Pinterest Stumbleupon Whatsapp
Ads by Google

If you’ve ever been on the receiving end of a malware attack 10 Steps To Take When You Discover Malware On Your Computer 10 Steps To Take When You Discover Malware On Your Computer We would like to think that the Internet is a safe place to spend our time (cough), but we all know there are risks around every corner. Email, social media, malicious websites that have worked... Read More , you’ll know that it can be frustrating and time consuming to remove the infection and repair your system. Manual removal requires downloading a removal tool and booting into Safe Mode, and in extreme situations can require you to completely reinstall (or restore from a backup) your operating system.

Not nice.

While we would advise strongly in favor of a security suite that has the ability to scan for malware, not all suites are created equal. It’s easy to lapse and forget to run something like MalwareBytes Anti-malware, but even with security and anti-malware software installed, it is still very important that you are able to spot malware activity on your PC, and employ the right tactics to remove it.

How to Spot Malware

When malware is infecting your computer, you won’t know anything about it… at first, anyway.

Once the pop-up windows start appearing, your browser gets some surprising new features and performance on your computer grinds to a halt, however, it will become apparent that something else is going on. This video summarizes well:

Ads by Google

You should also look out for erratic mouse activity, which can betray unauthorized remote control (did you speak to a “Windows Support” scammer Anatomy of a Scam: The "Windows Tech Support" Con Examined Anatomy of a Scam: The "Windows Tech Support" Con Examined They're constantly on the prowl: cold calling scammers claiming to be from "Windows Tech Support". We were targeted by one of these con artists and here's what happened. Read More ?) of your machine, as well as a storage drive that is rapidly running out of space.

Be Aware of and Spot Keyloggers

Keyloggers come in two flavors, hardware and software. Hardware keyloggers can be devices that sit between the keyboard cable and your computer, or even small USB devices that simply detect and record what you’re typing (typically used on laptops).

Here’s an example of a hardware keylogger being installed:

It’s unlikely that an online criminal or scammer would use a hardware keylogger; rather, this is more the tactic of security/law enforcement services, or an employer if you’re using a work computer. Hardware keyloggers are comparatively easy to spot and can often be manually removed.

Software keyloggers, meanwhile, hide on your drive and record your keystrokes, enabling remote cyber criminals (and, let’s face it, security services) to detect what you’re typing. If you suspect that a keylogger is being used against you, you’ll need to remove it with a professional tool or do so manually, but before you do check that your suspicions are correct…

If this is an attack vector that concerns you, then you should take steps to block keylogging software Don't Fall Victim to Keyloggers: Use These Important Anti-Keylogger Tools Don't Fall Victim to Keyloggers: Use These Important Anti-Keylogger Tools In cases of online identity theft, keyloggers play one of the most important roles in the actual act of stealing. If you’ve ever had an online account stolen from you - whether it was for... Read More .

Make Sure You Use Malwarebytes Anti-Malware Free

If you’re not already using it, there is one app that you should install to make sure that any malware on your computer is detected, and removed. That software is Malwarebytes Anti-Malware, which we mentioned above.

In the overwhelming majority of cases, this single utility will sort out Trojans, keyloggers, adware, spyware, and even worms. And it does all of this with minimal input from you, the user, as demonstrated in this tutorial video.

Two versions are available (premium and free), but the free release is all you need to detect and remove malware on your PC. Head to www.malwarebytes.org/mwb-download/ to grab your copy. Malwarebytes Anti-Malware is also available for Mac OS X and Android.

Go Hardcore: Destroy Really Nasty Malware

Not all malware is created equal. While some is relatively easy to dispose of (so simple that your antivirus software can handle it) there is some really insidious infections out there that can wreak havoc on your PC.

While it’s easy to suggest that you stay away from websites where such malware can be picked up, not all of it travels from the web. Some malware can spread via email or flash storage, for instance, and we’ve recently seen that some ad networks (such as Yahoo!) are less secure than they would have you believe.

For the really nasty malware, check out this video which explains how to kill virtually any infection thanks to a collection of excellent tools, among them SUPERAntiSpyware (our SAS review SUPERAntiSpyware Is A Vital Tool In The Fight Against Malware SUPERAntiSpyware Is A Vital Tool In The Fight Against Malware Read More ), Kaspersky TDSS Killer, REVO Uninstaller and CCleaner. For something you can read, meanwhile, our malware removal guide The Complete Malware Removal Guide The Complete Malware Removal Guide This malware removal guide outlines not only how to remove malware from your computer but also how to clean up the mess that viruses and malware leave behind. Read More should prove very useful.

Your Antivirus Suite is Not Enough

All of this is heading, of course, to the assertion of a fact that many computer users continue to be unaware of: the vast majority of antivirus software is quite incapable of handling non-virus malware.

Malware is usually designed to infect and subvert your computer, sending spam or stealing passwords. As you may have gathered, Trojans, keyloggers, worms, and rootkits are all types of malware.

Viruses, meanwhile, can be classed as a subset of malware, and are malicious programs that spread by infecting files – which is why they are called viruses.

Often the terms are interchangeable, which is why there is often confusion about this, although we’ve put together a guide to help you identify types of malware Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats When you start to think about all the things that could go wrong when browsing the Internet, the web starts to look like a pretty scary place. Read More . What you really need to know is that you need more than a standard antivirus tool to deal with malware, just as you need to be able to recognize when your system is being subverted by online criminals.

Been hit by malware but missed the signs? Suspect something is up with your PC now? Tell us in the comments.

  1. A41202813GMAIL ..
    August 24, 2015 at 10:17 am

    Live And Learn.

    How To Spot Malware, In Your PC, In The Future:

    A - Start In Safe Mode,

    B - Login As An Administrator,

    C - Rename All .EXE Files, On The System Drive, With A Specific Signature Combination Of Upper And Lowercase Characters,

    D - Logout And Login Normally,

    E - Regularly Open The Task Manager And Check If All Open .EXE Files Are Complying With Your Chosen Signature.

    This Is A Low Tech Solution, But It Works.

    Of Course, When You Upgrade Your Browser(s), Or Install New Software, You Must Repeat From ( C ) Onwards - Or ( B ), Or ( A ), As Necessary.

    Cheers.

  2. jimjocker
    August 20, 2015 at 5:56 am

    Hi Thank you for covering this issue, as it is always important.

    I don't want to go into protection of your system, since your article is about handling an already infected system. Maybe you want to complement that or add a link to an article covering the topic.

    Two things on my mind, and I feel need to be made clear.

    “the vast majority of antivirus software is quite incapable of handling non-virus malware” I just could not overread that. Technically true, but most “Antivirus” software nowadays have long changed to being antimalware products and often enough emphasized this by changing their name to something like “Internet Security” or “Security Suite”, providing protection against all malware types mentioned in your article, also covering browser security, adware protection etc.

    Also, if I am not mistaken, Malwarebytes free does not have on access detection, so any detection may only happen when a manual scan is performed. Therefore, it should be made clear it is not a suitable replacement for a full “Anti Virus” (or Security Suite if you prefer) product. One might miss read that paragraph to only use the Malwarebytes free.

Leave a Reply

Your email address will not be published. Required fields are marked *