IS MY PC INFECTED BY A VIRUS?
- Get link
- X
- Other Apps
Even if we have a good antivirus installed on our computer and we pay all the attention in the world to avoid falling into the clutches of viruses, there is always a certain probability of ending up infected by this type of software. There are viruses so subtle, and with such advanced techniques, that neither we are able to recognize them nor antivirus to detect them. At least until it's too late. What is usually common is that, in a short time, our PC begins to malfunction. And that's when we start to suspect that we have a virus.
There are a wide variety of different types of malware.
Each of them has a purpose and acts in a specific way.
The signs of the earlier viruses were very clear. For
example, some opened and closed the CD reader, others made a ball appear
bouncing across the screen, and others directly erased all the information on
the hard drive and that's it. That was when they didn't force a sector to write
and literally burned the hard drive.
However, now things have changed and viruses can become
so subtle that it can take weeks or months for the slightest indication that our
computer has a virus appears.
For this reason, either by carrying out a regular maintenance
of the computer or by suspecting that we may be infected by malware, below we
explain how to carry out a complete diagnosis of the PC to detect any possible
unwanted threat.
Suspicions that my computer has a virus
Depending on the type of virus, our computer may act in
one way or another. It may not even do anything weird and make it much more
difficult to suspect that we are infected.
Adware
and spyware
The adware and spyware are viruses designed to generate
income for the hackers at the expense of our data and our personal information.
Adware, on the one hand, focuses on displaying advertising all over the
computer, as well as within the web browser, while spyware seeks to collect
personal data (passwords, bank details, and everything else) and sends it
remotely to the hacker computer.
The main signs that our computer is infected by this type
of malicious software are:
· A
lot of advertising appears on our computer. When we have the browser closed,
banners appear on the desktop. And when we surf the Internet, the webs show
many more ads and windows than normal.
· Unknown
extensions and task bars appear in the web browser.
· Our
firewall warns us that some unknown program wants to connect to the Internet.
· Some
browser features (such as automatic updates) are disabled.
· We
cannot enter the antivirus web pages.
· We
get more junk mail than usual.
· The
web browser opens without permission and loads webs randomly.
Fake
antivirus, fake technical support or "rogueware"
Surely we have ever seen fake antivirus or fake tech
support apps. These applications try to pretend to be an antivirus or a program
to fix errors on our computer and tell us, lying, that we have hundreds or
thousands of viruses or errors on our PC. When we try to solve them, it asks us
to pay a license or enter our bank details. Everything, in the end, ends up in
the hands of hackers.
One version of this type of threat is fake technical
support. These generally arrive through malicious web pages created to deceive
their visitors. These websites say that viruses or errors have been detected on
our computer and ask us to call Microsoft technical support to solve the
problem. During the call they will offer us remote control, install a program
(a Trojan) and ask to make a transfer or pay money to correct the problem.
These fake websites may even block our computer by putting the CPU at 100%, preventing
us from closing them.
The signs that show an infection with this type of
malware are:
· Notifications
telling we have hundreds of viruses on our PC
· Our
computer speaks suddenly. The websites usually have phrases that warn us of the
problem.
· The
computer starts to run slow.
· There
are applications that try to access the Internet without permission.
· The
computer crashes or restarts frequently.
· Opening
programs like Google Chrome or watching videos becomes much slower, and with
problems.
· Many
programs cannot be opened. Especially those related to security.
· Antivirus
and firewall disappear or are disabled.
Trojans
The Trojans with wider type of malware. A Trojan can do
almost anything on your PC. The most common are RATs, those that seek to allow
the hacker to connect remotely to our computer. When this malware infects us,
the hacker has full control over our computer and can download files, steal
passwords and bank details, and even install other viruses on the PC.
There are also other types of Trojans depending on the
purpose of the hackers:
· Backdoor: to
enable back doors through which to communicate remotely with our PC.
Exploits: to
exploit flaws and vulnerabilities in our computer.
Banking:
focused exclusively on collecting and stealing bank details.
Rootkit:
focuses on creating persistence. Sometimes it even brings the malware into the
PC's BIOS.
Downloader:
used to update the Trojan, send new versions and add-ons. The
"dropper" variant is responsible for downloading other types of
viruses and Trojans on our computer.
