Ramjet Posted June 3, 2011 ID:436148 Share Posted June 3, 2011 I told Malwarebytes to ignor a web page I wanted to go to and I was very sorry. I run Win7x64 and use VMware to create a virtual disk so I can also run Win XP. This is where I was when I wanted to go to this web page. Malwarebytes told me not to do it. My thinking was if anything went wrong I would just use a backup restore. WRONG.The virus broke through the virtual disk and infected my host and Win7x64 when I was using Win XP. Malwarebytes told me not to go there but I didn't listen.I solved the problem by doing a backup restore for drive C where Win7x64 is and for drive K where Win XP is. Both backups were less than a day old so I wasn't too concerned.The lesson I learned - LISTEN TO MALWAREBYTES WHEN IT SAYS "DON'T GO THERE" Link to post Share on other sites More sharing options...
1PW Posted June 3, 2011 ID:436152 Share Posted June 3, 2011 Hello Ramjet: I wonder, if your XP's browser had been sandboxed (i.e. Sandboxie), might you have been protected?Still, the report of your experience is greatly appreciated.Thank you. Link to post Share on other sites More sharing options...
exile360 Posted June 3, 2011 ID:436191 Share Posted June 3, 2011 Yes, unfortunately there are some infections that can escape a VM (or even a sandboxed browser ). I'm glad you were able to get the system restored though, and thank you for reporting the success (in blocking at least) on the part of Malwarebytes' Anti-Malware's Website Blocker, I feel that it is one of the most powerful, yet underrated features in the PRO version. Link to post Share on other sites More sharing options...
Guest gone1 Posted June 5, 2011 ID:437162 Share Posted June 5, 2011 Did you have your shared folders in VMware enabled? Malware like GPCode will encrypt everything. Even the shared folders. Link to post Share on other sites More sharing options...
ThexDarksider Posted June 5, 2011 ID:437203 Share Posted June 5, 2011 a web page I wanted to go[...]The virus broke through the virtual disk and infected my host and Win7x64 when I was using Win XP.No offence, but I have to doubt the sincerity of those claims. A simple webpage breaking through the VM into the host? Doesn't sound too convincing. Got a link or some other kind of proof? I'd love to see this one. Link to post Share on other sites More sharing options...
Stem Posted June 6, 2011 ID:437324 Share Posted June 6, 2011 Doesn't sound too convincing. Got a link or some other kind of proof? I'd love to see this one.I do find the report by the OP somewhat questionable.I would certainly need to know what actually detected the Viri and at what time (relative to the IP connection) it was detected, and what the Viri was named.- Stem Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted June 6, 2011 Root Admin ID:437327 Share Posted June 6, 2011 Okay I'm going to go ahead and close this post before it goes bad. Suffice to say, yes it is very possible for malware to get out of the VM (when,why,where,how) is not up to the user to defend or explain.Thank you Link to post Share on other sites More sharing options...
Recommended Posts