Virus, Worm | Incident Response
- Malware: Software written for malicious
purpose - destroy data, steal money, annoy users
- Virus: Malware which requires human
intervention to spread - require user to click on the exe, open a document
or visit a website
- Worm: Malware which can spread
automatically - automatically infect other systems in the network -
spreads through plug & play devices
Symptoms
- Unusual Behaviour in
Applications
- System Slowdown/Randomly
Restarts / new software icons/Folder-files Created
- Adware popups / Virus Alerts
- Password Changes/Reset Email
Accounts / for your Bank or Online Accounts
- Surprise Financial Transactions
on your bank Accounts J
TO Do
Detection and Removal
1.
Isolate the system from the rest of the network
2.
Remove temporary files
3.
Look for suspicious file, process, network and
registry values
4.
Identify the file generating the suspicious
activity
5.
Isolate the suspicious file
6.
verify if the file is malicious
7.
Identify the persistence mechanism
8.
Break its persistence mechanism
9.
Delete the malicious files from the system
10.
monitor for suspicious activities (repeat step 3
to step 9)
Steps to Follow (Contact IT
security for below mentioned Software and Advanced Mode)
- Full Anti-Virus Scan Symantec
Endpoint Security 14 .x (manual) - detect known malwares if any
- Scan with Malwarebytes (free
version will work)
- Rootkit Scan - GMER, SpyDLLRemover (helps in
removal of malware DLLs)
- Scan the Infected or Suspicious
file with VirusTotal- Get the name of virus/malware family
- Use Virus Total Scanner Tool for
quick scan
- Check with AV sites with the
detected variant name (McAfee, Symantec for the detected
Malware) - to
understand infection details or for any removal steps
- BHO Scan (System Slowdown) -
Run SpyBHORemover and disable unusable BHOs
- Delete Locked/Hidden/Protected
Malware Files-
Use GMER to delete Hidden Files/Registry Keys - Boot with Backtrack, mount your drives
and delete the files/registry keys (Advanced)
§ Change Passwords of important accounts
- Corporate Email Accounts | Computer Login Facebook, Google, Twitter, PayPal etc.
Tools:
§
Malwarebytes
§
Rootkit Scan using GMER
§
Remove Malware DLLs using SpyDLLRemover
§
Virus Total Scanner Tool
§
Remove BHOs using SpyBHORemover
Verify Threat Report with Symantec/Checkpoint/MacAfee
Websites to check the criticality
In case of full system or
widespread infections,
- System Restore to ‘Right Restore Point’- look at the dates of infected
files and it should give you right date to restore from
- Format and Re-install OS
- clean-up other drives if necessary
- Scan other systems/devices in the
Network
No comments:
Post a Comment