Hacked.com icon

hacked.com

What malware is and what to do if you think you have it

What is Malware?

Malware is software designed to harm you: steal credentials, spy on activity, encrypt files, or install persistence. The practical goal is not naming the exact malware family. The goal is stopping ongoing access and restoring a device and account baseline you can trust.

Safety note: if you suspect malware, treat the device as untrusted for sensitive logins until you have contained and cleaned it.

Immediate containment checklist

  1. Stop using the device for high-risk activity (banking, payroll, password manager changes) until you complete containment.
  2. Capture evidence if you may need it. Take screenshots of suspicious prompts, record times, and write down what you clicked before symptoms started. Evidence matters when you need vendor support or a fraud dispute.
  3. Disconnect from the network if you see active remote control or rapid pop-ups. If you are unsure, stay online long enough to secure accounts from a clean device and then disconnect.
  4. Secure key accounts from a known-clean device: email first, then financial and work accounts. Turn on Two-Factor Authentication (2FA) where available.
  5. Remove obvious persistence: uninstall unknown apps, remove unknown browser extensions, and reset browser settings if they have been modified.
  6. Run reputable scans using built-in or well-known security tools. Avoid “fix your PC” ads and pop-ups.
  7. Decide cleanup vs reset. If you cannot confidently return to a trusted state, plan a clean reinstall or factory reset.

If you suspect compromise across accounts as well as devices, use how to check if you have been hacked to keep the response sequence tight.

Malware types you actually need to distinguish

Not every label matters, but a few categories change how you respond.

TypeGoalTypical signsBest response
InfostealerSteal passwords, cookies, and tokensNew logins elsewhere, account takeovers, suspicious “new device” alertsContain the device, secure accounts from a clean device, invalidate sessions everywhere
RansomwareEncrypt data for paymentFiles renamed, cannot open documents, ransom noteIsolate immediately, preserve evidence, restore from clean backups if available
Spyware / stalkerwareMonitor messages, location, callsBattery drain, unknown permissions, signs of monitoringFollow a careful removal plan, consider a full reset, and prioritize personal safety
Adware / browser hijackerMonetize redirects and trackingPop-ups, search engine changes, extensions you did not installRemove extensions, reset browser, scan the system, review installed programs
Remote access trojanControl the deviceCursor moves, settings change, unknown admin toolsDisconnect, preserve evidence, reset or rebuild from known-good media

Key idea: many incidents are “account first, device second” or “device first, account second.” You have to handle both sides or the problem loops.

How malware usually lands on a real device

In most cases, malware arrives through one of these routes:

  • Phishing and social engineering that convinces you to open a file, approve a login, or install a “required” app. To sharpen detection, see what phishing is.
  • Fake updates and “codec required” prompts, often paired with malicious ads.
  • Cracked software and unofficial app stores, which frequently bundle infostealers.
  • Browser extensions that request broad permissions and then read sessions or inject content.
  • Sideloaded mobile apps, configuration profiles, or device management enrollment that gives an attacker control over the device.

Symptom triage: signal vs noise

Some symptoms are ambiguous, so treat them as prompts to verify, not proof.

SymptomOften benignHigher-risk interpretationWhat to check
Device is slowUpdates, low storage, many tabsPersistent background processStartup items, unknown services, unexpected admin tools
Pop-ups and redirectsBad extensionHijacked browser settings or proxyExtensions list, search engine settings, proxy/VPN settings
Battery drains fastOld battery, new OS versionBackground recording or constant network activityBattery usage by app, accessibility permissions, unknown device admin
New logins elsewhereTravel or VPNCredential theft or stolen cookiesAccount login history, “devices” list, recent security events

Containment: stop credential theft first

If malware is stealing credentials, the fastest way to lose control is changing passwords on the infected device. Do it from a known-clean device instead.

Containment sequence that works in practice:

  • Change your email password first from a clean device and sign out of other sessions.
  • Invalidate sessions on important services (email, social, cloud storage, banking). Look for “sign out of all devices” and “remove trusted devices.”
  • Turn on strong authentication (2FA) to reduce the value of stolen passwords.
  • Watch for recovery changes (new recovery email, new phone number, new forwarding). Those are stronger signals of active takeover than a single failed login.

After you contain the accounts, return to the device problem. Cleaning accounts but leaving the device compromised turns a one-time incident into a recurring one.

