After virus eradication, you can use a previous backup to restore an infected computer.

Have questions?

Get Answers With Our

Online Solution Wizard

Go

Newsletter


Conficker is just the latest in a string of worms and viruses that can attack your computer system. If you think you are safe with your antivirus and backup software, think again. Given the constant onslaught of new viruses and strains of worms, no antivirus software or backup software can guarantee 100 percent protection. Malware affects not only your files, but also your PC and peripheral settings. It could be hours, days or even weeks before you are back online again. And some of your most prized data – photos, videos, music – could be lost forever.

Too many people have learned this lesson the hard way. Don't be a "shoulda, coulda, woulda." Acronis, a global provider of affordable, scalable storage management and disaster recovery software, offers these tips to ensure your digital data remains accessible when you need it.

Steps to protect against virus and worms

  • Schedule regular backups – For some people, "regular" means daily. For others, it is once a week. Determine a schedule and then stick to it.
  • Create a bootable CD/DVD/external storage for emergencies and store your disk images off of your system - You will need these to reboot in the event of a drive failure.
  • Restore your system or data as needed, prior to the time when you became infected.

 Should you discover your PC is already infected, here are some recommendations for quick and immediate relief.

  • Run reliable anti-virus software – Run your antivirus software regularly. Don't let it expire.
  • Look for the appropriate patches – check online for updates and patches that address the problem.
  • Delete infected files - Do so as soon as you discover them.

 Following these steps is no guarantee that you can eradicate a virus. Many of today's virus and malware applications have chameleon-like ability, re-naming themselves as valuable system files where they hide from your antivirus software and delete files, leading to both applications that don't work anymore and an unstable operating system.

Wipe your system clean

The most effective way of cleansing your system from a malware infestation is to have a clean backup image of your system and restore it to point prior to your infection. For example, Acronis True Image Home 2009 protects your PC after just one click and allows you to recover from viruses, unstable software downloads and failed hard drives. Backing up your entire system—including your files, OS, applications, and settings—and restoring it has never been easier.

The vast majority of systems fail at one point or another. Don't be a statistic.



About Acronis:

Acronis unifies data protection and cybersecurity to deliver integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis provides superior cyber protection for data, applications, and systems with innovative next-generation antivirus, backup, disaster recovery, and endpoint protection management solutions powered by AI. With advanced anti-malware powered by cutting-edge machine intelligence and blockchain based data authentication technologies, Acronis protects any environment - from cloud to hybrid to on premises - at a low and predictable cost.

Founded in Singapore in 2003 and incorporated in Switzerland in 2008, Acronis now has more than 2,000 employees in 34 locations in 19 countries. Acronis Cyber Protect solution is available in 26 languages in over 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses.



Press contacts:

Karl Bateson
+617 306 6275



Back to press releases

1282

What is the difference between a virus and a worm?

Viruses need to attach themselves to an executable, worms do not.

What do viruses and worms have in common?

What is one reason you shouldn't leave backup drives connected to your computer?

If malware infects your computer, it could infect the backups too.

What are the seven steps in CompTIA's best-practice procedure for malware removal?

  1. Research and identify malware symptoms
  2. Quarantine infected systems
  3. Disable System Restore
  4. Remediate infected systems: 1. Update A-V software 2. Scan and use removal techniques
  5. Schedule scans and updates to A-V
  6. Enable System Restore again and create a restore point
  7. Educate end user

What is the principal means of quarantining a system?

Disconnect from the network

Why might you not want to restore from a backup to get rid of malware?

The backups could be infected.

Should you use System Restore (or File History) to recover after a malware infection?

No, you should probably delete all old backups, as the malware could have infected them. Alternatively you could scan them with A-V software to determine if they are infected.

How can you use antivirus software if the computer is non-functional due to malware?

Put the disk in a new system and use the A-V software there.

What is the main tool for removing viruses?

What are three ways to run commands in a "clean" environment, if a computer is infected?

Boot into Safe Mode

Use WinRE

Remove hard drive and put it in a different machine

What is the recovery console?

A precursor to WinRE, used in Windows 2000 and Windows XP

If antivirus software isn't working, besides trying to run A-V software on a different system, what is a last ditch effort to eradicate malware?

Completely wipe and restore the OS and files.

What is on-access scanning?

A-V software intercepts before a file is opened, to scan it for malware.

In Windows, what command can be used to flush the local DNS cache?

When re-securing a system after infection, why should you check your DNS configurations?

Because there could be false address resolution entries, as part of a DNS pharming attack.

What is the HOSTS file? What is the path to the HOSTS file in Windows, and what is the path in Linux?

It is a file containing DNS mappings, that are loaded into the DNS cache.

Windows path: %SYSTEMROOT%\System32\drivers\etc\hosts

Linux path: /etc/hosts

In Windows, where is the priority order for DNS resolution set?

HKLM→SYSTEM→CurrentControlSet→Services→Tcpip→ServiceProvider

What command in Windows can you use to find what DNS resolvers are set as primary and secondary?

What are two trusted DNS servers often used?

Google's public DNS servers

Quad9

What are the 6 steps to re-secure DNS configuration after a malware infection?

  1. Flush local DNS cache (ipconfig /flushdns)
  2. Check the HOSTS file for spoofed entries
  3. Check priority order for DNS resolution
  4. Validate that the right primary and secondary DNS resolvers are set
  5. Check (aforementioned) local DNS resolvers to make sure they're operating normally. Maybe check against trusted DNS server.
  6. Check that DNS queries are reaching correct server

After a malware infection, before reenabling System Restore, besides scheduling automatic updates and scans, what are two things you should check?

DNS configuration

Host firewall configuration

How can you keep spam from getting to users' inboxes?

Configure filtering on the messaging server.

Where can you create a backup from Windows Settings?

Settings > Update and Security > Backup tab on lefthand side

A Windows program for execution control on domains

What is AutoPlay, in Windows?

Basically the same thing as AutoRun.

Where can you configure AutoPlay in Windows 10?

Settings > Devices > AutoPlay tab on lefthand side

What are four symptoms that may indicate malware infection?

Performance problems

Application crashes - particularly security applications

File system errors, permission changes

Event viewer shows many security audit failures

How can you tell if a site's certificate is valid and trusted?

A padlock icon to the left of the URL

What does it mean if the URL of a site is colored green?

It means its certificate is highly trusted.

What could it mean if you receive a bunch of emails saying "failed to send" or a bunch of automated replies from unknown people?

It could be that malware is sending emails from your PC, or at least spoofing your address.

Is hardware or software based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents?

A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.

Which type of attacker hacks computers or websites in an attempt to promote a political ideology?

A hacktivist is a hacker activist, someone who attacks computer systems for political reasons.