In order to be effective, all of the layers of internet security should be followed and maintained as this will significantly reduce your risk to internet malware.
If your PChas already been compromised please follow all steps.
You should have a comfortable knowledge level with computers before proceeding.
If you do not have at least medium level computer knowledge you should consult with a computer systems security professional and contract them to help you resolve your issue as well as educate you on internet security best practices.
If your machine has not already been compromised please skip to section #2.
If your machine will not boot to windows or if performance is too degraded to function, you have an even more serious issue and will need to perform a boot time scan and removal.
There are several rescue boot antivirus available however the following 2 solutions provide a method for updating without an internet connection.
Tools for boot time malware removal BitDefender Rescue Disk: bitdefender.
com F-secure Rescue CD: f-secure.
com Section 1 Remediation of a malware compromised PC 1.
Download Malwarebytes at malwarebytes.
com If your PCcannot connect to malware bytes (some malware blocks this) then you should download to a USB key or burn to CD on another PC .
a.
Run a full system scan on your PC b.
Delete all instances of malware once the scan has completed 2.
Once the malware has been detected and removed you should be able to browse to the following online virus scanners At least two of these scanners should be used to make certain the PCis cleaned from any undetected threats, not all AV scanners will detect the same threats a.
Pandasecurity - Active scan b.
Trendmicro - Housecall c.
Kaspersky d.
Symantec 3.
Run windows update and install all of the latest Windows patches and updates a.
This should be scheduled and set to auto update once per day or at least once per week.
4.
Do not use your PCfor sensitive transactions immediately after cleaning a.
You should browse and/or use your PCfor other activities to determine if it continues to: i.
Have Pop-up advertisements ii.
Performance issues iii.
Blue screens b.
Install an outbound firewall which will monitor outbound connections, if several unknown outbound connections exist after initial setup then you should proceed to the next step c.
If you have the capability utilize packet sniffer software (Wireshark, Packetyzer)and analyze the TCP flow of traffic to and from your PC , resolving any unknown IP addresses, be particularly aware of addresses that are destined for, or originate from China and Russia.
5.
If your PCwill not browse to the antivirus security sites and it continues to exhibit unusual behavior then the PCshould be rebuilt and secured by a computer systems professional Section 2 Preventing infection by internet banking malware "an ounce of prevention is worth a pound of cure" 1.
Run windows update and install all of the latest Windows patches and updates a.
This should be scheduled and set to auto update once per day or at least once per week.
2.
Install adequate antivirus software If you are not able to purchase antivirus software you can find viable software for free.
However, a purchased commercial product will provide slightly better protection and tech support a.
G-Data - $ b.
TrendMicro - $ c.
Panda Security - $ d.
Symantec - $ e.
Microsoft security essentials - Free f.
Panda Cloud Antivirus - Free g.
AVG Antivirus - Free 3.
Install an adequate host based firewall If you are not able to purchase a firewall you can find viable software for free However, a purchased commercial product will provide slightly better protection and tech support a.
G-Data - $ b.
TrendMicro - $ c.
Panda Security - $ d.
Symantec - $ e.
Comodo firewall - Free f.
Zone Alarm - Free g.
Agnitum firewall - Free h.
PCTools firewall plus - Free i.
Windows 7 firewall - built in to Windows 7 4.
Install Behavioral based malware detection If you are not able to purchase this software you can find viable software for free However, a purchased commercial product will provide slightly better protection and tech support a.
G-Data - $ b.
TrendMicro - $ c.
Panda Security - $ d.
Symantec - $ e.
Threatfire - Free 5.
Install anti-keylogger software I can only recommend one provider for this software as others may not be reliable and may in fact steal your keystroke information.
This software is a leading technology that encrypts all of your keystrokes for websites you visit, even if you have a banking Trojan this mitigates the malware.
http://www.
trusteer.
com/webform/download-rapport a.
Trusteer Rapport - Free for the first few websites that you specify for it to protect and encrypt, unless offered by your bank, then you can protect up to 50 or more 6.
Utilize internet Filtering If you are not able to purchase this software for this you can find viable software for free However, a purchased commercial product will provide slightly better protection and tech support a.
Websense - $ b.
GFI Web Monitor - $ c.
Cyber Patrol - $ d.
Open DNS - Free e.
Bluecoat K9 - Free f.
Safe Families - Free 7.
Secure your browser settings a.
Install the latest internet explorer version and make certain that you are running in "Protected Mode" b.
Follow this browser security guide from CERT http://www.
cert.
org/tech_tips/securing_browser/