-
Viruses, Worms, and Trojans
-
General System Protection Guidelines:
- Install anti-virus and anti-malware software, update it regularly, or allow it to auto-update, and schedule periodic automatic scans.
- Ensure your computer applications and OS have the latest updates available. If possible, enable automatic updates.
- Enable and update your software-based firewall.
- Deploy and configure a hardware-based firewall.
- Use separate hard drives for the OS and data.
- Encrypt important data. Windows Encrypting File System (EFS) can perform this function.
- Perform periodic (weekly or bi-weekly) system backups.
- Take periodic snapshots of the OS state.
- Install and use a File Integrity Checker (FIC).
-
Malware Removal:
- Identify malware symptoms.
- Quarantine infected systems.
- Disable System Restore (in Windows).
-
Remediate infected systems:
- Update anti-malware software.
- Use scan and removal techniques (for example, Safe Mode and pre-installation environments).
- Schedule scans and run updates.
- Enable System Restore and create a restore point (in Windows).
- Educate end users.
-
Virus, Worm, & Trojan Indicators of Compromise (IoCs):
- Computer runs slower than usual.
- Computer locks up frequently or stops responding altogether.
- Computer restarts on its own or crashes frequently.
- Hard drives, optical drive, and applications are not accessible or don't work properly.
- Strange sounds occur.
- You receive unusual error messages.
- Display or print distortion occurs.
- New icons appear or old icons (and applications) disappear.
- There is a double extension on a file attached to an e-mail that was opened; for example: .txt.vbs or .txt.exe.
- Antivirus programs will not run or can't be installed.
- Files have been corrupted or folders are created automatically.
- System Restore capabilities are removed or disabled.
-
Adware and Spyware
-
Spyware System Protection Guidelines:
- Use and update anti-spyware programs such as Windows Defender.
-
Adjust web browser security settings:
- Disable or limit cookies
- Configure trusted traffic zones
- Turn on phishing filters
- Restrict unwanted websites
- Turn on automatic website checking
- Disable scripting such as JavaScript and ActiveX
- Clear the browser cache on exit
- Uninstall unnecessary applications and turn off unnecessary services.
- Educate users on how to surf the web safely. User education is the number one method of preventing malware!
- Don't click OK or Agree to close a window; instead press Alt+F4 on the keyboard to close that window, or use the Task Manager to close out of applications.
- Be wary of file-sharing websites and the content stored on those sites. Be careful of e-mails with links to downloadable software that could be malicious.
- Consider technologies that discourage spyware. Use a browser that is less susceptible to spyware, and consider using virtual machines.
- Verify the security of sites you visit by checking the certificate.
-
Spyware Indicators of Compromise (IoCs):
- The web browser's default home page has been modified.
- A particular website comes up every time you perform a search.
- Excessive pop-up windows appear.
- The network adapter's activity LED blinks frequently when the computer shouldn't be transmitting data.
- The firewall and antivirus programs turn off automatically.
- New programs, icons, and favorites appear.
- Odd problems occur within windows (slow system, applications behaving strangely, and such).
- The Java console appears randomly.
-
Troubleshooting Spyware:
- Disconnect the infected system from the Internet.
- Uninstall the malware from the Control Panel or Settings
- Scan your system with Anti-Virus software - in Safe Mode, if possible.
- Scan your system with Anti-Spyware software.
- Verify that your Hosts file (C:\Windows\System32\drivers\etc\Hosts) has not been hijacked, and that no sites have been added to the list of trusted sites.
-
Rootkits
-
Detection:
- If you believe a machine has been infected with a rootkit, do not rely on the OS to detect it.
-
Often, the only way to detect a rootkit is to to use removable media
- Boot from a USB or CD
- Use a Rescue CD such as Hiren's Boot CD.
- Because of the difficulty involved in removing a rootkit, often the best solution is to reinstall all software on the machine.
-
Wipe
- Back up the data (if possible).
- Flash the UEFI/BIOS.
- Reinstall the OS.
- Check the system for after effects.