Normally, a Trojan usually has a specific function with a
module that allows hackers, once the computer has been infected, to add functions
to it using "plugins".
The symptoms that our computer has a Trojan are:
· Our
computer crashes or does strange things.
· Some
programs run without permission.
· The
computer is slow or takes a long time to start.
· Strange
applications and services try to connect to the Internet.
· Some
apps don't work. For example, Internet Explorer.
· We
get too much junk mail. Or emails with logins on websites where we have not
entered.
· The
hard drive is constantly working.
· Not
many web pages work.
· Some
personal files disappear, or are modified.
· Antivirus
and firewall disappear. And they cannot be run or installed again.
Ransomware
or extortion software
The ransomware is the most dangerous malware that can be
found today. Normally this type of malware is usually undetectable by most
antivirus and, when we realize that we are infected, it is too late.
The ransomware was born from the police virus. What this
virus did was show us a screen in which they indicated that we had been caught
doing illegal things on the Internet and asked us to pay a fine. All false. But
it was just a screen that blocked our computer, but no files or anything was
deleted.
However, today's ransomware acts differently. When they
reach the computer, what they do is encrypt all of our personal data so that we
cannot access it. We lose them completely. It also asks us to pay a ransom, in
Bitcoin, which allows us to recover the private key to decrypt the data and
recover it. Of course, it doesn't always work, and sometimes we lose money as
well as data.
Signs of a ransomware infection are:
· Our
personal files have disappeared.
· New
files appear with strange names and extensions.
· Text
files appear on the desktop and in folders with instructions for recovering
data.
· The
computer is locked with a screen with instructions to pay and unlock it.
· A
program tries to connect to the Internet, or download other components from the
network.
Bitcoin
and cryptocurrency miners
This is another of the malware that has proliferated the
most in recent years. Especially when Bitcoin and altcoins started to skyrocket
in value. These little programs hide inside other harmless applications, or on
web pages, and start to use our hardware to mine cryptocurrencies. They put the
CPU and GPU at 100% and use our resources and our electricity to participate in
a mining pool. We pay for everything and the hackers get the profit.
The symptoms to suspect that we are infected by this type
of malware are:
· Our
computer is slow. The CPU and / or GPU are constantly put at 100%.
· When
visiting a web page our computer crashes.
· The
computer crashes, even restarts, unexpectedly.
Botnet
The botnet, or network of zombie computers, are a set of
computers and computers around the world who have been infected with the same
malware. This malware, usually a Trojan, opens a back door at the hacker's
disposal and leaves the computer waiting for instructions. These networks (made
up of millions of devices) are usually used to carry out DDoS attacks or to
send mass mail.
The symptoms that our computer is part of a botnet are:
· The
computer is very slow, programs take time to open, and Windows takes a long
time to start.
· Internet
is slow.
How
to check your computer for a virus
If we experience any of the signs that we have seen in
the previous points, we almost certainly have a virus. And since viruses today
are very difficult to detect with the naked eye, we just have to trust our
instincts.
If we have an antivirus installed, be it Protegent360 or
a good reliable antivirus and the virus has not blocked it, we can use it to
scan our computer for viruses. A complete scan of the PC will help us find the
virus. Or if not, at least other signs that we are infected (such as other
secondary viruses used by a Trojan).
How
to eliminate a virus from our computer (and avoid re-infecting ourselves)
Many times the fastest and most effective way to remove a
virus from your computer is to format and install Windows 10 from scratch. In
this way we make sure that there are no traces of it or persistent copies that
could allow it to reproduce again and re-infect our computer. Formatting is
undoubtedly the most efficient. Although also the most drastic. But if Windows
is very infected and it doesn't even work, we won't have another option.
If we don't want to format, then we can try to remove
viruses in several ways. Of course, we must do all of them by restarting the
computer in Safe Mode. In this way we will prevent the virus from blocking the
following security measures.
Scan
the computer with your antivirus
If we have an antivirus installed on
the computer, and it works, we can use it to analyze our PC in search of
viruses and eliminate those that can be detected. We must verify, of course,
that no rules have been created that exclude certain folders from the scans and
that we are using an updated, reliable antivirus with the latest version of the
database.
- Get link
- X
- Other Apps
Comments
Post a Comment