Malware is software designed to harm systems, steal data, spy on users, or enable unauthorized access. It can include infostealers, spyware, ransomware, and remote access tools.
Why it matters for account recovery
Malware matters for recovery because a compromised device can steal new passwords and sessions as fast as you change them. If the device is not trustworthy, account recovery loops repeat.
Common failure modes and misconceptions
- Assuming every compromise is malware: Most account takeovers are identity and social engineering failures. Malware is not the default explanation.
- Changing passwords on an infected device: If malware is present, new credentials and sessions can be captured immediately.
- Wiping evidence too early: In business environments, you may need logs and indicators before remediation.
Safe best practices
- If you suspect malware, change passwords from a separate trusted device first for the control plane (email and password manager).
- Use incident containment thinking for ransomware (see ransomware).
- If the risk is phone surveillance in a personal safety scenario, review stalkerware guidance.
Related terms
Related guides
Malware response is about trust. If the device is not trustworthy, you treat it as hostile until you can establish a clean baseline.
