Skip to table of contents

Cyber hygiene and system cleanup procedure

The systems connected to internet are more prone to cyber-attacks for stealing user credentials so as to gain access to the data that are critical and sensitive. This guide will help you educate about the cyber hygiene to be followed and the system cleanup procedure to be undertaken when a system or email account is compromised.

Overview of Info-Stealer malware

What is Info-Stealer malware?

  1. Info-stealer malware is designed to gather sensitive data such as the login credentials, credit card information, and personal files from infected devices.
  2. These malware programs silently steal user data and can result in serious security breaches.

Read this to know more about Info-stealer malware.

Major compromise caused by Info-Stealers

Info-stealers can compromise the following:

  1. System and user credentials theft: Usernames, passwords, and other sensitive information are stolen.
  2. Data Leakage: Government, Personal, Official, or Financial data can be exposed.
  3. Identity Theft: Attackers can impersonate the victim or use their information for illegal activities.
  4. Wider System Infection: Malware may lead to further infections or spread across networks.
  5. Financial Losses: Theft of banking or payment credentials can result in unauthorized transactions.

Steps to clean-up after credentials compromise

Isolate the infected device

Disconnect the device from the internet and network immediately. This helps prevent further exfiltration of data and stops malware from spreading.

Scan and remove malware

  1. Use a trusted antivirus (AV) program to scan for and remove the malware.
  2. Perform a full system scan using an up-to-date antivirus tool.
  3. Consider using a specialized anti-malware tool as recommended here. For further assistance reach out to the NIC Cell or NIC-Cert division in your department/ organisation/ ministry.
  4. We recommend to use a commercial EDR / Antivirus to be installed and used always in official systems for more security threat detection and prevention.

Reset the device to factory settings (if necessary)

In cases of deep infection or a source of infection could not be found, a complete OS reinstallation or factory reset may be required to ensure the malware is completely eradicated.

Reset all credentials

  1. Rotate all passwords immediately, starting with high-risk accounts (email, banking, corporate, etc.).
  2. Use strong, unique passwords for each service, and enable multi-factor authentication (MFA) wherever possible.

Monitor online accounts

Keep a close watch on accounts and online services for any unauthorized access or suspicious activities.

For further assistance reach out to the Cybersecurity division or NIC Cell or NIC-Cert division in your department/ organisation/ ministry.

Take this quiz to understand how well equipped you are to identify cyber-threats.

Cyber hygiene best practices

Avoid downloading or clicking untrusted files or links

  1. Be cautious when downloading software or opening attachments from unknown sources.
  2. Do not click on suspicious links or email attachments. These are common vectors for malware infections.

Avoid using pirated software

Pirated software often contains malware, including infostealers. Always use legitimate, licensed versions of software from trusted sources.

Implement antivirus and security controls

  1. Install a reputable antivirus solution and ensure it is regularly updated.
  2. Enable firewalls and security controls to block malicious activity.

Regularly update software and OS

Keep your operating system and software up to date to ensure the latest security patches are applied.

Check out this eBook for more details on Cybersecurity essentials.

Protecting credentials - Browser and device security

Avoid saving official credentials in web browsers

Do not store passwords for sensitive accounts (work, sensitive) in web browsers, especially if personal devices are synced with work devices. Instead, use a reliable password manager to store securely and generate passwords.

Separate personal and work devices

  1. Avoid syncing personal devices with work or official accounts to prevent leakage of credentials across multiple environments.
  2. Ensure that work devices are properly secured with corporate security policies.

Maintaining security and monitoring post-cleanup

Regular security audits

Regularly review your devices for unusual activity and perform security checks in accounts.

Keep backup systems ready

Have a strong backup plan in place to restore files in case of future incidents.

PREVIOUS

UP NEXT