Virus, Worm | Incident Response
- Malware: Software written for malicious
     purpose - destroy data, steal money, annoy users
- Virus: Malware which requires human
     intervention to spread - require user to click on the exe, open a document
     or visit a website
- Worm: Malware which can spread
     automatically - automatically infect other systems in the network -
     spreads through plug & play devices
Symptoms
- Unusual Behaviour in
     Applications
- System Slowdown/Randomly
     Restarts / new software icons/Folder-files Created 
- Adware popups / Virus Alerts 
- Password Changes/Reset Email
     Accounts / for your Bank or Online Accounts
- Surprise Financial Transactions
     on your bank Accounts J
TO Do 
Detection and Removal
1.      
Isolate the system from the rest of the network
2.      
Remove temporary files
3.      
Look for suspicious file, process, network and
registry values 
4.      
Identify the file generating the suspicious
activity
5.      
Isolate the suspicious file
6.      
verify if the file is malicious
7.      
Identify the persistence mechanism
8.      
Break its persistence mechanism
9.      
Delete the malicious files from the system
10.  
monitor for suspicious activities (repeat step 3
to step 9)
Steps to Follow (Contact IT
security for below mentioned Software and Advanced Mode)
- Full Anti-Virus Scan Symantec
     Endpoint Security 14 .x (manual) - detect known malwares if any
- Scan with Malwarebytes (free
     version will work)
- Rootkit Scan - GMER, SpyDLLRemover (helps in
     removal of malware DLLs)
- Scan the Infected or Suspicious
     file with VirusTotal- Get the name of virus/malware family
         - Use Virus Total Scanner Tool for
quick scan
- Check with AV sites with the
     detected variant name (McAfee, Symantec for the detected
     Malware) - to
     understand infection details or for any removal steps
- BHO Scan (System Slowdown)  - 
     Run SpyBHORemover and disable unusable BHOs
- Delete Locked/Hidden/Protected
     Malware Files-
     Use GMER to delete Hidden Files/Registry Keys -  Boot with Backtrack, mount your drives
     and delete the files/registry keys (Advanced)
§  Change Passwords of important accounts
- Corporate Email Accounts | Computer Login Facebook, Google, Twitter, PayPal etc.
Tools: 
§ 
Malwarebytes 
§ 
Rootkit Scan using GMER 
§ 
Remove Malware DLLs using SpyDLLRemover
§ 
Virus Total Scanner Tool
§ 
Remove BHOs using SpyBHORemover
Verify Threat Report with Symantec/Checkpoint/MacAfee
Websites to check the criticality 
In case of full system or
widespread infections,
-  System Restore to ‘Right Restore Point’- look at the dates of infected
     files and it should give you right date to restore from
- Format and Re-install OS
                - clean-up other drives if necessary
- Scan other systems/devices in the
     Network
 
 
 
No comments:
Post a Comment