Compromise Detection, Blocking and Removal Methodology
Last updated: 12 Mar 2008
Basic Steps
The steps should be taken only if you are not keeping evidence for criminal prosecution
and you need to keep the system up as long as possible.
- If you must retain evidence,
follow proven procedures for computer forensic analysis.
- If you can shut down the
system or block network access at some point, do it as soon as possible to prevent
further compromises, perform offline analyses to determine the vector(s), then
re-install the OS with something in place to block the vector(s).
- Detect.
- Block.
- Remove.
Detect
- Detect anomalies
- Assess the physical environment
- Record open network ports as seen from outside
- Remotely investigate computer (Windows)
- Locally investigate computer (Windows)
Block
The vector from which the malware came needs to be blocked, and the attack surface needs
to be minimized.
- Update Software
- Disable Unnecessary Services
- Strengthen Passwords
- Limit Privileges
- Limit Services
- Setup Host Firewall
- Enable Audits
Remove
Any payload that the malware deposited needs to be rendered ineffective so it
can't re-infect, perform its function, or further harm the system.
- Disable Suspicious Services
- Kill Suspicious Processes
- Remove Suspicious Files
- Remove Suspicious Autoruns
- Remove Suspicious Scheduled Tasks