Dealing with TDSS Rootkit Infections and Google Search Redirects
Computer security is a continuous battle, and some threats are significantly more stubborn than others. A recent case highlighted on the BleepingComputer forums showcases the extreme frustration of dealing with the TDSS rootkit. The user reported that despite running frequent scans with Malwarebytes, the software continued to detect new Trojans and identified suspicious registry keys within the HKLM (HKEY_LOCAL_MACHINE) hive. Furthermore, the user experienced the classic and disruptive symptom of a browser hijacker: Google search results constantly redirecting to unwanted, third-party websites.
What is the TDSS Rootkit?
The TDSS rootkit, also known by names like Alureon, is a sophisticated piece of malware designed to hide its presence on a system while providing a backdoor for attackers. Unlike standard viruses that live in user-level folders, rootkits target low-level system components. This makes them nearly invisible to standard Windows tools and even some basic antivirus programs. Its primary goals usually involve stealing sensitive data, hijacking search engine results to generate fraudulent ad revenue, and downloading additional malicious payloads onto the infected machine.
Recognizing the Symptoms of Infection
As described in the original forum report, one of the most prominent signs of a TDSS infection is the redirection of search engine results. When a user clicks a legitimate link on a search engine like Google or Bing, they are instead sent to a completely unrelated, often malicious, advertisement page. Other symptoms include the persistent reappearance of malware detections even after they are supposedly “cleaned.”
In the specific case mentioned, the user noted that Malwarebytes was repeatedly flagging files and registry keys, even after attempts to clear temporary Python files and system cache. This persistence is a hallmark of rootkit behavior; the malware often hooks into the operating system kernel to protect its own files, automatically regenerating them if they are deleted by standard security software.
Steps for Effective Remediation
Removing a rootkit like TDSS requires specialized tools and a methodical approach. Standard antivirus software might detect the “droppers” (the files that install the malware) or the symptoms, but they often fail to remove the core rootkit hidden deep within the system’s architecture. Security experts typically recommend using dedicated rootkit removal utilities, such as Kaspersky’s TDSSKiller, which is specifically designed to hunt down these deep-seated threats.
Additionally, scanning with multiple reputable anti-malware tools like Malwarebytes and HitmanPro in Safe Mode can help identify and neutralize the various components of the infection. If you are struggling with a similar infection, it is crucial to seek professional guidance from cybersecurity communities. Malware removal forums provide personalized scripts and specialized instructions that can safely clean your registry and system files without causing further damage to your operating system.
For more detailed technical support and to see the full discussion on this specific malware case, visit the original source at BleepingComputer.





