The recommendation from McAfee would be to use the "FakeAlert Stinger", available at the link below.
While the Malwarebytes program does well against FakeAlert, it's propensity to false can be of a concern.
As we are working to improve our detection/cleaning rates, surrounding FakeAlert, please do write back with any problems you might have, and we'll make sure to take care of it for you.
File download: http://community.mcafee.com/message/110862#110862
This is an old post but is relevant to my concern as well. We have epo 4.5/vse 8.7 patch 4 out as well but there are many hijacking malware that is NEVER caught by VSE.
Malwarebytes' Antimalware does find and delete them. Why is that? I was under the impression that VSE does protect against malware....
Any thoughts or comments??
yesterday one of our colleagues caught a rogue antispyware program on his laptop and we think because the trojan launcher was able to pause McShield service (we saw the Service paused entry in Windows log around that time) thereby suceeding in creating the necessary registry entries and performing its file manipulation. We have not blocked stopping of McAfee services for workstations in our Access Protection policies - till yesterday.
This is to illustrate from my part that more could be needed than expecting signatures. As far as Malwarebytes is concerned, I think being a popular program, more users submit issues to them than to McAfee from home or corporate user community...
You should review your access protection settings, increase the heuristic level and that should be enoght.
But if you are infected again the best practice is to upload virus sample to McAfee Labs they will respond and provide you with XDAT.
It is interesting-- it took Malwarebytes, SuperAntiSpyware, and finally TDSSKiller to rid me of a redirect virus that was gradually destroying my stuff (and I had to search out these solutions as a non-techer). I wonder how it gets past McAfee the first time, as well as several things removed by MWB and SAS. Now I scan with all of them, including Microsoft OneCare. The internet used to be such fun, now it's just another thing like housework that has to be kept clean. Sigh.
London stock exchange was affected by this virus so you don't have to worry about haha
Further on from these reports, only last week I found a Windows 7 Pro machine had a TDSS root kit infecting it. The only symptoms were that IE 32bit would not load but 64bit would, Chrome wouldn't go to any site, random blue screens from the intel raid driver and that McAfee VSE 8.8 was totally disabled.
The only reason I found the cause and the cure was that someone posting on another forum had a similar situation with a machine and that it was a TDSS rootkit. In the end I used TDSSkiller from Kapersky to remove it and manually removed the software that came with it 'Anti Malware Doctor'.