That's odd. Maybe a random port scanner.
Or a rogue Windows user from this forum.
Lol JK, JK
Whatever it was, it ran in stealth because my network monitor showed zero packets being sent, then again I think it attacked it because it showed zero packets being sent/received when I was transferring data over the network. I also sit behind NAT with no ports forwarded to it, except for one random one for a torrent client. Other than that, no remote hosts can connect to my machine.
My grandmother has a laptop with Windows XP SP3 on it and the default Windows firewall active. It has no AV or extra firewall yet she can manage to use her computer without any virus problems.
Ditto for my mom, my aunt, my brother, my cousin, and two friends, all who have computers built by me. All the computers have no AV software other than a couple of them who I know would go to some bad websites and would probably download stupid stuff, all of them use firefox as well.
I consider XP being quite un-safe after seeing how the security in Vista and 7 work yet it does just fine. Of course, their systems are fully patched which helps but I have taught them all about email scams and that if they don't recognize a site to just leave it. I have yet to see a website that will just throw a virus onto my computer without firefox ever telling me that something is trying to download. Advanced computer users are more vulnerable to viruses because they think that knowing alot about computers will help them and it gives them a false sense of security, I am a victim of it too but I know the basic precautions following an infection, the most important one being to never restart the computer if it is infected until it has been cleaned.
I do have a friend with an iBook G4, nice little machine yet I have had him call me just as many times about something wrong with it as any of the other people that use me as their personal tech support that have PCs. Now its not a lot, none of the call me all that often, if at all, but it has its own little problems like everything else.
I really don't think you can parallel this to your grand ma or mother using a computer. This is something that is new that attacked my machine by me going either to a site that was infected or somehow transferring it myself with out knowing. Like self propagating viruses that attach them self to thumb drives and me working IT for a living my thumb drives get whored out to a lot of different machines, machines I don't use at all. other people's machines.
So considering I have no remote desktop ports open, and even ssh access is not forwarded to any computer except my Mac on my network, I would rather think I know what I am doing.
What I contracted there is no defense against, that is what I am saying. If it copied itself in stealth mode and my AV software has no definition for it then there is nothing I can do.
I am fairly sure where I got it from too, and if I am right it is from a legit website that was spoofed or hacked, or perhaps it was some sort of super buggy software that they wrote that just acted like a virus. The last thing I downloaded was a codec for WMP from a legit site that offered web based training on computer technology. I was downloading a training video that had DRM (since you gotta pay for it) from an online training company, which many people use, and it was WMP only because they were using windows DRM to protect the file. I had to download a DRM license, which was questionable. They distribute them through torrents though, which means it could have came from god's knows who's machine on the internets. It comes in an encrypted disk image and the other training videos I have downloaded have been good quality.
I have contacted the site and their support team is looking into it. It may have just been crappy written software.
However, the fact remains you can set up your home network from the router on with firewalls, NAT, using non standard ports and such and still get infected with Windows. Now if it were any other OS and it wanted to install itself, it would prompt me for my admin credentials and when that happens I immediately investigate what that package does.