The Anatomy of a Malware Infection

by: COMMANDER ENTERPRISE
graphics by: dixiewhiskey design studios

Any random smartphone, tablet or personal computer can become malware-infected through different, unassuming backdoors and forced entrances to the device.

This anomalous, malicious type of software (Mal + Ware) are the bad guy versions that do background damage by implanting their app and growing in the device to take control, or to receive commands from a remote location.

From there they can also make changes to the device, mess up registry and program files, infect other drives and also steal information. Accounts can be cracked open to retrieve personal data, confidential files, and financial information – and anything that is saved on the hard drive. It already sounds like a nightmare of a problem to deal with, and we’re just at the tip of the iceberg here.

In order to understand what it does and how it ends up on the computer or mobile device, we must understand where it usually comes from, how we get fooled into installing it, and the basic steps we could do to counter it.

There are certain ways how it does this, how it breaks down the device. There are also certain steps to overcoming it, and it has to be done as soon as possible to prevent it from reaching other parts of the system. And all of these can be done immediately at no extra cost but with some effort. It only involves some vigilance, careful monitoring and browsing, and avoidance of all possible avenues.

Computer Health Warning Signs

The Internet is the primary “highway” where malware travels, turning to sharp lefts and rights to attach themselves to devices whenever a computer, smartphone, or tablet unknowingly downloads it. It will usually be in a form of an unassuming program that presents itself as a needed program, app, patch, or update, so that it creates the need to download and install. In some cases, it can also pose as a legit app in place of the original thing, or as part of a licensed and official data source or program, but hidden to do stuff in the background. It may not do actual damage, but may get sensitive information, and later open the device to vulnerabilities that can lead to the bad stuff.

This is their usual entrance – via backdoors, i.e. unexpected installations, checking seemingly innocent webpages, or activating content that has viruses or malicious apps hidden. These are all popular in social media links, torrents, or app downloads, where they are easily shared and spread, and even in some seemingly normal active content or links, such as legit programs or innocent discs or other sources of content officially released by a normal reputable company.

Among some of the cool things these bad boys do are interrupt the computer’s processes, slow it down, throttle the internet connection, steal or destroy files and program files, even use it to perpetrate more online crime, and many other wonderful things the creators (hackers) have cooked up in their imagination.

From there, files can be stolen or destroyed, data and personal information compromised, and sometimes accounts completely taken over. And a lot of this is time dependent, because as long as it is unchecked, it grows worse.

Some of these are cleverly hidden and disguised, while some are obvious and are easily thwarted. But things can be inconsistent at times, and eventually, someone will automatically click on a link, go to a malicious webpage, or worse, install an app that turns out to be a nasty virus, spyware, or self-replicating virus even, among many other types. It’s like a jack in the box mystery surprise, one that kills the computer or device. Some of the components of the device that are greatly affected by this activating virus are the registry, operating system files, and main program files, crucial elements that operate majority of the computer’s or device’s processes.

A word of advice: not all malware is underground and cleverly hidden. Some of them may not do damage per se on the computer or device but its operation would lead to it. It could simply be an unwanted and unknowingly installed program or component of an otherwise legit program, app, software, disc, or installation that does tasks in the background. And while it scans information and operates in the computer, it opens it up to vulnerabilities that can lead to intrusions and infections without the owner even knowing it because it is not declared on the software that was installed or the disc used. This delays any prompt action to prevent widespread infection and more hidden damage.

Diagnosis, operation, recovery, maintenance

To prevent this kind of activity, it is imperative that an anti-virus program and a registry monitoring program in the device are both active, running, and up-to-date.

The anti-virus tracks down malicious apps and viruses, and is able to delete them, or quarantine them in case a cure hasn’t been found yet, or a better workaround is still being set-up. The monitoring program can easily fix the registry and program file errors and inconsistencies to prevent them from becoming serious issues.

There will also be telltale signs such as sudden slowdowns, freeze-ups, improperly functioning programs, malfunctioning USB ports, or worse, compromised files, and compromised accounts. At the onset is where it should be stopped, and some of the telltale signs will give a good initial indication of something wrong. These indicators usually follow any suspicious online activity, an installation of a third party software or app, or when dealing with new data sources of any type, whether it is an infected USB, hard drive, or even hidden malware from other types of media.

Once infection is confirmed after these telltale signs, it is time to go to work – immediately: uninstall any very recent apps or programs that led to the malware, then delete the source from the security app. Analyse and clean up the system from errors using the registry monitoring program. Common apps like Microsoft Security Essentials and CCleaner can easily do this without any money involved.

It is also highly recommended to reboot the computer in safe mode and run an anti-virus scan and then a registry and junk cleaning to make sure it is wiped out. Another scan is needed to confirm a complete cleaning. After this, apply the same to any USB drives, hard drives, even Cloud drives recently used. The same goes for emails and recent downloads, including temp and cache files from all internet browsers used. This is to safeguard any re-occurrences from any remnants of the malware.

From here on, a few things to take note after the infection: any and all downloads must be confirmed twice for authenticity and source, and if it is really needed. However, this might be trumped over and eventually fool a user enough to download and install the malware with his or her unknowing permission. The way they present themselves is really tricky, and would pose as a harmless file to gain the trust of the user. And also, again, think twice, thrice before installing, clicking and downloading.

If that thought makes one lazy, just think of not having a computer, smartphone, or tablet for the next few days. And all the bad, migraine-inducing stuff that comes with it (all written above). Who wants that?

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.