to 250W))
Storage 2TB WD SN850 NVME + 1TB Sasmsung 970 Pro NVME + 1TB Intel 6000P NVME USB 3.2
Display(s) Phillips 32 32M1N5800A (4k144), LG 32" (4K60) | Gigabyte G32QC (2k165) | Phillips 328m6fjrmb (2K144)
Case Fractal Design R6
Audio Device(s) Logitech G560 | Corsair Void pro RGB |Blue Yeti mic
Power Supply Fractal Ion+ 2 860W (Platinum) (This thing is God-tier. Silent and TINY)
Mouse Logitech G Pro wireless + Steelseries Prisma XL
Keyboard Razer Huntsman TE ( Sexy white keycaps)
VR HMD Oculus Rift S + Quest 2
Software Windows 11 pro x64 (Yes, it's genuinely a good OS) OpenRGB - ditch the branded bloatware!
Benchmark Scores Nyooom.
email and p2p doesn't necessarily mean internet

where else are they coming from? who runs an email server on their LAN to email each other?

P2P could theoretically run over a LAN, but if you have a network full of infected machines and not just one, you're in for a busy day.

also, P2P apps dont allow viruses to spread. Worms can propogate over a network on their own, but no P2P programs can auto download files without a local user setting them up to do so (RSS feeds and such) - and who would run a torrent to download a virus over a LAN?
 
Joined
Sep 1, 2010
Messages
7,023 (1.41/day)
who runs an email server on their LAN to email each other?
um ... all the companies in the world?

but no P2P programs can auto download files without a local user setting them up to do so
no one said they can. someone might download a pdf or gif packed with malicious code.
 

Mussels

Freshwater Moderator
Staff member
Joined
Oct 6, 2004
Messages
58,413 (8.18/day)
Location
Oystralia
System Name Rainbow Sparkles (Power efficient, <350W gaming load)
Processor Ryzen R7 5800x3D (Undervolted, 4.45GHz all core)
Motherboard Asus x570-F (BIOS Modded)
Cooling Alphacool Apex UV - Alphacool Eisblock XPX Aurora + EK Quantum ARGB 3090 w/ active backplate
Memory 2x32GB DDR4 3600 Corsair Vengeance RGB @3866 C18-22-22-22-42 TRFC704 (1.4V Hynix MJR - SoC 1.15V)
Video Card(s) Galax RTX 3090 SG 24GB: Underclocked to 1700Mhz 0.750v (375W down to 250W))
Storage 2TB WD SN850 NVME + 1TB Sasmsung 970 Pro NVME + 1TB Intel 6000P NVME USB 3.2
Display(s) Phillips 32 32M1N5800A (4k144), LG 32" (4K60) | Gigabyte G32QC (2k165) | Phillips 328m6fjrmb (2K144)
Case Fractal Design R6
Audio Device(s) Logitech G560 | Corsair Void pro RGB |Blue Yeti mic
Power Supply Fractal Ion+ 2 860W (Platinum) (This thing is God-tier. Silent and TINY)
Mouse Logitech G Pro wireless + Steelseries Prisma XL
Keyboard Razer Huntsman TE ( Sexy white keycaps)
VR HMD Oculus Rift S + Quest 2
Software Windows 11 pro x64 (Yes, it's genuinely a good OS) OpenRGB - ditch the branded bloatware!
Benchmark Scores Nyooom.
um ... all the companies in the world?

all those companies would have antivirus on the LAN as well, so they're completely unrelated to the topic here. Also, they'd have heavy security to prevent infections in the first place.

no one said they can. someone might download a pdf or gif packed with malicious code.

again... from LAN? where are they getting these without internet.
 
Joined
Sep 1, 2010
Messages
7,023 (1.41/day)
all those companies would have antivirus on the LAN as well, so they're completely unrelated to the topic here. Also, they'd have heavy security to prevent infections in the first place.

That's knida a myth. Today incompetence appears anywhere. If someone works for a company with some buzz name it doesn't mean they're invincible. A/v server can just appear down for a moment and whole their network might be fried by some zero-day stuff.
 
Joined
Mar 1, 2010
Messages
3,565 (0.69/day)
Location
By the Channel Tunnel, Kent, England
System Name Benny
Processor Phenom II 1055t @ 3.3GHz; 300x11; 1.380v; NB 2700; HT 2400
Motherboard ASUS Crosshair IV Formula (2002 BIOS)
Cooling Thermalright TRUE 120 Black + 2 Xilence Red Wing PWM 120mm (push/pull) + polycarbonate fan holders
Memory 8GB GeIL Ultra 2133MHZ C9 running at 1600MHz @ 7-7-7-21 1T 1.5v
Video Card(s) MSI Twin Frozr II GTX470 @ Stock w/CPU fan cable-tied on, as one of the GPU fans broke.
Storage 60GB OCZ Agility3 (OS);500GB WDC Grn; 1x1TB WDC Blk (Backup)
Display(s) ASUS PA823Q
Case Silverstone Raven 2 (all cables custom sleeved with velcro mod on side panel...)
Audio Device(s) X-Fi (Onboard) + Harmon Kardon HK6100 amp powering JVC HA-RX700's with Zalman mic
Power Supply Corsair HX650W
Software Win7 Pro x64
Benchmark Scores No benchies so making this space useful! Corsair M90, Logitech G19. Phobya FlexLight LED's (gawjus)
The only way I can imagine that being possible is if the virus had (prior to removal) opened a port in the firewall(s)/router(s) which was not detected and repaired during the removal process. That port would have to be connected to a service (running on the machine in question) that the virus either created/modified or was capable of exploiting.
There are probably other ways of a virus reinfecting over the internet without user interaction, but if your firewall(s)/router(s) and security settings are intact the risk should be minimal.

So, if 2 PC's on a network were infected and you disconnected PC "A" from the network, re-installed OS and enabled firewall but didn't install antivirus, could PC "B" reinfect it?
I'm wondering if a clever virus could re-infect you in this way:
1. You get infected (PC A), so does someone in Australia (PC B) (with the same virus, from the same source)
2. The virus infects both properly and stores PC A and PC B's i.p.'s on each PC.
3. PC A gets OS reinstalled while disconnected from the net.
4. PC A gets reconnected to the net after OS reinstall, and (with firewall enabled by default) you start downloading antivirus program.

Q: Can PC A get re-infected by PC B between connecting to the net after OS re-install, and finishing downloading the antivirus (between step 3 and step 4)?

For argument's sake, say the variables are at "worst case scenario": the virus would have to be enabled to:
"save and call/ping/check other infected i.p.'s peridoically"
"take advantage of an exploit from an OS with no updates" (for example, after installing XP with no service packs, where no Microsoft Updates have been installed that deal with the simplest, oldest of exploits)

I know it's a bit of a small gap of time, but if a virus is made to check on other infected PC's, then could it be done with no user action (again, I stress with default firewall settings and no SP's/updates that may protect against this)?

um ... all the companies in the world?

Yes companies use e-mail over LAN, but as I said above, how many of them are disconnected from the net at the same time (just LAN, no internet)? If the answer is negligible then it's covered under "The web"

Today incompetence appears anywhere. If someone works for a company with some buzz name it doesn't mean they're invincible.

True to an extent; in the corporate sector, all updates (which are the virus-makers first point of attack) must go through rigorous checks before being installed network-wide, so it would almost have to be incompetence that causes an infection in the workplace. But kinda like Mussels is saying; you're much less likely to find corporate computers infecting eachother than end-users infecting eachother, as they have measurements in place to avoid being exploited in the first place.

It doesn't even take incompetence for an end-user to get infected:
Adobe Flash receives an update.
Download and install.
New virus takes advantage of a new component within the latest Adobe update.
Adobe pop-up comes up and says "do you want to update Adobe?".
You click "No" as you know you've already updated it; you are being cautious.
Virus infects you anyway as it preys on a gammy Adobe exploit.

Most people think if they have a decent AV they will be safe forever, but a new virus can infect you, even if you have *insert your favourite av here* with all the latest updates. Not because of incompetence or user error, but all due to the coding talent of the author.


APK


j/k :roll:
 
Last edited:
Top