DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Malware 10 minute presentation
1. Roswell• GA • (770) 993-5428
www.TeamLogicIT.com/RoswellGA
The TeamLogic IT difference
Your Technology Advisor
2. TeamLogic IT difference …
We are Technology Advisors
Our mission is to make the
technology used by Small and
Medium businesses BE their
competitive advantage
3. What is malware
Malicious + software
Software that is designed to do bad
things
Includes: Viruses, Worms, Bots,
Zombies, Trojan Horses, Rootkits,
Spyware, Keyloggers, Scareware,
Ransomware and more!
4. Viruses and Worms: the Contagious Threat
Spread without users knowledge
Infected DVD/CDs, thumbdrives, etc.
Spread by running a program
Designed to do damage!
Can be proactively stopped with good
antivirus software
5. Bots and Zombies: the Captive Threat
Infected by running a program
Bots make PCs deliver illegal data
Zombies create DDoS attackers
Designed to do no harm to host
Detection only after user notices
problem
6. Trojan Horses and Rootkits: the Masked Threat
Designed to be hidden while attacking
Trojan Horses bring in bad malware
Rootkits is a masking technique that
prevents detection and removal
Designed to trick you into a purchase
Detection only by frequent scanning
7. Spyware and Keyloggers: the Financial Threat
Designed to steal IDs and passwords
Spyware tracks visits and actioins.
Might tie into webcam
Keyloggers will copy keystrokes to
steal passwords or account numbers
Designed to steal your identity
Detection after data has been stolen
8. Scareware and Ransomware: the Existential Threat
Designed to extort money with threat of
destruction of data
Scareware=threat. Ransomware’s=real.
Triggered by running a program when
opening a email attachment
Quick action can mitigate damage.
Might have to pay ransom of ~$400!
9. Self-help limitations
Steps assume light infection of nuisance malware.
Go to a professional if any of the following:
Scareware or Ransomeware
Conduit malware – lots of demanding popups
So many popups that you can’t do work.
Excess usage or activity
Identity theft
You don’t have 6-10 hours to work on problem.
10. Generic Steps to Disinfection
Remove unknown and unwanted programs
Use Antivirus and Antimalware to clean
Remove unknown and unwanted add-ons and
configurations from all browsers
Remove extraneous files from system
Update system, utilities, programs
Put process in place to proactively protect
11. Removing Programs
Open Control Panel and select Uninstall
Programs. Remove unknown programs
Tricks and tips
Sort by date. Pay attention to newer installs
and clusters
Sort by publisher.
User Internet to learn about publishers and
programs
Remove toolbars and unneeded programs
Reboot whenever requested
12. Antivirus and Antimalware programs
Install good AV and AM
You can only have ONE Antivirus program installed
Replace MSE or Defender
Replace expired pro versions
Avira and Bitdefender are decent free AV programs
MalwareBytes and Spybot Search and Destroy are
decent Antimalware programs
Update programs, immunize, setup schedules
Run AV and AM programs
Run one at a time
Fix all issues
Reboot as requested
Run additional times until clean
13. Clean ALL Browsers
Depending on browser, click on configuration,
settings or Internet Options
Reset opening page
Remove all search engines except for one.
Review add-ons and extensions.
Reset security options to default
Reset Pop-up blocker
Remove temporary files
Remove cookies
14. Remove extraneous files
Remove temporary files
Remove unused programs
Use Disk Cleanup (Windows Program)
Run on each hard drive
Check each option
Use CCleaner from Piroform
Run Cleaner to remove files
Run Registry to fix issues
15. Update System
Update Windows
Important and Optional
Include Microsoft Office
Update Java
Go to Java.com
Might have to repeat with each browser
Set to check monthly
Update Adobe Reader
Go to Adobe.com
Set to check monthly
16. Proactive Protection
Check Microsoft Updates
Check on Wednesday or Thursday
Most updates released Tuesday night
Run Ccleaner and/or Disk Cleanup
Run monthly
Run after software updates, installs or removal
Verify AV is running automatically
Check every other week
Check AV logs
Scan for Malware
Weekly
17. Proactive Protection – great ideas
Backups
Verify that backups are working
Try to restore a file from previous day
Check cooling fans
If dusty, turn off computer, unplug and blow out dust
Remove unneeded cables
Keep area neat. Curl up extra cable lengths
Check for frayed or pinched cables.
Replace old Backup Batteries (UPS)