Blog Post

Malware Remediation

  • Laya Taheri
  • published date: 2020-06-30 12:52:39

No matter what our profession is, if it is engineering, developing, or any others, if we are using a computer, we are in danger of malware threats. But do we know what malware is? Are we secure enough against malware attacks? Do we know what we should do in the case of facing malware? Are we prepared?

Of course, the answer for many of us is No, unless you are a security expert in the malware analysis area. Panicking is the typical reaction for people when being compromised by malicious software. To broaden the public awareness of malware threats, we will introduce malware, review diverse malware types, and provide possible first-step remediation that would need to be applied immediately.

Malware is an independently executable program that carries malicious codes to launch adversarial intentions on a victim’s system. The purposes of malware includes leaking sensitive information, infiltrating, and locking data. Malware threatens the confidentiality and availability of main security components in an organization or on personal devices.

There are two main steps of actions to be secure against attacks; one step is before the intrusion edge, the other is after an intrusion incident. We should be cautious with network input streams to ensure the cybersecurity protection before any intrusion occurs. In the following, we provide some suggestions that need to be considered before any intrusion occurs:

  • Install well-known antivirus software.
  • Maintain the antivirus protection and ensure it is up to date.
  • Preferably set up a firewall with the proper configuration.
  • Consider safe-browsing while downloading files.
  • Be aware of emails received, which include attachments or links.
  • Double check the email sender identity.
  • Be cautious with file-sharing networks and remote connections.
  • Backup your files frequently.

The required countermeasures that are applied after malware intrusion incidents depend on the type of the intruded malware. Here, we present a brief definition for each malware category along with collected remediation for both before and after the intrusion edge. Malware strategic attack plans are categorized into diverse types of which we present some of the main ones below:

  1. Adware
    Adware displays irritating advertisements frequently, such as opening pop-ups, web browser tabs, and banners.
    Remediation [2]:
    • Using an ad-blocker is helpful to avoid receiving interrupted pop-ups. If a victim accidentally clicks on the offered links by the adware, it can cause drive-by download tricks and the installation of abnormal software. The ad-blocker reduces the likelihood of clicking on the suspected links.
    • Even though free versions of public services are tempting, one should install the premium versions. The paid versions are more reliable and mostly do not bring up advertisements.
    • Always spend a budget wisely on devices that originate from reputable companies. The well-known companies provide security maintenance and customer supports for their products to address any possible after-sale security flaws of their products.
    • If a system is infected by adware, adware removal software should be used to clean any unwanted programs upon the system. As mentioned before, one should purchase a premium, ad-free, and reputed malware removal software, with built-in security
  2. Ransomware
    Ransomware is malicious software that encrypts data and locks the system unless ransomware is paid.
    Remediation [1]:
    • Do not pay the ransomware. By paying this malware, one will reveal credit card data to the attackers, and there is no grantee on their promises to unlock files.
    • Having a backup system that is scheduled to be updated frequently is necessary for digital life. In the case a system is infected by ransomware, the system can restore files from the latest backup version.
    • Most commonly, phishing attacks occur before other attacks in order to trick victims into revealing sensitive information or installing malware. One should never reply to emails and messages with one’s identity and financial information. Even if the call is legitimate, one can always call back to answer the questions after checking the source of the call.
    • Activate the web-based security on browsers. Most of the well-known anti-viruses offer web-security software to scan and filter the content of received emails or downloaded files.
    • Malware mostly exploits vulnerabilities on one of the installed legitimate software in order to intrude into a system. This malware intrusion can be avoided by continually updating programs and the OS with relevant patches.
  3. Trojan
    A Trojan masquerades as a legitimate program in order to gain a victims’ trust and be installed. It has a hidden functionality that operates on a system without consent.
    Remediation [7]:
    • ​​​​​​​Obtain well-known software from legitimate and original resources on the internet. Be cautious when surfing for a third-party installation website or searching for promotion codes.
    • When receiving an attachment, validate the sender identity and IP address. Even if it is the same email address, the email accounts can be spoofed.
    • Update running programs with recent patches released by their original company.
  4. Botnet
    The botnet has a master server that secretly compromises several victims, named zombies under a C&C infrastructure center. Zombies usually are used to launching other attacks such as DDoS, phishing indirectly.
    Remediation [6]:
    • ​​​​​​​​​​​​​​Arrange two-factor authentication (2FA) methods to be secure against internal threats. Setting up a proper firewall on the gateway might not be enough if portable devices have internal access to the network.
    • Boost up the security policy by regulating statements for portable devices inside the gateway.
    • Companies should schedule several cybersecurity training sessions for employees to cover essential security concepts.
    • Keep track of activities inside systems by auditing logs.
  5. Rootkit
    This malware is used on compromised victims to conceal the attacker’s presence and provide a backdoor for continuous unprivileged access. Rootkit alters programs or kernel functions for its malicious intentions, which modifies programs’ binaries and hashes.
    Remediation [3]:
    • ​​​​​​​​​​​​​​Although rootkit tries to hide its identity, there are still some left-behind footprints that can be watched out for. For example, one should investigate strange behavioral reports that state enormous unaware spams sent out from the system. This incident can be a sign of a botnet zombie that is hidden by a rootkit.
    • After installing an OS, immediately use well-known security software that provides end-point protection, such as Tripwire, which monitors alterations on stored hashes of files and directories.
    • Quarantine a compromised system as soon as found out rootkit has infected it and before it propagates more malicious software in the network.
    • Consider memory dumping to analyze the source of the rootkit intrusion and the possible harms that have occurred on the network. With the assistance of a security team, one can conduct an in-depth investigation of the capture memory dumps.
  6. Scareware
    This malicious software displays false warnings that users cannot handle easily.
    Remediation [4]:​​​​​​​
    • Keep a browser automatically updated, which turns on the pop-up blockers.
    • If a person finds a security pop-up interesting, they can always google the advertised security company separately and search for the offerings on its legitimate website.
    • Never click any links on a web page that presents ”found virus warning”; instead, scan the computer separately.
    • Avoid providing personal information to a scareware pop-upU
  7. Spyware
    This malware gathers sensitive information without the user’s consent and sent it to a remote server.
    Remediation [5]:​​​​​​​
    • Use a well-known anti-spyware program. Anti-spyware scans all incoming network data and suspends coming threats to provide real-time protection.
    • In the occurrence of data leakage, companies should announce a public disclosure regarding the breach details and encourage customers to change their passwords immediately.

 

To conclude, the best security strategy is to be prepared by broadening one’s knowledge horizons in malware cyber threats and their remediation. As long as you are ready, you have a better chance of being safe in the digital world.

#Malware-intrusion #Antimalware #Cyber-threats #Adware #Ransomware #Trojan #Botnet #Rootkit #Scareware #Spyware