Blog Post

Useful Tips to Remove Malware from a Local Network

Chantel Van Niekerk • May 31, 2018

 

Last year, several South African companies’ systems were infiltrated by cyber-attackers. Many companies in South Africa are reported to have inadequate defenses and are highly vulnerable to cyber attacks. Here are some useful recommendations to remove malware from a local network put together by one of Risk Diversion's own Investigators.

 

 

 1.  Quarantine the network:

 

It is important to immediately disconnect the local network from the Internet once malware has been detected. This is to prevent further infection from an external source, or malware connecting to external sites.

 

 2.  Close all suspected ports:

 

Once the malware infecting the network has been identified, you should start blocking all ports used by the malware. There are various sources that can be used to determine which ports to close based on the malware identified. Submitting a sample for analysis or checking the malware hashes on sites such as VirusTotal can help you determine the type of malware that you are dealing with. Just to be safe, we recommend that you use a clean machine isolated from the network to close the ports.

 

 3.  Scan all computers:

 

Scan all of the computers with a trusted antivirus that has the latest database updates. In the case where some workstations do not have the latest updates, updates should be transferred and installed via removable media. If the antivirus cannot detect the malware infection, a sample should be sent to malware specialists for analysis.

 

To track down the malware’s executable files, one can look at several traits, such as network traffic (malware files usually generate a large amount of network traffic and also occupy a lot of system resources), Windows System folders, orin the System Registry to identify the start-up keys for the malware files.

 

 4. Quarantine infected computers

 

After scanning the computers with reputable malware removal tools, infected files should be detected and quarantined. You will then be able to safely remove all of the quarantined files. Always double check the quarantined files to avoid deleting important content.

 

 5.  Restart computers

 

After the files have been quarantined and deleted, restart the computers that have been infected and scan them again to make sure that all of the infected files have been removed.

 

 6.  Disable System Restore

 

In the case where some infected files ended up in the System Restore folders, it is necessary to temporarily disable System Restore and restart the computer to make sure the infected folders are removed.

 

 7.  Install a Firewall (if necessary)

 

If not already installed, install a firewall on the Internet gateway or on all workstations and configure it to block any ports used by malicious software(except for commonly used ports, such as port 80, which is used for normal internet connections).

 

 8.  Install Security Updates

 

To prevent future infections, make sure that the latest security updates, patches and service packs are installed on all workstations.

 

 9.  Change Passwords for Shared Resources

 

Some malware can spread to network shares whereas other types, such as Trojans, can intercept passwords. It is important to change passwords for shared network resources and important applications after a malware infection.

 

 10.  Reconnect Local Network and Internet Access

 

After ensuring all of the infected files have been removed, you can re-connect the computers to the local network and enable the Internet connection. Continued monitoring of network traffic is recommended in order to prevent re-occurrence of the event.

 

Risk Diversion Blog

By Vernon Fryer November 28, 2024
Looking at the growth of IoT (Internet of Things) in Digital Forensics
By Vernon Fryer November 15, 2024
Incorporation of digital evidence in crime investigations
By Vernon Fryer November 14, 2024
An Introduction by Risk Diversion
By Vernon Fryer August 1, 2024
Cyberbullying - causing harm through the use of digital technology
By Francois van Staden June 28, 2024
Magnet AUTOMATE with brilliant features
By Vernon Fryer June 10, 2024
Conducting digital forensics investigations using cloud-based services
By Vernon Fryer May 24, 2024
Delving further into Mobile Forensics
By Vernon Fryer May 13, 2024
Exploring the complex and fascinating world of Speech Analysis
By Vernon Fryer May 6, 2024
Digital Forensics in Aircrafts
By Vernon Fryer April 29, 2024
The superhighways and byways of cyber space has enabled millions of IoT devices to be connected to the internet.
More Posts
Share by: