Link to home
Start Free TrialLog in
Avatar of Clive Beaton
Clive BeatonFlag for Australia

asked on

Zeus Virus has infected my computer.

I accidentally allowed a scammer to access my machine via remote assistance.  I thought I was dealing with Mcafee support.  The hacker frequently takes over my machine using google to go to various sites, mainly Indian and Indian porn. 


This usually starts with a full blue screen with "Software Updating.  Do not turn off your computer" in large white text.  It also displays a full blue screen with "Windows Defender Alert.  Zeus Virus detected on Your Computer".  It goes on to lists the bad things that could happen and includes a phone number purported to be Microsoft Technical Support.  This image stays on screen but allows me to use the computer.  If I close all the apps, it remains on screen and reappears after a full shutdown and Startup.


I would like some advice from anyone with knowledge of this issue.


Thanks,


Clive

SOLUTION
Avatar of David Johnson, CD
David Johnson, CD
Flag of Canada image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Clive Beaton

ASKER

Thanks, David.  I tried sysinternals autorun but it showed nothing that wasn't verified by a credible organisation.

How do you recommend I reset my pc?

Thanks,  Clive
use one of the recommended options :  https://support.microsoft.com/en-us/windows/recovery-options-in-windows-31ce2444-7de3-818c-d626-e3b5a3024da5

first; backup your Data
personally, i download the mediacreation tool  and boot from the stick it creates - during install, it shows the disk where it wants to install windows - at this point i choose delete all partitions, before proceeding
don't forget to update drivers
Thanks, nobus.  Could you recommend the best way to backup my data?

Thanks in advance.
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thank you very much.
Avatar of madunix
madunix

Introduction:

Any program known as malware can corrupt systems, steal data, evade access controls, and more. Malicious software, sometimes known as malware, is a common tool used by online thieves.

Scareware is a malware assault that tells the user to download or purchase dangerous software to fix a virus or problem it claims to have found on its system. Scareware typically serves as a launching pad for more sophisticated cyberattacks rather than being an assault in and of itself.

This kind of malware manipulates users into performing a particular activity by employing "scare" methods. Scareware typically takes the form of operating system-style windows that inform the user that their system is at risk and that they must execute a specific software to restore it to regular operation.

Some common symptoms of Malware attacks Include:-
• An increase in central processing unit (CPU) usage slows down your device.
• Computer freezing or crashing often.
• Decrease in web browsing speed.
• Problems with network connections.
• Modified or deleted files.
• Presence of unknown files, programs, or desktop icons.
• Unknown processes running in the system.
• Programs turning off or reconfiguring themselves.
• Emails being sent without your knowledge or consent


Usage and Awareness:

• Determine which of your assets are valuable to criminals.
• Be aware (in real-time) of the information you're releasing to others.
• Understand what data and resources you can access with your credentials.
• Recognize that pirated software often contains malware deliberately planted to victimize the greedy.
• Recognize that social engineers try to gain your trust—or acquiescence—through deception.
• Stay up-to-date on the latest social engineering techniques.
• Learn to recognize suspicious URLs.
• Be vigilant that the websites you use to enter or view sensitive data use HTTPS as the protocol.
• Avoid clicking/tapping ads and pop-ups.
• Educate yourself about the latest scams.
• In dealing with email, be sure who the senders are. Recognize not just their names but also their actual email addresses, their signature blocks, and the content and tone of their messages.
• Double-check that you have the correct recipients' email addresses before sending any sensitive data.
• Never feel pressured into acting immediately because the tone is urgent, authoritative, or threatening.
• In dealing with email, be wary of subject lines that entice you or gain your confidence.
• In dealing with email, look for spelling mistakes in the sender's domain or spelling and grammar mistakes in the message body.
• Be mindful of hoaxes and impersonations. If something sounds too good to be true, it probably is. When in doubt, call back at a known valid number to verify.
• In dealing with email attachments, like the messages themselves, be confident of the source. If the attachment is unexpected or suspicious, delete it immediately and do not open it.
• In dealing with email, hover your mouse over links to see where they lead before you click.
• Delete unsolicited emails and attachments.
• Be extra cautious with your email password. If you ever forget any other password, most systems can email it to you or send you a password reset link. If a hacker gets into your email account, there's little else of yours they can't reach.
• In dealing with email, if an attachment asks for something unexpected, such as permission to install something, be especially wary.

https://www.kaspersky.com/resource-center/definitions/scareware
Thanks, madunix.
Backing up just your data does not copy some things like browser bookmarks, network drive and printer settings and software profiles.   I use Fabs autobackup it grabs a lot of that stuff.

https://www.fpnet.fr/?page=abdifferences&lang=en
Thanks, Fred.