Browser and extension cleanup is not optional

Many real-world compromises are “browser compromise” rather than a deep system compromise. Malicious extensions can read what you type, change what you see, and intercept sessions. When symptoms look like pop-ups, redirects, or strange login pages, treat the browser as a primary suspect.

Practical steps:

  • Remove extensions you do not actively use.
  • Reset browser settings (search engine, startup pages, permissions) and remove site permissions you do not recognize.
  • Clear cookies after you have secured accounts from a clean device, then sign in again and review the device list on critical accounts.

Network and DNS changes can mimic malware

Some “malware symptoms” are actually caused by hostile network settings: a rogue browser proxy, a malicious VPN profile, or a DNS change that sends you to look-alike sites. This matters because you can clean a device and still see strange redirects if the network layer remains compromised.

Checks that are worth the time:

  • Verify you are using the expected Wi-Fi network and router.
  • Review proxy and VPN settings for anything you did not configure.
  • If multiple devices show the same redirects, investigate the router and DNS settings, not only one laptop.

If the device is used for work, treat it as a shared risk

If this is a work device or it accesses business email, cloud storage, admin consoles, or payroll, involve the organization early. Malware incidents are rarely isolated to one laptop because credentials and sessions spread. A calm escalation to IT can prevent repeat compromise by forcing coordinated session invalidation and access reviews.

What to communicate internally:

  • What you observed and when it started
  • Which accounts were used on the device (email, file storage, finance, admin)
  • Whether you changed any passwords or approved any prompts

The goal is not blame. It is reducing blast radius and stopping silent persistence across the organization.

Cleanup paths by device

Windows

Start with built-in tools and reputable scanners. Microsoft documents an offline scan option that can help detect malware that hides during normal operation. See Microsoft’s guidance on Microsoft Defender Offline and on running antivirus scans in Windows Security.

After cleanup, review startup programs, installed apps, and any new “system optimizer” software. If you cannot explain what it is and why it is needed, remove it.

macOS

macOS malware often shows up as unwanted profiles, launch agents, browser modifications, or adware. Apple maintains a practical guide for removing adware and other unwanted software. See Apple’s macOS adware and malware removal guidance.

If the issue persists after removal, consider a clean reinstall. A clean baseline beats weeks of uncertainty.

Android

Android compromises often come from sideloaded apps, malicious “cleaners,” or apps with broad accessibility permissions. Use built-in scanning (Play Protect) and remove unknown apps. Google documents Google Play Protect and its role in scanning apps.

Focus your review on:

  • Device admin and accessibility permissions
  • Apps that can “display over other apps”
  • Apps you did not install, or installed around the time symptoms began

iPhone and iPad

iOS is more restrictive than many platforms, but that does not make it risk-free. A common practical issue is account compromise (Apple ID, email, cloud backups) or profiles and device management enrollment that changes device behavior. If you see a profile you do not recognize, remove it and re-check the device behavior.

When a factory reset or clean reinstall is the right choice

Choose a reset when the cost of uncertainty is high or persistence is likely:

  • You see repeated reinfection after “cleaning.”
  • You cannot identify the source of redirects or admin tools.
  • The device handles sensitive work (finance, payroll, admin consoles).
  • You suspect spyware or remote control capability.

A reset is not a failure. It is a decision to trade time for confidence. If you reset, update the OS fully, reinstall only essential apps, and avoid restoring unknown extensions and “helpers.”

Do not: rebuild the same risky environment after a reset. Reinstalling old extensions and unverified tools is a common way to reintroduce the problem.

If malware was connected to fraud, extortion, or account takeover, assume credentials and sessions were exposed. After the device is clean or reset, do a second pass: invalidate sessions again, rotate the most sensitive passwords (email, password manager, banking), and review recovery channels. The second pass is where many “it came back” incidents are prevented.

Malware response becomes manageable when you treat it as a sequence: secure accounts, contain the device, clean or reset, then rebuild trust slowly. That sequence prevents looping back into takeovers that look “mysterious” but are actually persistent access.

Once your accounts have strong authentication and your device is patched and minimal, the attacker’s easiest paths disappear. Alerts become meaningful because you reduced background noise.

The goal is a baseline you can explain: which apps are installed, which extensions exist, which accounts are signed in, and which recovery channels can change access.