So how did I get infected in the first place?
[from original article by Tony Klein
You usually get infected because your security settings are too low.
Here are a number of recommendations to help tighten them, which will hopefully make you a less likely victim:Safe Computing Practices1.) Keep your Windows updated!
2.) Watch what you download!
- Go to Start > Windows Update or navigate to HERE, and install ALL Critical security updates listed (you will need to use Internet Explorer to do this). If you're running Windows XP, that includes Service Pack 2 (SP2) do not install SP3 until your system is clean.
- If you are running Vista, be sure to install SP2
- If you suspect your computer is infected with Malware of any type, please do NOT install any updates yet. Read the SpywareHammer FAQ and post a HijackThis log in our forums to get help cleaning your machine. Once you are sure you have a clean system, it is highly recommended to install SP3 (or SP2 for Vista) to help prevent against future infections.
- It's important always to keep current with the latest security fixes from Microsoft. This can patch many of the security holes through which attackers can infect your computer.
- Please either enable Automatic Updates under Start > Control Panel > Automatic Updates, or get into the habit of checking for Windows updates regularly.
3.) Avoid questionable web sites!
- Many "freeware" programs come with an enormous amount of bundled spyware that will slow down your system, spawn pop-up advertisements, or just plain crash your browser or even Windows itself.
- Peer-to-peer (P2P) programs like Kazaa, BearShare, Imesh, Warez P2P, and others are amongst the most notorious. If you insist on using P2P software, please read this article from MalwareRemoval.com for information on Clean and infected P2P Programs.
- Note also that even if the P2P software you are using is "clean", a large percentage of the files served on the P2P network are likely to be infected. Do not open any files without being certain of what they are!
- Many disreputable sites will attempt to install malware on your system through "drive-by" exploits just by visiting the site in your browser. Lyrics sites, free software sites (especially ones that target young children), cracked software sites, and pornography sites are some of the worst offenders.
- Most of these drive-by attempts will be thwarted if you keep your Windows updated and your internet browser secured (see below). Nevertheless, it is very important only to visit web sites that are trustworthy and reputable.
- In addition, never give out personal information of any sort online. And never click "OK" to a pop-up unless it is signed by a reputable company and you know what it is!
- For more general information see the first section, "Educate yourself and be smart about where you visit and what you click on", in this tutorial by Grinler of BleepingComputer.
: Please only run one anti-virus and one anti-spyware program (in resident mode) and one firewall on your system. Running more than one of these at a time can cause system crashes and/or conflicts with each other. Of the following programs, passive protection like SpywareBlaster and MVPS Hosts file can be used with active resident protection programs effectively. The free version of Malwarebytes' Anti-Malware is an on-demand scan and clean program that will also not conflict with resident protection, Spybot is also on-demand but has resident protection if the Teatimer function is used. Only one scan at a time should be run.4.) Antivirus
5.) Internet Browser
- An Anti-Virus product is a necessity. There are many excellent programs that you can purchase. However, we choose to advocate the use of free programs whenever possible. Some very good and easy-to-use free antivirus programs are Avast, and AntiVir.
- Please run only one antivirus resident at a time!
- It's a good idea to set your antivirus to receive automatic updates so you are always as fully protected as possible from the newest threats.
- Many malware infections install themselves by exploiting security holes in Microsoft Internet Explorer. It is strongly suggested that you consider using an alternate browser.
- Both Mozilla Firefox and Opera are next-generation browsers that are more secure and faster than Internet Explorer, immune to most known browser hijackers, and outfitted with built-in pop-up blockers and other useful accessories.
- If you want to stick with a Microsoft browser then IE8 is a must have.
- IE8 is a much improved browser over the IE6 and 7 versions, with a good pop-up blocker and good Active-X default settings.
7.) Install Javacool's SpywareBlaster
- It is critical that you use a firewall to protect your computer from hackers. (The built-in Vista firewall blocks both incoming and outbound, but is still written to the registry). Since most malware accesses the registry and can disable the Windows firewall, it's preferable to install a third party firewall.
- Two good free ones are Online Armor and Outpost. The trial version of Sunbelt Kerio Personal Firewall will also work in "free mode" after the trial period expires.
- Please only use one firewall at a time!
- This excellent program blocks installation of many known malicious ActiveX objects. Run the program, download the latest updates, "Enable All Protection" and you're done. Although it won't protect you from every form of spyware known to man, it is a very potent extra layer of protection.
- Don't forget to check for updates every week or so. Also see this tutorial by Grinler. (Note: This tutorial is for an earlier version, so there may be some minor differences)
Other Cleaning / Protection Software9.) Spybot
- Another good program is MVPS HOSTS
This little program packs a powerful punch as it blocks ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers.
- For information on how to download and install, please read this tutorial by WinHelp2002.
10.) Malwarebytes' Anti-Malware
- Spybot Search & Destroy is a good free scanner.
Spybot has an "Immunize" feature which works roughly the same way as SpywareBlaster above.
- Another feature within Spybot is the TeaTimer option. TeaTimer detects when known malicious processes try to start and terminates them. It also detects when something wants to change critical registry keys and prompts you to allow this or not. See this tutorial by Grinler for more information. (Note: Tutorial is for an earlier version, so there may be some minor differences)
11.) Windows Defender
- An outstanding all-purpose anti-malware scanner and cleaner is Malwarebytes' Anti-Malware. Although there is also a paid version with added features, the free version is fully functional.
- See This Article for details on how to download and scan with Malwarebytes' Anti-Malware.
12.) Lock down ActiveX in Internet Explorer
- Microsoft now offers their own free malicious software blocking and removal tool, "WindowsDefender" (Not compatible with Windows 98 and ME.) It also features real-time protection.
13.) UAC (User Account Control)
- Even if you plan to use an alternate browser, you will have to use Internet Explorer for tasks like updating Windows or visiting any other site that requires ActiveX. Also, since Internet Explorer is integrated into the Windows core, keeping it locked down is very important.
- For IE7 and 8, open IE and go to Tools > Internet Options > Security > Internet, then press "Default Level", then OK.
- For IE6, now press "Custom Level."
- In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
- Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed. Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Options > Security.
- So why is ActiveX so dangerous that you have to increase the security for it? When your browser runs an ActiveX control, it is running an executable program, no different from double-clicking an exe file on your hard drive. Would you run just any file downloaded off a web site without knowing what it is and what it does?
Happy safe computing!
- Do Not turn off UAC (User Account Control) It's there for a reason. It prevents most programs from making changes to your Computers Operating System without your consent.
- A tutorial for using UAC (User Account Control) is here.