Does Your Computer Have A Malware Infection?

malwareToday we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.

Visual Symptoms

These are signs that you will see on your computer display, and are the most obvious symptoms.

  • Ransomware  – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
  • Fake Security Pop-Up – I haven’t seen this exploit for a while, but the fake tech support gangs are using it again.  If you get a security pop-up that asks you to call a phone number, these guys are fakers, and after they take control of you system, you can expect to be infected.
  • Search Redirects – In this case your default search engine, such as Google, Bing, Yahoo, is replaced with an impostor search engine.  Your search results link out to obscure website that are not what you are looking for.  Your search engine settings have been changed by a malware exploit.
  • New Home Page – Did your home page change recently?  This is often an indication of a browser malware exploit
  • New Icons – New icons appear on your desktop whenever you install a new program.  Sometimes malware installations do the same thing.  I’ve seen desktop links that clicked away to pornography or pharmaceutical sites in the past.  There is a high likelihood that there is more malware installations for your computer when you get there.
  • Pop-ups – We already discussed fake security pop-ups, but other pop-ups can indicate malware as well. Especially if it is a pop-up storm that opens new windows when you close an existing one, or when pop-ups open that you find you can not close at all.
  • Undeliverable Email – If you are getting a lot of returned, bounced, or undeliverable email, this can indicate that your computer or email account is being used to send spam.  Spamming software is usually installed to many computers in a bot-net.  All of these systems have malware, and lots of it, including remote access Trojan horse programs, and command and control software.

Friday we will look at other symptoms, and some solutions.

0

About the Author:

I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.