Joe, never a problem. While too much information can be overload, as long as you don’t act on something you “think” you understand, there can never be too much information. I prefer to think of non-geeks simply as people who have not received enough info to have earned their propeller beanie.
Can it get to an external drive? Ans: Possibly. Consider it infected. These new worms have all sorts of countermeasures and defense subroutines to assist in their infection and propagation. When an external media is connected to your system, there are system requests that are made, to connect the device to the USB hub, to mount the volume and provide it with a drive letter, etc. All these can be tagged in the kernel by malware to give it a heads up that something has been added and that it should investigate to see if it can infect something there to extend its reach.
Does this mean you are already hosed if infected? Ans: Not necessarily. One nice thing about external media, especially USB hard drives, is that just because they may boot within the USB inclosure, doesn’t meant that they can force something through the cable to your system to run. However, don’t assume that it can’t either. NEVER underestimate the ability of malware to to be smarter than you. (no offense) In this case, you can backup all your data to an external device (preferably a SECOND device to avoid infecting your current backup if it isn’t already) wipe your system and do a clean install. Once up to date with all your patches and a couple of GOOD anti-malware programs (My current arsenel: Avast Antivirus, MalwareBytes, SuperAntiSpyWare) that have the latest definition files, you should be roughly 98% safe in connecting your infected drive to the system. With adequate protection, even if the malware tries to bootup, your clean system should be able to defend itself. Even if it can’t, the latest definition files should ensure that the system will at least recognize that it has been compromised. This is the point where you NEED to take it to a qualified technician who can boot a system and ensure that your drive is NOT booting, that it is just a “dumb” data drive. Then they can run their own cleanup utilities and disinfect you files. Just keep in mind, if the infection is that deep, there is the possibility that some files may be SO infected that the only recourse is deletion… you did have multiple backups, right?
Can it gain access to my favorites/bookmarks? Depends. You give the appearance that you are using AOL, correct? I never did get on that particular bandwagon and therefore cannot give you a 100% accurate answer to that. However, I would assume that if the malware is deeply hooked into your system kernel, then it has access to anything you have access to. This is the main reason why every security-aware person will tell you DO NOT RUN AS AN ADMIN. If you can make changes to your system, so can the malware when it tries to run. Again, I would perform a full system restore and only after getting your system back to operation would I log into anything sensitive. Do you have passwords stored locally by your browser? That could be a problem as there have been security flaws in that process before. At one time IE stored all that information locally in a NON-encrypted text file. Guess how much power it took worms to crack that egg?
If I get a new hard drive to I have to reinstall everything? Ans: No, technically you could ghost everything over to the new drive. Having said that, DON’T DO IT!!! If you are going to pop for a new drive… 3-4terabyte drives can be gotten from Newegg for as little as 100-120… then you might as well go through the process to do a complete full CLEAN install of all your software. If you have a factory made system (HP, IBM, DELL, etc) then somewhere you have the recovery discs which will place a factory image of all the software including the full windows installation onto your drive. However, this MIGHT possibly be tied to the hardware and MIGHT not work with a new drive. This is a slim chance, but still possible. If this was a custom system from a local dealer or one you built yourself then you should still have all the discs for the software and will only need to spend the time to do the work. Its long and boring, but building a system yourself can have a serious “hey I did that” cool-factor that is worth a lot more than you save by having someone else build it for you.
Op. Ed.:
Okay, now that I answered your questions, keep this in mind: a) if you have NO tech experience, trying to disinfect a deeply rooted malware is a painful task which can actually hose your system if not done EXACTLY right. If you don’t feel comfortable with the possibility of turning your desktop into a paperweight, then I’d seek out someone local to do teh work. It will cost several dollars more than you doing it, but as long as they are reliable, you will have a full working, clean, trustworthy system when they are done.
It is that factor of trust that I value the most. I’ve occasionally hit up a “file blocked” screen from my antivirus. That I’m okay with. What worries me is when it starts acting weird. At that point, its time for the “nuclear” option of formatting and reinstalling windows and my software. Because once you are infected, its very hard to disinfect, and you can never be 100% certain it didn’t leave some little backdoor or trojan code behind that will come back to bite you in a few weeks. Its just not worth the worry.
Two years ago or so I got hit with just such a bug. It took me days just to get a handle on the bug’s identity. It then took me a week of hacking my registry and manually reinstalling uninfected DLL files from the windows install discs to just be able to get my antivirus program able to run. It updated and removed the infection. I rebooted to do a full boottime scan… and immediately got a blue screen of death. Some of teh files infected so deeply my AV had no choice to just delete them. Out came the old DOS F-bomb: Format c: /sys I ended up using that as an excuse to build a new quad-core system, which has since been upgraded to a hex-core chip. Only time malware ever did me a favor, lol.
Keep us advised of whats going on.