Module 11
Clean-up, after-care, post-incident risk management, and information sharing
Last updated on: 26 July 2024
Edit this page on GitHubModule 11
Last updated on: 26 July 2024
Edit this page on GitHubIf malware or malicious traffic is found on a targeted person’s device, we need to either provide remedial after-care or targeted recommendations to allow a client to determine appropriate next steps.
After completing this subtopic, practitioners should be able to do the following:
Earlier in this learning path we mentioned some built-in operating system protections. If malware was able to run on a targeted person’s system just because some of those protections were disabled, then re-enabling them may help prevent malware from executing or doing any further damage. Some less sophisticated pieces of malware could therefore stop running or even be removed just by going into operating system settings and re-enabling protections. In case you are unable to re-enable these protections or if they are disabled again after some time, this is an indication that the malicious process is preventing the proper functioning of the operating system and further clean-up work or factory reset are required. Do note that in some instances you may find instances that OS protections have been disabled in order to install pirated software, which the user may not immediately communicate to you. It is helpful to know this scenario and to guide the client in risk-management decisions and find safer alternatives which preserve operating system integrity.
Factory resets are often the simplest, cleanest way to clear up malware on a given device. If the user has backed up all data they want to keep in a cloud location or a backup drive and is able to reinstall their most-used applications after a factory reset, this is a preferable option for dealing with malware. If they are not certain of having backed up important data, you might assist them in completing a local or cloud backup. Note that malicious files may be found in backed up files (though they would be inert until executed), thus scanning backup folders with a reputable antivirus engine is advisable. Note that oftentimes application and other device configurations are not backed up, depending on the backup utility used. It’s always a good idea to test backups, for example by trying to restore the whole system or some key files from them, before doing a factory reset.
Many malware analysts prefer to use factory resets over other types of removal, since this gives them a far greater certainty that no traces of the malware remained on the targeted person’s systems. There always remains the risk that antivirus programs or operating systems’ built-in protections will not remove all malware, especially if it’s novel or rare; a factory reset will be far more effective at this. The only exception to this might be UEFI rootkits and malware which affects the device’s firmware rather than operating system; we’ve linked to some articles about this below.
Sometimes a factory reset is not feasible due to time constraints, technology constraints, or user comfort with the action. Depending on the nature of the malware, and how well understood it is, it may be feasible to remove it through automated or manual means. See the list of platform-specific advice below for general guidance.
In some cases, malware removal efforts may be ineffective. Built-in Android malware or cracked or jailbroken versions of an operating system are one example (see Android section below for more details). Hardware/firmware attacks are another class of malware which would be resistant to clean-up or factory reset efforts. These are relatively rare however they do occur, mainly only on PCs (Windows/Linux), thus are worth knowing about. Some are detectable by antiviruses, for instance see ESET on the topic of a UEFI Rootkit discovered in the wild in 2018. Additional tips and advice from Microsoft on UEFI rootkit threat hunting is available from BleepingComputer here.
Sharing your findings with your client and working with them to understand how malware infection may have occurred is an important step which allows them to update their risk management approach and understand the significance (or lack of significance) of the security incident.
Take as many detailed technical notes, screenshots, and samples (or, more likely, hashes thereof) and talk to your client about their threat model and to what degree you could share your findings with the wider community. Sharing your findings is particularly valuable if you found a novel threat or one that targets community members specifically based on certain work that they do; in this case, talking to others about malware hashes, infection vectors, and mitigation mechanisms will help protect those at highest risk from it. You can use some of the information from the Documenting Findings section of the Detecting, Investigating and Tracking Malicious Infrastructure learning path when authoring a brief report and when you consider disseminating it.
Build either a flowchart or a checklist which could assist you in removing malware from a device and ensuring that you do not miss any steps. Discuss this flowchart or checklist with a peer or mentor to make sure that it’s accurate and you didn’t miss anything.
Write a brief paragraph explaining in what situations you would recommend that persons who were targeted by a successful malware infection change passwords to their main accounts (email, iCloud, social media, work) afterwards and how you would explain this to a person you are supporting. Run this paragraph by a peer or mentor who will check if your explanation is accurate.
UEFI rootkit cyber attack discovered
FreeAnalysis of a UEFI rootkit malware discovered in 2018, designed to persist even after OS reinstall.
Microsoft shares guidance to detect BlackLotus UEFI bootkit attacks
FreeOverview of the BlackLotus UEFI bootkit malware and steps to detect it, provided by Microsoft.
Trojans All the Way Down: BADBOX and PEACHPIT
FreeIn-depth report on BADBOX and PEACHPIT, malware pre-installed at factories, emphasizing the importance of devices from reputable manufacturers.
How Safety Check on iPhone works to keep you safe
FreeExplanation of the iPhone Safety Check feature, allowing users to review and control shared information.
How to tell if your iPhone is jailbroken
FreeGuide to detecting whether an iOS device has been jailbroken using initial heuristics.
How to factory reset your iPhone, iPad or iPod touch
FreeGuide on how to completely wipe an iOS device, ensuring removal of malware or malicious profiles.
Best antivirus rescue disks of 2024
FreeList of tools for scanning and cleaning infected operating systems using external bootable drives.
Erase your Mac and reset it to factory settings
FreeGuide on how to completely wipe a macOS device to remove malware or malicious profiles.
Objective-See Tools
FreeCollection of security tools for macOS developed by a reputable security researcher, used for detecting malware.
Congratulations on finishing Module 11!
Mark the checkbox to confirm your completion and continue to the next module.
Marks the current module as completed and saves the progress for the user.
You've completed all modules in this learning path.