asked on
Zeus Virus has infected my computer.
I accidentally allowed a scammer to access my machine via remote assistance. I thought I was dealing with Mcafee support. The hacker frequently takes over my machine using google to go to various sites, mainly Indian and Indian porn.
This usually starts with a full blue screen with "Software Updating. Do not turn off your computer" in large white text. It also displays a full blue screen with "Windows Defender Alert. Zeus Virus detected on Your Computer". It goes on to lists the bad things that could happen and includes a phone number purported to be Microsoft Technical Support. This image stays on screen but allows me to use the computer. If I close all the apps, it remains on screen and reappears after a full shutdown and Startup.
I would like some advice from anyone with knowledge of this issue.
Thanks,
Clive
first; backup your Data
personally, i download the mediacreation tool and boot from the stick it creates - during install, it shows the disk where it wants to install windows - at this point i choose delete all partitions, before proceeding
don't forget to update drivers
ASKER
Thanks in advance.
ASKER
Any program known as malware can corrupt systems, steal data, evade access controls, and more. Malicious software, sometimes known as malware, is a common tool used by online thieves.
Scareware is a malware assault that tells the user to download or purchase dangerous software to fix a virus or problem it claims to have found on its system. Scareware typically serves as a launching pad for more sophisticated cyberattacks rather than being an assault in and of itself.
This kind of malware manipulates users into performing a particular activity by employing "scare" methods. Scareware typically takes the form of operating system-style windows that inform the user that their system is at risk and that they must execute a specific software to restore it to regular operation.
Some common symptoms of Malware attacks Include:-
• An increase in central processing unit (CPU) usage slows down your device.
• Computer freezing or crashing often.
• Decrease in web browsing speed.
• Problems with network connections.
• Modified or deleted files.
• Presence of unknown files, programs, or desktop icons.
• Unknown processes running in the system.
• Programs turning off or reconfiguring themselves.
• Emails being sent without your knowledge or consent
Usage and Awareness:
• Determine which of your assets are valuable to criminals.
• Be aware (in real-time) of the information you're releasing to others.
• Understand what data and resources you can access with your credentials.
• Recognize that pirated software often contains malware deliberately planted to victimize the greedy.
• Recognize that social engineers try to gain your trust—or acquiescence—through deception.
• Stay up-to-date on the latest social engineering techniques.
• Learn to recognize suspicious URLs.
• Be vigilant that the websites you use to enter or view sensitive data use HTTPS as the protocol.
• Avoid clicking/tapping ads and pop-ups.
• Educate yourself about the latest scams.
• In dealing with email, be sure who the senders are. Recognize not just their names but also their actual email addresses, their signature blocks, and the content and tone of their messages.
• Double-check that you have the correct recipients' email addresses before sending any sensitive data.
• Never feel pressured into acting immediately because the tone is urgent, authoritative, or threatening.
• In dealing with email, be wary of subject lines that entice you or gain your confidence.
• In dealing with email, look for spelling mistakes in the sender's domain or spelling and grammar mistakes in the message body.
• Be mindful of hoaxes and impersonations. If something sounds too good to be true, it probably is. When in doubt, call back at a known valid number to verify.
• In dealing with email attachments, like the messages themselves, be confident of the source. If the attachment is unexpected or suspicious, delete it immediately and do not open it.
• In dealing with email, hover your mouse over links to see where they lead before you click.
• Delete unsolicited emails and attachments.
• Be extra cautious with your email password. If you ever forget any other password, most systems can email it to you or send you a password reset link. If a hacker gets into your email account, there's little else of yours they can't reach.
• In dealing with email, if an attachment asks for something unexpected, such as permission to install something, be especially wary.
https://www.kaspersky.com/resource-center/definitions/scareware
ASKER
https://www.fpnet.fr/?page=abdifferences&lang=en
ASKER
ASKER
How do you recommend I reset my pc?
Thanks, Clive